• 제목/요약/키워드: Privacy Law

검색결과 160건 처리시간 0.032초

개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석 (A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure)

  • 정태철;권헌영
    • 한국IT서비스학회지
    • /
    • 제22권6호
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

Research on solution for protecting victim privacy of crime deposit with depository

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권5호
    • /
    • pp.209-216
    • /
    • 2020
  • 형사사건에 있어서 피해자와의 합의는 물론 피해보상을 위하여 공탁부분은 양형자료에 반영되기 때문에 상당히 중요하다. 현행법상 공탁을 하려면 피공탁자의 이름과 주소, 주민등록번호 등을 기재해야 한다. 그런데 피공탁자가 성범죄 피해자 등인 경우 사건기록에서 개인정보가 모두 익명처리되기 때문에 가해자 측은 어려움을 겪는다. 물론 이는 피해자가 가해자와의 합의할 의사가 전혀 없는데도 인적사항을 파악하여 합의를 부치기거나 위협하는 등 가해자로부터 2차 피해를 방어하기 위한 조치이지만 가해자가 자신의 범죄를 뉘우치고 피해자에게 보상하려고 해도 피해자의 인적사항을 몰라 공탁하지 못하는 경우가 생긴다. 에스크로 제도를 활용하면 피해자의 입장에서는 가해자와 직접 접촉을 피하고 개인정보 유출을 막으면서도 실질적인 피해회복을 받을 수 있어서 좋고 가해자의 입장에서는 능력이 닿는 한도에서 잘못에 대해 속죄하는 모습을 보여줄 수 있어서 좋은 제도라고 생각한다.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

웹 환경에서의 분산형 개인정보보호를 위한 솔루션 (Solution for Distributed User's Privacy Under Web Environment)

  • 김대유;김정태
    • 한국정보통신학회논문지
    • /
    • 제17권2호
    • /
    • pp.317-322
    • /
    • 2013
  • 개인정보란 살아있는 개인에 관한 정보로 성명, 주민등록번호 및 영상을 통하여 개인이 알아볼 수 있는 정보를 말한다. 기존의 방법인 하드웨어 필터를 이용한 하드웨어 형태가 아닌 웹 분산형 방식으로 웹 브라우저와 웹 서버 간의 상호 동작 방식으로 개인정보를 점검할 수 있는 방법을 제안하였다. 사용자 단에서 게시판에 작성된 글은 웹 브라우저내의 자바스크립트로 첨부된 문서를 웹 서비스단에서 문서처리기로 개인정보의 누출을 해결할 수 있는 방법을 제안하였다.

A Study on the right to be forgotten in Digital Information Societies

  • Gu, Hyung-Keun
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권10호
    • /
    • pp.151-157
    • /
    • 2017
  • In the case of uploading privacy information of an information owner in the Internet, the information owner may want to deliver the privacy information itself or remove such information from the search list in order to prevent third parties from accessing the privacy information of the information owner. Such a right to be forgotten may collide with the freedom of expression of a third party. The right to be forgotten, which originates from the self-determination right on privacy information based on Article 10 and 17 of the Constitution and the freedom of expression, which is based on Article 21 thereof are all relative basic rights and are both limited by Item 2 under Article 37 of the same law, which is the general limitation provision for the basic rights. Therefore, when the right to be forgotten and the freedom of expression collides, it is not possible to give priority to one of the those unilaterally. It depends on the nature of the case at hand to find a natural balance for the harmonious solution for both parties. The criteria can be the sensitivity to the privacy of the information owner caused by the disclose of the privacy information, the public benefits such information may serve, the social common good that could be expected by the disclosure of the privacy information and the damages suffered in terms of the personal interest caused by the disclosure of the information, in a comprehensive manner.

