• Title/Summary/Keyword: Personal Information Protection Legislation

Search Result 29, Processing Time 0.038 seconds

De-identification of Medical Information and Issues (의료정보 비식별화와 해결과제)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.552-555
    • /
    • 2017
  • It is de-identification that emerged to find the trade-off between the use of big data and the protection of personal information. In particular, in the field of medical that deals with various semi-identifier information and sensitive information, de-identification must be performed in order to use medical consultation such as EMR and voice, KakaoTalk, and SNS. However, there is no separate law for medical information protection and legislation for de-identification. Therefore, in this study, we present the current status of de-identification of personal information, the status and case of de-identification of medical information, and finally we provide issues and solutions for medial information protection and de-identification.

  • PDF

Domastic Blockchain Legislation and Policy Analysis and the Limitations Deriving and Present Improvement Points (국내 블록체인 법제 및 정책 분석과 한계점 도출 및 향상점 제시 -산업 활성화와 정보보호 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.44-51
    • /
    • 2019
  • Recently, various platforms utilizing blockchains have appeared. In order to develop the blockchain, it is required to improve related laws and institutions. In this respect, we analysis of the laws and systems related to domestic blockchains, draw out the limitations, and suggest directions for improvement. The research method was analyzed the literature and related laws through literature review. It is difficult to analyze the whole law and system at one time, so we examined the necessary laws and systems to revitalize the blockchain. It is confirmed that legal improvement is needed on the scope of electronic transactions and electronic financial transactions, electronic commerce, digital signatures, import and export, personal information protection, blockchain industry promotion and research. Through this, we expect a balanced development of effective blockchain revitalization and protection of national fundamental rights. Individual studies on the legal provisions and systems for each item in the future can be conducted.

A Study on the infringement of privacy of unmanned aircraft : Focusing on the analysis of legislation and US policy (무인항공기의 사생활 침해에 대한 법적 대응 : 미국 정책.입법안 분석을 중심으로)

  • Kim, Sun-Ihee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.135-161
    • /
    • 2014
  • An unmanned aerial vehicle (UAV), commonly known as a drone and also referred to as an unpiloted aerial vehicle and a remotely piloted aircraft (RPA) by the International Civil Aviation Organization (ICAO), is an aircraft without a human pilot aboard. ICAO classify unmanned aircraft into two types under Circular 328 AN/190. Unmanned aircraft, which is the core of the development of the aviation industry. However, there are also elements of the legal dispute. Unmanned aircraft are manufactured in small size, it is possible to shoot a record peripheral routes stored in high-performance cameras and sensors without the consent of the citizens, there is a risk of invasion of privacy. In addition, the occurrence of the people of invasion of privacy is expected to use of civilian unmanned aircraft. If the exposure of private life that people did not want for unmanned aircraft has occurred, may occur liability to the operator of unmanned aircraft, this is a factor to be taken into account for the development of unmanned aircraft industry. In the United States, which is currently led by the unmanned aircraft industry, policy related to unmanned aircraft, invasion of privacy is under development, is preparing an efficient measures making. Unmanned aircraft special law has not been enforced. So there is a need for legal measures based on infringement of privacy by the unmanned aircraft. US was presented Privacy Protection Act of unmanned aircraft (draft). However Korea has many laws have been enacted, to enact a new law, but will be able to harm the legal stability, there is a need for the enactment of laws for public safety of life. Although in force Personal Information Protection Law, unmanned aerospace, when the invasion of privacy occurs, it is difficult to apply the Personal Information Protection Law. So, it was presented a privacy protection bill with infringement of privacy of unmanned aircraft in the reference US legislation and the Personal Information Protection Act.

A Study on the Operational Problems and Improvement Plan of the Domestic Violence Punishment Act through Domestic Violence Crime Information Analysis

  • Yoon, Hyun-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.227-232
    • /
    • 2021
  • The 「Act on Special Cases concerning the Punishment of Crimes of Domestic Violence」 still has various problems in the legal system and enforcement process. Contrary to the original intention of the legislation, it is operated very passively in terms of state intervention and punishment of domestic violence actors in actual operation. Even if it is treated as a home protection case, if you look at the details of the protection disposition, there is a problem that the decision on the protection disposition is biased towards a specific type of protection disposition. In order to improve this, the need for cooperation and active intervention between state agencies is required. In addition, it is necessary to establish a legal basis for a request for personal protection by recognizing the status of a victim who reported domestic violence as a crime reporter. In addition, in order to secure the effectiveness of the protective disposition, it is necessary to strengthen sanctions for non-compliance or violations of the protective disposition.

