• Title/Summary/Keyword: Personal Protection

Search Result 1,073, Processing Time 0.024 seconds

A Study on Design for Efficient Personal Policy of Service based RBAC (서비스 기반 RBAC의 효율적인 개인별 정책 설계에 관한 연구)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.191-196
    • /
    • 2016
  • The organizations and companies establish personal information protection policy under the law and guidelines. They carry out access control without consideration for distinctiveness of the information although the damage degree varies when the information is leaked. Considering the distinctiveness, a policy needs to be made for individuals to protect his personal information. However, he is not able to write the policy because of lack of understanding the system. To write his own policy efficiently, the system that authorizes ones according to service list provided by organizations is necessary. This paper suggests the model and method that write personal policy for his information protection based on the service list provided by organizations. Through this model, fine-grained authorization and policy change are easily made and ultimately the access control customized according to one's own information is possible.

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

A Study on Personal Information Protection amid the COVID-19 Pandemic

  • Kim, Min Woo;Kim, Il Hwan;Kim, Jaehyoun;Ha, Oh Jeong;Chang, Jinsook;Park, Sangdon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4062-4080
    • /
    • 2022
  • COVID-19, a highly infectious disease, has affected the globe tremendously since its outbreak during late 2019 in Wuhan, China. In order to respond to the pandemic, governments around the world introduced a variety of public health measures including contact-tracing, a method to identify individuals who may have come into contact with a confirmed COVID-19 patient, which usually leads to quarantine of certain individuals. Like many other governments, the South Korean health authorities adopted public health measures using latest data technologies. Key data technology-based quarantine measures include:(1) Electronic Entry Log; (2) Self-check App; and (3) COVID-19 Wristband, and heavily relied on individual's personal information for contact-tracing and self-isolation. In fact, during the early stages of the pandemic, South Korea's strategy proved to be highly effective in containing the spread of coronavirus while other countries suffered significantly from the surge of COVID-19 patients. However, while the South Korean COVID-19 policy was hailed as a success, it must be noted that the government achieved this by collecting and processing a wide range of personal information. In collecting and processing personal information, the data minimum principle - one of the widely recognized common data principles between different data protection laws - should be applied. Public health measures have no exceptions, and it is even more crucial when government activities are involved. In this study, we provide an analysis of how the governments around the world reacted to the COVID-19 pandemic and evaluate whether the South Korean government's digital quarantine measures ensured the protection of its citizen's right to privacy.

Transition from Diagnosis to Assessment System in Public Institution Personal Information Protection Management: Policy Approaches and Recommendations (공공기관 개인정보보호 관리 수준 진단에서 평가 체계로의 전환 : 정책적 접근 및 제언)

  • Youn-hee Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.801-809
    • /
    • 2024
  • In the digital age, the importance of personal information has magnified, underscoring the need for enhanced personal information protection, especially within public institutions. Despite ongoing efforts since 2007, significant breaches in public sector information underline persistent vulnerabilities. This study advocates for a transition from a diagnostic to an assessment framework to fortify privacy management in public institutions, as mandated by recent legislative revisions. The amended Personal Information Protection Act introduces an assessment approach, aiming to comprehensively assess and mitigate risks by expanding the scope of evaluation and implementing robust regulatory measures. This study examines the limitations of the current diagnostic practices through literature review and case analysis and proposes a systematic approach to adopting the new assesment system. By enhancing the assessment framework, the study expects to improve the effectiveness of personal information management in public institutions, thereby restoring public trust and ensuring a stable progression into a more secure digital era. The transition to an assessment system is designed not only to address the gaps in the current framework but also to provide a methodical assessment that supports ongoing improvement and compliance with enhanced legal standards.

Study on Protection and Access Control of Personal Bioinformation in Telemecine Environment (원격의료환경에서 개인생체정보 보호 및 무결성에 관한 연구)

  • Kim, Soon Seok;Lee, Jae Hyun
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.57-62
    • /
    • 2016
  • By using personal health devices, a type of bio-censor at home and building, for telemedicine, this paper proposes a new method to protect more robust patient's privacy than before scheme [1] by ensuring the integrity and the secure transmission further when it communicates with gateway which collecting bio-information from them. As the suggested method is designed to conform with ISO/IEEE 11073-20601 [2], which is international standard, it considered interoperability with various health devices.

