• Title/Summary/Keyword: Information Protection Law

Search Result 346, Processing Time 0.023 seconds

Governance Strategies for Trade in Financial Services in Korea (금융서비스의 무역거버넌스 전략)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.11 no.4
    • /
    • pp.229-259
    • /
    • 2009
  • Financial service in economy is same with neural net or vein net of human body. Moreover, every economic entity which has experienced global financial crisis in 2008 is realizing more importance and power of financial service, and is recognizing financial service as a part of new engine of growth for economic development. As global linkages relating financial service in the industry are deepened, we can expect that the economic interests between countries are more conflicted. Because financial service is regarded as critical factors in order to ensure future competitive advantage, more active change of financial service paradigm in Korea is required. The purpose of this paper is to analyze the paradigm of financial service in global business aspect, to prepare the global governance strategies about financial service, and to bring up some ideas for Korea's economic development after global financial crisis by intensifying the competitiveness of financial services. It is suggested that Korea should prepare the "Master Law for Financial Service" (provisional name) in advance as governance strategy for financial service. And not only establishing the financial risks prevention system and consumer's protection agency, but financial competitiveness strengthening actions will have to be included in governance strategy of financial service in Korea.

  • PDF

A Study on the Legislation of Crowd-Funding in Korea (한국 크라우드펀딩의 법제화에 관한 연구)

  • Nam, Wooseok;Min, Daihwan
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.123-137
    • /
    • 2014
  • Since the global financial crisis, funding for startups or ventures has been diminished seriously. In this situation, crowd-funding has attracted worldwide attention as a viable means to financing startups/ventures. After reviewing existing laws in other countries, this study investigated the current status of crowd-funding legalization in Korea and surveyed requirements from three groups of participants to crowd-funding. Investors already recognized the high risk of crowd-funding into startups and asked for the protection of their investment. But, their priorities were on the enlargement of tax benefits and the establishment of a trading market for selling their equity. In addition, investors wanted to shorten the compulsory holding period. Issuers as fund raisers hoped fast legalization, convenient process of crowd-funding, and expansion of government support. Crowd-funding platform operators requested policies for establishing paths to become new growth companies from startups, tax benefits, and the setup of separate fund for startups. Currently, the National Assembly in Korea is holding the discussion on the submitted law. For desirable outcomes to all participants, it would be better to proceed in the following sequence. First, legalize the crowd-funding with clauses protecting investors; Second, encourage investment through tax benefits; Third, develop communities among participants for reducing information asymmetry; And fourth, establish diverse trading markets for selling equities of startups.

A Comparative Study on the Electronic Payment System between United States and Korea (한국과 미국의 전자결제제도 비교연구 -고객보호관련 주요쟁점을 중심으로-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.27-43
    • /
    • 2009
  • This article explored the customers protection regulations in electronic payment system by Article 4A of the UCC and EFTA of 1978 and by Electronic Financial Transaction Act of Korea. Both Korea and America have various regulations to protect concerned parties(customers). For examples, the errors of payment order, money-back guarantee, and unauthorized payment order etc. First, this Article focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. Second, most rights and obligations created by Article 4A of America can be varied with the agreement of affected parties. But there are some exceptions. The exceptions include the money-back guarantee. So Receiving bank have to pay to originator the ordered money included interest. However, Korea also has money-back guarantee but bank do not pay interest to sender. Lastly, Electronic Funds Transfer Act of 1978 and Regulation E has US$ 50 regulation in order to protect customers on the unauthorized payment order. Article 4A imposes duty to detect unauthorized payment orders to originator in relation to the establishment of commercially reasonable security procedure, while Korean law imposes the duty to notify the bank in order to decrease the loss resulted from unauthorized payment order.

  • PDF

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

A Study on the Change of Investment Environment to Cope with Korea-U.S. FTA (한.미FTA 체결에 따른 한.미간 투자 환경의 변화에 관한 연구)

  • Hur, Hyung-Doh
    • International Commerce and Information Review
    • /
    • v.15 no.4
    • /
    • pp.217-240
    • /
    • 2013
  • The investment environment in Korea and U.S. dramatically changed since Korea-US FTA. The key reasons for this successful change were liberalization and strengthened protection of investment along with trade liberalization which also brought investment market expansion. As the result of trade-diversion effect, investments between two countries have been enormously increased. Through a FTA with the big economy like US, Korea's FTA network has been largely expanded. Korea further needs to utilize this outcome when competing with other countries in investment markets.

  • PDF

A Study of Internet Radio Platform based on MIPS Core (MIPS Core에 기반한 인터넷 라디오플랫폼에 관한 연구)

  • Kim, Jong-Duk;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1370-1376
    • /
    • 2008
  • Recently years There are numerous music contents on the internet and it can easily be used without any authority. because of this, casualties of music contents has been increased and music market has collapsed. Therefore Record Copyright Association protection law has revised and using music contents are being managed by copyright holders group from this year. It is one of ways to protect their contents copyright. So on this paper Internet Radio solution is provided to solve the problem between copyright holders and someone wants to use their contents and to make a part of new market on the music contents.

