• Title/Summary/Keyword: Information Protection Law

Search Result 346, Processing Time 0.027 seconds

Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems (영상감시 시스템에서의 얼굴 영상 정보보호를 위한 기술적·관리적 요구사항)

  • Shin, Yong-Nyuo;Chun, Myung Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • CCTV(Closed Circuit television) is one of the widely used physical security technologies and video acquisition device installed at specific point with various purposes. Recently, as the CCTV capabilities improve, facial recognition from the information collected from CCTV video is under development. However, in case these technologies are exploited, concerns on major privacy infringement are high. Especially, a computer connected to a particular space images taken by the camera in real time over the Internet has emerged to show information services. In the privacy law, safety measures which is related with biometric template are notified. Accordingly, in this paper, for the protection of privacy video information in the video surveillance system, the technical and managerial requirements for video information security are suggested.

A Study on the realization of the right to be forgotten on social normative context: focusing on comparison of Korea-US-EU and the legal, technical, and service market (사회규범적 맥락에서 본 잊혀질 권리의 다차원적 실현범위 연구: 한-미-EU 비교 및 법제, 기술, 서비스 시장의 비교를 중심으로)

  • Shim, Mina
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.141-148
    • /
    • 2018
  • The purpose of this paper is to explore the scope of realization of multiple perspectives so that the implementation of the right to be forgotten is more realistic than the ideal information deletion concept. We examined domestic and foreign legal system and technology/service trends, and reflected the classification realization level of service realization, processing type and information characteristics of personal information processor, and legislative/technical factors for multi-level scope analysis. As a result, we have presented a matrix of the range of realization of the right to be forgotten and the scope of diversified regulation by the subject of protection. This study will be extended to the convergence of law and engineering, and will contribute to the prediction of social costs and expansion of the market by identifying the scope of 'deletion rights'.

Security and Law for Medical Information (의료정보보호를 위한 법률과 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.677-680
    • /
    • 2013
  • The risk of leakage of personal information is growing with new services such as social networking and cloud services by the rapid development of information. In particular, the field of medical IT technology is required to solve problems arising from the aging society and sustainable economic development, and in accordance with the requirements to improve the quality of life, a new market for medical devices and healthcare services can be expected. However, most of the medical information system was computerized with the introduction of IT technology, and when they exchange and transfer of medical information between institutions, medical information leakage occurs and security risk is growing. In this paper we review and analyse the security of personal health information related to the major legal systems and technical and administrative protection.

  • PDF

A Study on the Benefit and Expected Effect of Introducing an AEO Programmes (우리나라 수출입기업의 AEO 인증제도 도입에 따른 혜택 및 기대효과에 대한 연구)

  • Kim, Jin-Kyu;Kim, Hyun-Jee
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.49
    • /
    • pp.167-188
    • /
    • 2011
  • The World Customs Organization (WCO) has designed standards to secure and to facilitate the ever-growing flow of goods in international commerce since 9.11 terrorism in U.S.A. These standards are set forth in the SAFE Framework of Standards, which was adopted by the WCO Council at its 2005 Sessions and the SAFE Framework incorporates the concept of the Authorized Economic Operator (AEO), and the Council directed the WCO to develop more detailed implementing provisions for the AEO concept. It is considered to be reliable in customs-related operations and ensures an equivalent level of protection in customs controls for goods brought into or out of the customs territory, whereas it is difficult for many Korean companies to make a decision of introducing the AEO certification programs because of a lack of cost and benefit information. In this article, We have reviewed the definition and the developing status of an AEO programmes and have studied the benefit and expected effect through documentary research methods. Therefore, it is essential for Korean companies to be certified the AEO programmes from Korea customs service for increasing security in international supply chains through risk management and customs compliance, in addition, the key-driver in the future will be expectations from the business community to work with AEO partners.

  • PDF

Classification and Practical Consequences of Malicious Additional Conditions from Letter of Credit (신용장 악의적 부가조건의 유형과 실무상 유의점)

  • KIM, Hee-Kyung;PARK, Kwang-So
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.103-123
    • /
    • 2017
  • If additional condition in letter of credit is used in malicious way, it affects the international trade transaction in jeopardy. Therefore, it's significant to identify whether additional conditions are malicious or ordinary in the transaction with letter of credit. In normal cases, thanks to lots of useful features as an international payment method, such as security of payment, legal protection, and versatility, a letter of credit is widely used in international trade. However, even with these advantageous features, a letter of credit is complicate and costly to use, compared to other payment methods. Furthermore, due to its principle of independence from underlying contract, a use of letter of credit creates another type of concern for proper handling and needs significant caution upon field use. At some points, malicious additional conditions are used for buyer's advantage in deal making and fraud instance in worst situation. In addition, some countries request malicious conditions against sellers as a non-tariff barrier. Therefore it's extremely important to recognize whether malicious additional condition exists in letter of credit and, if so, how to deal with it. This study delivers the information to distinguish and categorize the malicious conditions in various cases and to figure out how to deal with them for safer trade with less risk.