Actual status of infection control by the dental hygienist in Korea (일개지역 치과위생사의 감염관리 실태에 관한 연구)

  • Yun, Kyoung-Ok
    • Journal of Korean society of Dental Hygiene
    • /
    • v.13 no.3
    • /
    • pp.369-376
    • /
    • 2013
  • Objectives : The objectives of this study is to investigate the handwashing and use of personal protection equipment in dental hygienists and provide the basic data for dental infection control guideline. Methods : A questionnaire survey was performed in the dental hygienists who participated in the continuing education by the Daejeon City Commission in October 2012. The collected data were analyzed using PASW 18.0. Results : Handwashing was well practiced in group working for 3 to 5 years of employment. Those who took the infection cnotrol training used liquid soap, paper towel, dental mask, protective goggles, face shield, and gloves. Conclusions : Infection control is the most important practice in dental hygienists. So it is necessary to emphasize the inportnace of personal protection equipment including medical gloves, dental mask, and goggles.

Right to be Forgotten in Cyberspace and Measures to Improve Personal Information Protection Law (사이버상 잊혀질 권리와 개인정보보호법의 개선방안)

  • Kwang-Hyun Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.101-103
    • /
    • 2024
  • 본 논문에서는 잊혀질 권리에 대한 법제도 및 법정책적 검토를 논하고자 한다. 잊혀질 권리는 알권리, 표현의 자유 등 다른 기본권과 충돌할 수밖에 없기 때문에 이 권리를 법률로 구체화하는데 다각적인 학제 간 연구가 선결문제로써 검토되어야 한다. 정보 주체에게 잊혀질 권리를 법제화하는 것은 그 정보를 사용하려는 사람의 표현의 자유를 제한하는 결과를 초래하기 때문에 일정한 한계를 노출할 수밖에 없다. 현행 개인정보 보호법, 정보통신망 이용촉진 및 정보보호 등에 관한 법률 등에서 개인정보의 파기제도를 신설하여 부분적으로 잊혀질 권리를 반영하고 있지만 헌법상 중요한 가치인 잊혀질 권리와 알권리 및 표현의 자유에 대해 조화롭게 균형을 찾는 것이 선행과제인 것이다.

  • PDF

Research on Dental Hygienics Students' Perception of Personal Protection and Instrument Disinfection of by Practical Training Type in Some Areas (일부지역 치위생 전공 학생들의 실습행태에 따른 개인방호 및 기구멸균에 관한 인식조사)

  • Ka, Kyung-Hwan;Ku, In-Young;Lee, Myeong-Seon;Moon, Seon-Jeong
    • The Korean Journal of Health Service Management
    • /
    • v.7 no.3
    • /
    • pp.193-202
    • /
    • 2013
  • This study aimed to investigate and compare the perception of personal protective equipments and instrument sterilization of students who are in attendance at colleges and universities and which have bedside training as a regular subject in their curriculum for third-year students. 'Completely True' is the highest response to the question about the importance of wearing gloves, mask and medical gown from all groups. 'Completely True' is the highest response to the question about the necessity for replacement of gloves from all groups. 'Moderate True' is the highest response to the question about the necessity for replacement of mask from the group without practical training and 'Completely True' is the highest response to the question about the importance of hair cleanliness from all groups regardless of practical training experience. For the question about the perception of instrument disinfection and sterilization, the group with inside and outside practical training showed the highest perception level. Consequently, the right education for prevention of infection by setting inclusive guidelines to enhance the level of perception and practice seems continuously necessary.

A Study on Developing Guidelines for Personal Information Protection in Library (도서관 개인정보보호 가이드라인 개발에 관한 연구)

  • Noh, Younghee;Kim, Tae-Kyung
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.2
    • /
    • pp.25-61
    • /
    • 2015
  • This study was designed to propose library privacy guidelines to be applicable in any library without distinguishing library types. Individual libraries can refine, modify, and use them to fit their situation, using the guidelines as a base. The library privacy protection guidelines developed in this study are composed of purposes, definitions, scope of privacy, law and policy, general information, the library's job performance on the handling of personal information, and library subcontractors. The development objectives and utilization direction of the library privacy guidelines developed in this study are meant to provide a guide for change according to the amended provision of library "Privacy Act" implementation, optimization of library Privacy Directive, a reflection of the relevant laws and regulations, and the standardization-oriented library privacy guidelines.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.