Research on the Domestic and Foreign Legislation about Secondary Use Protection for Personal Health Information (개인건강정보의 2차이용 보호에 관한 국내외 법안 연구)

  • Park, Han-Na;Jung, Boo-Geum;Lee, Dong-Hoon;Chung, Kyo-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.251-260
    • /
    • 2010
  • Through the convergence of medical services and the IT technique, the patient's personal health information computerization has been rapidly spread with propagation of electronic medical record(EHR). In addition, by entering u-health, the demand of the secondary use for public health, medical research, and medical service using electronic patient health care records are increasing. The personal health information secondary uses for the development of academic medical area and service, are very good thing. But, carelessly to use personal health information, the patient privacy would be damaged. However, there are not yet systematic studies about secondary use of personal health information. Therefore, in this paper, we analyze the difference of the internal and external bill for personal medical data secondary use and propose the direction of the medical service development and preservation of the individual's privacy.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

Research of Specific Domestic De-identification Technique for Protection of Personal Health Medical Information in Review & Analysis of Overseas and Domestic De-Identification Technique (국내외 비식별화 기술에 관한 검토 분석에 따른 개인건강의료정보 보호를 위한 국내 특화 비식별화 기술 제안에 관한 연구)

  • Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Song, Kyoungtaek;Yu, Khigeun;Baek, Jongil;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.9-16
    • /
    • 2016
  • As life in a rapidly changing Internet age at home and abroad, large amounts of information are being used medical, financial, services, etc. Accordingly, especially hospitals, is an invasion of privacy caused by leakage and intrusion of personal information in the system in medical institutions, including clinics institutions. To protect the privacy & information protection of personal health medical information in medical institutions at home and abroad presented by national policies and de-identification processing technology standards in accordance with the legislation. By comparative analysis in existing domestic and foreign institutional privacy and de-identification technique, derive a advanced one of pseudonymization and anonymization techniques for destination data items that fell short in comparison to the domestic laws and regulations, etc. De-identification processing technology for personal health information is compared to a foreign country pharmaceutical situations. We propose a new de-identification techniques by reducing the risk of re-identification processing to enable the secondary use of domestic medical privacy.

Improving Legislation on the use of Healthcare Data for Research Purposes (보건의료 빅데이터의 연구목적 사용에 대한 법제 개선방안)

  • Park, Dae Woong;Jeong, Hyun Hak;Jeong, Myung Jin;Ryoo, Hwa Shin
    • The Korean Society of Law and Medicine
    • /
    • v.17 no.2
    • /
    • pp.315-346
    • /
    • 2016
  • With the development of big data processing technology, the potential value of healthcare big data has attracted much attention. In order to realize these potential values, various research using the healthcare big data are essential. However, the big data regulatory system centered on the Personal Information Protection Act does not take into account the aspect of big data as an economic material and causes many obstacles to utilize it as a research purpose. The regulatory system of healthcare information, centered on the primary purpose of patient treatment, should be improved in a way that is compatible with the development of technology and easy to use for public interest. To this end, it is necessary to examine the trends of overseas legal system reflecting the concerns about the balance of protection and utilization of personal information. Based on the implications of the overseas legal system, we can derive improvement points in the following directions from our legal system. First, a legal system that specializes in healthcare information and encompasses protection and utilization is needed. De-identification, which is an exception to the Privacy Act, should also clearly define its level. It is necessary to establish a legal basis for linking healthcare big data to create synergy effects in research. It is also necessary to examine the introduction of the opt-out system on the basis of the discussion on the foreign debate and social consensus. But most importantly, it is the people's trust in these systems.

  • PDF

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.

Examining China's Internet Policies through a Bibliometric Approach

  • Li, Jiang;Xu, Weiai Wayne;Wang, Fang;Chen, Si;Sun, Jianjun
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.2
    • /
    • pp.237-253
    • /
    • 2018
  • In order to understand China's internet governance, this paper examined 1,931 Internet policies of China by bibliometric techniques. Specifically, the bibliometric techniques include simple document counting, co-word analysis, collaboration network analysis and citation analysis. The findings include: (1) China's Internet legislations mainly emphasized e-commerce and Internet governance, and, to some extent, neglected personal data protection; (2) China's Internet is under intensive multiple regulatory controls by central government. A large number of government agencies are involved in Internet policy-making. The Propaganda Department of the Central Committee of the Communist Party of China and the State Information Leading Group of the State Council, enforced fewer policy documents, but occupy higher positions in the Internet governance hierarchy; (3) China's Internet legislation system is primarily composed of industry-specific administrative rules, rather than laws or administrative regulations. Nevertheless, laws and administrative regulations received significantly more citations owing to their superior force. This paper also discussed current gaps in China's internet governance and how the country's internet policies are situated in the broader global context.