• Title/Summary/Keyword: Information Protection Law

Search Result 346, Processing Time 0.027 seconds

Legal Protection of Information Society and Privacy Right (정보화사회와 프라이버시권리의 법적 보호)

  • 차맹진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.12
    • /
    • pp.1017-1030
    • /
    • 1990
  • We live in so called information society. The more the technology develops the move the impersonalization deepens and the privacy diminishes. Information society has many privercy, if dehumanization and information inequality. Most receuty, according to the development of varies technology and increase of the use of Computers the more information about private life of individual is stoked and filed by each authority and public services, and if information is leaked by neglignace of these institation the privacy is fallen into the great dange, the law for the positive protection of privacy must be prepared as soon as possible. Therefore the establishment of the comcept of privacy right is established. The legal base of constitutional guarantee, the Relief out of the intringement of ligialative must be explained. These thesis is defined, legal foeks is established.

  • PDF

A Study on "The Right to be Forgotten" in Cyber Space (사이버 공간에서의 '잊혀질 권리')

  • Park, Kwang-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.121-123
    • /
    • 2015
  • 본 논문에서는 잊혀질 권리에 대한 법정책적 검토를 논하고자 한다. 잊혀질 권리는 다른 기본권과 충돌할 수밖에 없기 때문에 이 권리를 법률로 구체화하는데 다각적인 학제 간 연구가 선결문제로써 검토되어야 한다. 정보 주체에게 잊혀질 권리를 법제화하는 것은 그 정보를 사용하려는 사람의 표현의 자유 및 국민의 알권리를 제한하는 결과를 초래하기 때문에 일정한 한계를 노출할 수밖에 없다. 비록 현행 개인정보보호법 및 정보통신망 이용촉진 및 정보보호 등에 관한 법률 제44조의 2는 개인정보의 파기제도를 신설하여 부분적으로 잊혀질 권리를 반영하고 있지만 헌법상 중요한 가치인 프라이버시권과 표현의 자유 및 알권리의 조화롭게 균형을 찾는 것이 선행과제인 것이다.

  • PDF

The Study on Copyright Limitations for Activation of Use of Public Works (공공저작물 이용 활성화를 위한 저작권 제한 연구)

  • Hong, Jae-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.2
    • /
    • pp.315-343
    • /
    • 2013
  • Public works has been created by the taxes of the people, so free access and use of public works without charge in the public sector must be guaranteed for the benefit of the public. To do this, above all, a legal basis for solving the problems of the process for copyright should be to establish. Therefore, this study examined the legal concept of public works and the concept and scope of public institutions. And this study, as legislation case to limit the copyright protection of public works, analyzed the relevant provisions of copyright law and the recent revised plan in the U.S., UK, and Germany. And then I analyzed the regulations for limitation of copyright protection of current copyright law and the draft of copyright law on public works in Korea. Based on the results of these analyses, this study suggested the legal revised plan to expand significantly the limitations of copyright in order to activate the use of public works in the library.

Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies (개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석)

  • Lee, Jae-Geun;Kang, Sang-Ug;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.767-779
    • /
    • 2013
  • A field of privacy protection lacks statistical information about the current status, compared to other fields. On top of that, since it has not been classified as a concrete separate field, the related survey is only conducted as a part of such concrete areas. Furthermore, this trend of being regarded as a part of fields such as informatization, information protection and law will continue in the near future. In this paper, a novel and practical way for collecting and storing a big amout of data from 110,000 privacy policies by data controller is proposed and the real analysis results is also shown. The proposed method can save time and cost compared with the traditional survey-based method while maintaining or even advancing the accuracy of results and speediness of process. The collected big personal data can be used to set up various kinds of statistical models and they will play an important role as a breakthrough of observing the present status of privacy information protection policy. The big data concept is incorporated into the privacy protection and we can observe the method and some results throughout the paper.

De-identification of Medical Information and Issues (의료정보 비식별화와 해결과제)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.552-555
    • /
    • 2017
  • It is de-identification that emerged to find the trade-off between the use of big data and the protection of personal information. In particular, in the field of medical that deals with various semi-identifier information and sensitive information, de-identification must be performed in order to use medical consultation such as EMR and voice, KakaoTalk, and SNS. However, there is no separate law for medical information protection and legislation for de-identification. Therefore, in this study, we present the current status of de-identification of personal information, the status and case of de-identification of medical information, and finally we provide issues and solutions for medial information protection and de-identification.