미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기 (Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law)

  • 김기창
    • 인터넷정보학회지
    • /
    • 제14권3호
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

EU GDPR과 국내 개인정보보호 법제 비교분석 (A Comparative Analysis of EU GDPR with Privacy Laws in South Korea)

  • 김성현;이창무
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.83-92
    • /
    • 2018
  • 2018년 5월 25일부로 시행된 GDPR은 모든 EU 회원국에 공통적으로 적용되고 법적 구속력을 갖춘 점과 개인정보보호와 관련된 가장 최신의 동향이 고려되어진 법이라는 점에서 법적 중요성과 가치가 높다고 할 수 있겠다. 따라서 본 연구는 이러한 GDPR을 기준으로 국내 "개인정보 보호법" 및 "정보통신망법"과의 비교분석을 통한 국내의 개인정보보호 법제의 점검 및 개선 방안을 제언하는 것에 의미가 있을 것이라고 판단하였다. 본 연구의 결과로 GDPR의 법 적용 범위 민감정보 정의 개인정보 이전권 개인정보 보호담당관 개인정보 역외 이전 감독기관 처벌 법 적용 예외 사항 등이 국내 비교대상 법과 차이를 보이고 있었다. 이러한 차이는 정보주체의 권리와 이익을 보호하고, 개인정보의 보호와 활용적 측면의 균형을 위해서도 충분히 필요한 것이었다. 따라서 본 연구의 비교분석 결과 및 법 개선방안에 대한 제언을 토대로 국내 개인정보보호 법제의 전체적인 점검 및 수준 향상에 기여할 수 있을 것으로 기대한다.

  • PDF

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • 한국치위생학회지
    • /
    • 제18권4호
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

인터넷 환경에서의 의료정보화와 환자개인정보보호 방안 (A Study on the Patient Privacy Protection of Medical Information For Internet)

  • 지혜정;신승중;김정일
    • 한국인터넷방송통신학회논문지
    • /
    • 제8권5호
    • /
    • pp.235-241
    • /
    • 2008
  • 정보통신기술과 의료기술의 발전으로 국민들의 삶의 질이 향상되면서 인터넷 환경에서의 의료서비스에 대한 관심이 커지고 있다. 이러한 인터넷 환경에서의 의료정보화는 환자의 개인정보를 침해할 수 있다. 우리나라의 상당수 의료기관은 인터넷 환경에서의 환자개인정보보호에 소극적이다. 의료정보의 유출을 방지하기 위한 법령과 표준안 및 체계적인 지침이 개발되어 있지 않다. 본 연구에서는 인터넷 환경에서의 환자 개인정보 침해유형을 사례를 통해 살펴보고, 법제도적 측면 기술적 측면 관리적 측면에서 인터넷 환경에서의 환자 개인정보를 보호할 수 있는 방안을 모색해 보고자 한다.

  • PDF

A Study on an Efficient and Robust Differential Privacy Scheme Using a Tag Field in Medical Environment

  • Kim, Soon-Seok
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권11호
    • /
    • pp.109-117
    • /
    • 2019
  • 최근 의료분야에서 대용량 의료정보의 이차적인 활용에 관심이 대두되고 있다. 대용량 의료정보의 경우 질병에 대한 연구나 예방 등에 활용되어 의료분야의 발전에 기여할 수 있는 유용한 정보이다. 그러나 개인정보보호법이나 의료법 등으로 인해, 의료정보는 환자나 의료진 등의 개인정보를 포함하고 있기 때문에 이차적인 활용에 많은 제한이 발생한다. 이러한 문제를 해결하기 위해 현재까지 k-익명성[1], l-다양성[2], 그리고 차분 프라이버시[3] 등 다양한 방법들이 제안되어 왔다. 본 논문에서는 지금까지 연구된 다양한 방법들 중 라플라스 노이즈를 이용한 그리고 이전에 제안된 차분 프라이버시 방법들의 문제점들에 대해 논의해보고자 한다. 끝으로 우리는 분석가들로부터의 질의에 대한 응답을 확인하기 위해 주어진 데이터 집합의 마지막 컬럼에 1 비트의 상태필드를 추가하여 기존의 문제점을 해결하는 새로운 방법에 대해 제안해 보고자 한다.