Limitations on Exclusive Rights of Authors for Library Reprography : A Comparative Examination of the Draft Revision of Korean Copyright Law with the New American Copyright Act of 1976 (저작권법에 준한 도서관봉사에 관한 연구 -미국과 한국의 저자재산권의 제한규정을 중시으로-)

  • 김향신
    • Journal of Korean Library and Information Science Society
    • /
    • v.11
    • /
    • pp.69-99
    • /
    • 1984
  • A dramatic development in the new technology of copying materials has presented us with massive problems on reconciling the conflicts between copyright owners and potential users of copyrighted materials. The adaptation to this changing condition led some countries to revise their copyright laws such as in the U. S. in 1976 and in Korea in 1984 for merging with the international or universal copyright conventions in the future. Copyright defined as exclusive rights given to copyright owners aims to secure a fair return for an author's creative labor and to stimulate artistic creativity for the general public good. The exclusive rights on copyrightable matters, generally for reproduction, preparation of derivative works, public distribution, public performance, and public display, are limited by fair use for scholarship and criticism and by library reproduction for its preservation and interlibrary loan. These limitations on the exclusive rights are concerned with all aspects of library services and cause a great burden on librarian's daily duty to provide balance between the rights of creators and the needs of library patrons. The fair use as one of the limitations on it has been coupled with enormous growth of a new technology and extended from xerography to online database systems. The implementation of the fair use and library reprography in Korean law to the local practices is examined on the basis of the new American copyright act of 1976. Under the draft revision of Korean law, librarians will face many potential problems as summarized below. 1. Because the new provision of 'life time plus 50 years' will tie up substantial bodies of material longer than the old law, until that date librarians would need permissions from the owners and should pay attention to the author's death date. 2. Because the copyright can be sold, distributed, given to the heirs, donated, as a whole or a part, librarians should chase down the heirs and other second owners. In case of a derivative work, this is a real problem. 3. Since a work has its protection from the moment of its creation, the coverage of copyrightable matter would be extended to the published or the unpublished works and librarian's work load would be heavier. Without copyright registration, no one can be certain that a work is in the public domain. Therefore, librarians will need to check with an authority. 4. For implementation of limitations on exclusive rights, fair use and library reproduction for interlibrary loan, there can be no substantial aggregate use and there can be no systematic distribution of multicopies. Therefore, librarians should not substitute reproductions for subscriptions or purchases. 5. For the interlibrary loan by photocopying, librarians should understand the procedure of royalty payment. 6. Compulsory licenses should be understood by librarians. 7. Because the draft revision of Korean law is a reciprocal treaty, librarians should take care of other countries' copyright law to protect foreign authors from Korean law. In order to solve the above problems, some suggestions are presented below. 1. That copyright clearinghouse or central agency as a centralized royalty payment mechanism be established. 2. That the Korean Library Association establish a committee on copyright. 3. That the Korean Library Association propose guidelines for each occasion, e.g. for interlibrary loan, books and periodicals and music, etc. 4. That the Korean government establish a copyright office or an official organization for copyright control other than the copyright committee already organized by the government. 5. That the Korean Library Association establish educational programs on copyright for librarians through seminars or articles written in its magazines. 6. That individual libraries provide librarian's copyright kits. 7. That school libraries distribute subject bibliographies on copyright law to teachers. However, librarians should keep in mind that limitations on exclusive rights are not for an exemption from library reprography but as a convenient access to library resources.

  • PDF

A Study on the Use of Criminal Justice Information Big Data in terms of the Structuralization and Categorization (형사사법정보의 빅데이터 활용방안 연구: 구조화 범주화 관점으로)

  • Kim, Mi Ryung;Roh, Yoon Ju;Kim, Seonghun
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.253-277
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the importance of data is intensifying, but there are many cases where it is not easy to use data due to personal information protection. Although criminal justice information is expected to have various useful values such as crime prediction and prevention, scientific investigation of criminal investigations, and rationalization of sentencing, the use of criminal justice information is currently limited as a matter of legal interpretation related to privacy protection and criminal justice information. This study proposed to convert criminal justice information into 'crime data' and use it as big data through the structuralization and categorization of criminal justice information. And when using "crime data," legal issues, value in use, considerations for data generation and use were verified by experts, and future strategic development plans were identified. Finally we found that 'crime data' seems to have solved the privacy problem, but it is necessary to specify in the criminal justice information related law and it is urgent to be organized in a standardized form for analysis to use big data. Future directions are to derive data elements, construct a dictionary thesaurus, define and classify personal sensitive information for data grading, and develop algorithms for shaping unstructured data.

Agent-based Investigation of Business Information from Internet Shopping Malls (에이전트 기반의 인터넷쇼핑몰 사업자신원정보 조사)

  • Sung, Nahk-Hyun
    • Information Systems Review
    • /
    • v.6 no.1
    • /
    • pp.53-66
    • /
    • 2004
  • In Korea, The Consumer Protection Law in Electronic Commerce, which came into effect in July 2002, forced internet shopping malls to provide a minimum of 7 forms of business information, including the name of the business, the name of the representative, geographical address, telephone number, fax number, e-mail address, and business license number, so that consumers could easily identify them. To investigate the shopping malls which do not provide their business information, can lead to confidence in the electronic commerce environment. To investigate the completeness of the business information with the internet shopping malls, this paper proposes the methods of gathering URLs of internet shopping malls, of extracting business information attributes, and an architecture of the agent system. Information extraction in our research is based on synonyms and indicator words of the attributes. With the experiment we showed that the accuracy of our agent system to find out the right business information is 89.3%.

A Study on Analysis of Personal Information Risk Using Importance-Performance Analysis (IPA를 이용한 개인정보 위험도 분석 연구)

  • Jeong, Su-Jin;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.267-273
    • /
    • 2015
  • For newly incoming technologies owing to the advancements in information and communications technology, the new form of information occurs due to the combination form of personal information. In turn, personal information which is combination with existing personal information is on the increase. It is difficult to equalize the method in order to analysis the degree of risk for personal information because it is qualitative method which is defined on the current Personal Information Protection Law. This dissertation presents the model to assess the degree of risk by using the IPA(Importance-Performance Analysis) after measuring the importance and the weighted value for the personal information based on the existing the method of risk assessment. Through the model suggested in this dissertation, the subjective judgement can be excluded, the combination of personal information can be assessed and the standard criteria which is used as the objective indicators from the quantitative degree of risk can be suggested.