  • PDF

Economic and Political Conditions in Border Region of Gyeonggi Province (경기도 접경지역의 실태 - 정치적 환경과 경제기반 -)

  • 정은진;김상빈;이현주
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.7 no.2
    • /
    • pp.137-156
    • /
    • 2004
  • This paper investigates the current situation of the Gyeonggi border region, which demonstrates the distorted political and economic realities of Korea, in order to gain the basic information that enables the comprehensive understanding of the Gyeonggi border region. This study has found that the 'Law for Protection of Military Facilities' has limited residents' life and economic activities in the region. And, the 'Law for Planning of the Capital Region' has also became another barrier to development of the region. Finally, the analysis of the region's economic condition showed that these regulations have made the Gyeonggi border region a backward periphery.

  • PDF

About dentistry infection from dentistry medical institution recognition research of patient (치과내원환자의 감염관리에 관한 인식도 조사)

  • Lee, Youn-Kyung;Kim, Soon-Duck
    • Journal of Korean society of Dental Hygiene
    • /
    • v.10 no.4
    • /
    • pp.617-625
    • /
    • 2010
  • Objectives : The research which sees collected information about dentistry infection management recognition of the patients and the infection management which the medical treatment consumer does in necessity is what, grasped and satisfaction and became the fundamental data which makes the hospital will be able to trust about dentistry image rise and dentistry environment of the medical treatment consumer who assists a dentistry character executed. Methods : From 2009 April 1st until May 28th 233 people common people who have the experience which visits a Gyeongsangnam-do area dentistry the object with the entry question law which sleeps did and the data analysis SPSS, 12.0 For Window under using produced each question item by frequency and a ratio, the analytical degree of infection management One - Way ANOVA stamps and executed t-test. Results : Information experience experienced about dentistry infection of the investigation object person to be, appeared with 74.7% and the after that dentistry assistance at the time of conduct change which experiences the answer back regarding of Former times attentively observes organization disinfecting' was most with 46.6%. The protective equipments wearing goal of the dentistry medical attendance appeared the dentistry medical attendance and patient protection 77.7%, dentistry medical attendance protection 12.9%, by patient protection 9.4% order. Before medical treatment starting of the dentistry medical attendance the hand Does not confirm' appeared 72.1%, with. The hand washing, is whole and the degree which appears is high with 4.11 points the stamp. Is high there was a possibility of knowing the thing about the recording infection where the educational background will be high and considers statistically the difference which was visible Conclusions : The education which is active and continuous is necessary about infection management and sets the guides which are standardized to the patients and about infection management and about infection prevention and exposes from dentistry practices well to emboss the thing is thought that there is a necessity to plant a trust feeling about the dentistry where the patients assist.

A Study on development of privacy indicators in the context of cloud service level agreement (클라우드 개인정보보호를 위한 SLA 지표 개발)

  • Kim, Jungduk;Park, Dae-Ha;Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2015
  • As the cloud services, the underlying technology of the digital convergence environment, have been widely adopted in the business, personal information protection has been recognized as one of the major issues to resolve. When cloud services are used to process the personal information, the personal information protection law speculates the establishment of a contract or service level agreement(SLA). This research presents 7 privacy indicators and 13 metrics which can be included in cloud SLA, based on the analysis of related regulation and standards and the SMART(Specific, Measurable, Action-oriented, Relevant and Timely) model. The proposed indicators are examined using the Focus Group Interview method in terms of materiality and feasibility. The results show that all the proposed indicators are meaningful and useful.

Real-time Integrity for Vehicle Black Box System (차량용 블랙박스 시스템을 위한 실시간 무결성 보장기법)

  • Kim, Yun-Gyu;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.49-61
    • /
    • 2009
  • Recently, a great attention has been paid to a vehicle black box device in the auto markets since it provides an accident re-construction based on the data which contains audio, video, and some meaningful driving informations. It is expected that the device will get to promote around commercial vehicles and the market will greatly grow within a few years. Drivers who equips the device in their car believes that it can find the origin of an accident and help an objective judge. Unfortunately, the current one does not provide the integrity of the data stored in the device. That is the data can be forged or modified by outsider or insider adversary because it is just designed to keep the latest data produced by itself. This fact cause a great concern in car insurance and law enforcement, since the unprotected data cannot be trusted. To resolve the problem, in this paper, we propose a novel real-time integrity protection scheme for vehicle black box device. We also present the evaluation results by simulation using our software implementation.

A Study on Spam Regulation (스팸규제에 관한 연구)

  • Baek, Yun-Chul
    • Journal of Information Management
    • /
    • v.38 no.4
    • /
    • pp.48-67
    • /
    • 2007
  • The economic burden which our society has to take exceeds the benefit that it becomes by the free circulation of information. Problems such as inconvenience or inequality between people can also occur since the regulation task of spam e-mail or SMS is imposed on two organs; the Department of Information and Communication and Free Trade Commission. The dualization of regulation separates related laws, which makes exception according to the $\ulcorner$Law on Information Communication Usage and Information Protection$\lrcorner$ or poses double regulation toward the same case. The spam prevention activity at free hands of information communication network provider such as portal site or mobile communication has many limitations along with comparison and analysis of spam regulations abroad. Therefore, examinations on legal obligation such as service restriction, identification and technical measure to spam prevention is needed. This study focuses on making the scope of spam regulation clear by considering the domestic related laws and the general environment of industry, on enacting law which regulates spam including advertisement and on deducting essential facts in enacting or modifying related laws and thus, deducting the form and contents of spam regulation law which is most decent in our domestic environment.