  • PDF

Trends in Data Privacy Protection Technologies with Enhanced Utilization (활용성 강화 데이터 프라이버시 보호 기술 동향)

  • Kim, J.Y.;Jho, N.S.;Chang, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

A Study of Electronic Transaction Law : Basic Electronic Trasaction Law in Korea and Uniform Electronic Transaction Act (전자상거래법 소고 - 우리나라 전자거래기본법과 미국 통일전자거래법 (Uniform Electronic Transaction Act)을 중심으로 -)

  • Kim, Un-Young
    • Korean Business Review
    • /
    • v.13
    • /
    • pp.207-221
    • /
    • 2000
  • In this era of changing system, we may learn lesson from newly developed Uniform Electronic Transation Act(UETA) in 1999. Korea has its counterpart as the Basic Electronic Transaction Act and Electronic Signature Act made by 1999. While UETA stresses on transaction law between individuals, that of Korean stresses on the role of government in electronic transaction. Both laws have the common definitions as electronic record, electronic signature, however, UETA has its own definitions such as automated transaction, computer program, electronic agent, information, information processing system, and security procedure. Especially, transferable record in section 16 is one of the most unique concept which Korean law does not provide. Korean government is planning to introduce electronic note in the near future, which will make unprecedented reform in Korean financial industry. Since Korean law does not have such a concept as electronic note, revision of the law is expected soon. Korean law has its specialty which puts stress on cyber mall, authentication agency, and consumer protection. In U.S., the interpretation of law by court is important when they have disputes according to common law traditon. Studies on cases on disputes in U.S. is needed most for Korean application.

  • PDF

A Study on the EU Internet Privacy Protection Rules (EU의 인터넷 개인정보보호법에 관한 입구)

  • Kim, Eun-Mi
    • International Commerce and Information Review
    • /
    • v.3 no.2
    • /
    • pp.131-142
    • /
    • 2001
  • IT 산업은 인터넷을 발달시킴으로써 새로운 경제 시대 (New Economic Era)를 열게 하였을 뿐만 아니라 민주주의제도의 발전가능성을 한층 더 앞당기는 계기를 마련하고 있다. 그러나 개인들은 그들의 개인정보가 국가기관이나 민간기관에 자신도 모르는 사이 누출되어 국가기관의 감시체제를 구축하거나 불공정한 상업적 목적으로 쓰일 수 있다는 우려 때문에 온라인상의 구매활동이나 정치활동을 주저하고 있다. 특히 유럽민족은 과거의 역사적인 사건들로 인해 개인정보 유출문제에 매우 민감하게 반응한다. 이러한 이유로 EU는 EU국가들 내에서의 인터넷관련 개인정보처리문제와 EU와 제3국간의 개인정보 이전 문제를 규정하는 지침을 1995년 재정하고 1998년부터 시행하고 있다. 동 지침은 또한 미국과의 정보이전협상인 safe harbor를 탄생시켰다. 본 고에서는 왜 개인정보 보호법이 필요한지 그 이유와 개인정보보호에 대한 국제적인 논의 그리고 EU의 개인정보지침 내용을 연구한다.

  • PDF

A Study on Laws Related to Anonymization of Medical Image Information in PACS (PACS에서 의료영상정보의 익명처리와 관련된 법의 연구)

  • Kweon, Dae Cheol
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.5
    • /
    • pp.627-637
    • /
    • 2022
  • The purpose of this study is to comply with the operation and management of medical image information in PACS, the necessity of anonymizing the patient's personal information and the management status of the medical image information related to the personal The purpose of this study was to raise, discuss, and suggest the need for unification and coherence of the law by studying the content of the issues related to information related laws. In order to utilize information related to medical image information, it is necessary to unify the "Medical Act" or the "Bioethics Act" for clear legal application and consider the legal system's consistency. Since there is a possibility of conflict due to issues that are not yet established, systematic coherence of the law is required to find the basic common denominator for the utilization and use of medical image information and to harmonize the law. In addition, the necessity of enacting the "Medical Information Protection Act" that can be practically applied and easily practiced by medical personnel and managers in the clinical field so that sensitive matters of medical image information and personal information can be protected and managed in a specific and systematic way.

Human Rights and Civil Freedoms: Anthropological Approach in the Theory of Law in the Age of Information Technology

  • Gavrilova, Yulia;Dzhafarov, Navai;Kondratuk, Diana;Korchagina, Tamara;Ponomarev, Mikhail;Rozanova, Elizabeth
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.199-203
    • /
    • 2022
  • The article aims at studying the institution of human rights and civil freedoms with due regard to the anthropological approach in the theory of law. To the greatest extent, the provisions of non-classical legal science are confirmed in the Anglo-Saxon legal family, which endows the judge with law-making functions. In this regard, the role of a person in the legal sphere is increasing. The main research method was deduction used to study the anthropological approach to the institution of human rights and freedoms. The article also utilizes the inductive method, the method of systematic scientific analysis, comparative legal and historical methods. To solve the task set, the authors considered the legal foundations and features of human rights and freedoms in the modern world. The article proves that the classical legal discourse, represented by various types of interpretation, reduces the rule of law to the analysis of its logical structure and does not answer the questions posed. It is concluded that the prerequisite for the anthropological approach in the theory of law is the use of human-like concepts in modern legislation (guilt, justice, peculiar ferocity, child abuse, willful evasion, conscientiousness).