• Title/Summary/Keyword: Privacy Law

Search Result 160, Processing Time 0.066 seconds

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

The Impact of Privacy Policy Layout on Users' Information Recognition (사용자 인지 제고를 위한 개인정보 보호정책 알림방식의 비교 연구)

  • Ko, Yumi;Choi, Jaewon;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.183-193
    • /
    • 2014
  • Korean personal data(information) protection law requires privacy policies post on every website. According to recent survey results, users' interests on these policies are low due to these policies' low readability and accessibility. This study proposes a layout that effectively conveys online privacy policy contents, and assesses its impact on information understandability, vividness, and recognition of users. Studies on privacy policies and layouts, media richness theory, social presence theory, and usability are used to develop the new layered approach. Using experiments, three major layouts are evaluated by randomly selected online users. Research results shows that information understandability, vividness, and recognition of privacy policies in the revised-layered approach are higher than those of in the text-only or table-based layouts. This study implies that employing visual guides like icons on privacy policy layouts may increase users' interest in those policies.

A Legal and Technical Analysis for Establishing Privacy Policies on Artificial Intelligence Systems (인공지능 시스템에서 개인정보 처리방침 수립을 위한 법적·기술적 요구사항 분석 연구)

  • Ju-Hyun Jeon;Kyung-Hyune Rhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1115-1133
    • /
    • 2024
  • With the rapid development of AI technology, AI systems are increasingly collecting, processing, and utilizing personal information in large quantities. As a result, transparency and accountability of personal information processing by AI systems, ensuring the rights of information subjects, and minimizing the risk of personal information infringement are becoming important issues. However, the existing privacy policy only discloses the personal information processing in general, and there is no privacy policy for AI systems. In order to solve these problems, In response to the implementation of the privacy policy evaluation system in accordance with the revision of the Personal Information Protection Act, we propose a new AI system privacy policy establishment and disclosure for personal in the design, development and operation of AI system. This study is expected to play a complementary role to the regulations on the right of data subjects to request an explanation and exercise the right of refusal for automated decisions under the current Personal Information Protection Act.

Legal Issues of Blockchain in Personal Information Protection : Based on GDPR and Personal Information Protection Act (개인정보보호법제 관점에서 본 블록체인의 법적 쟁점 GDPR 및 국내 개인정보보호법을 바탕으로)

  • Park, Minjung;Chai, Sangmi;Lee, Myoung Jun
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.133-146
    • /
    • 2018
  • The technical definition of Blockchain is commonly known 'distributed ledger', however, there is no legal definition for being accepted in worldwide. Therefore, unless legal definitions and concepts of Blockchain are presented, there is a possibility that various legal disputes will occur in the future in Blockchain environment. The purpose of this study is to derive legal issues related to personal information protection that can be conflicted in Blockchain environment based on domestic Privacy Act and GDPR. The outcomes of this study can prevent various legal disputes and provide solutions that may occur due to the spread of Blockchain. It also suggests the foundation for the improvement of Privacy Act. Finally, it contributes to activate of Blockchain, industry, in Korea.

The Impact of CPO Characteristics on Organizational Privacy Performance (개인정보보호책임자의 특성이 개인정보보호 성과에 미치는 영향)

  • Wee, Jiyoung;Jang, Jaeyoung;Kim, Beomsoo
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.93-112
    • /
    • 2014
  • As personal data breach reared up as a problem domestically and globally, organizations appointing chief privacy officers (CPOs) are increasing. Related Korean laws, 'Personal Data Protection Act' and 'the Act on Promotion of Information and Communication Network Utilization and Information Protection, etc.' require personal data processing organizations to appoint CPOs. Research on the characteristics and role of CPO is called for because of the importance of CPO being emphasized. There are many researches on top management's role and their impact on organizational performance using the Upper Echelon theory. This study investigates what influence the characteristics of CPO gives on the organizational privacy performance. CPO's definition varies depending on industry, organization size, required responsibility and power. This study defines CPO as 'a person who takes responsibility for all the duties on handling the organization's privacy,' This research assumes that CPO characteristics such as role, personality and background knowledge have an influence on the organizational privacy performance. This study applies the part relevant to the upper echelon's characteristics and performance of the executives (CEOs, CIOs etc.) for CPO. First, following Mintzberg and other managerial role classification, information, strategic, and diplomacy roles are defined as the role of CPO. Second, the "Big Five" taxonomy on individual's personality was suggested in 1990. Among these five personalities, extraversion and conscientiousness are drawn as the personality characteristics of CPO. Third, advance study suggests complex knowledge of technology, law and business is necessary for CPO. Technical, legal, and business background knowledge are drawn as the background knowledge of CPO. To test this model empirically, 120 samples of data collected from CPOs of domestic organizations are used. Factor analysis is carried out and convergent validity and discriminant validity were verified using SPSS and Smart PLS, and the causal relationships between the CPO's role, personality, background knowledge and the organizational privacy performance are analyzed as well. The result of the analysis shows that CPO's diplomacy role and strategic role have significant impacts on organizational privacy performance. This reveals that CPO's active communication with other organizations is needed. Differentiated privacy policy or strategy of organizations is also important. Legal background knowledge and technical background knowledge were also found to be significant determinants to organizational privacy performance. In addition, CPOs conscientiousness has a positive impact on organizational privacy performance. The practical implication of this study is as follows: First, the research can be a yardstick for judgment when companies select CPOs and vest authority in them. Second, not only companies but also CPOs can judge what ability they should concentrate on for development of their career relevant to their job through results of this research. Cultural social value, citizen's consensus on the right to privacy, expected CPO's role will change in process of time. In future study, long-term time-series analysis based research can reveal these changes and can also offer practical implications for government and private organization's policy making on information privacy.

The Characteristics of Korean Family Law - A Comparison with EU-Countries in Regard to Regime Classification - (한국 가족법의 특수성 - EU 국가와의 비교를 통한 유형 구분 -)

  • Chung, Yun Tag
    • Korean Journal of Social Welfare Studies
    • /
    • v.41 no.4
    • /
    • pp.161-187
    • /
    • 2010
  • This study begins with two research interests. Firstly, there seems to be a break of research in the field of family policy in Korea which exists especially in regard to family law. Family law was originally the core of state interventions in family life, but has been neglected because of the lack of literature with comparative research methods. This shortcoming needs to be addressed. Secondly, through inquiry into the definition of family or family policy with the lens of the law, the definition of family or family policy can be correctly extended. With these two interests combined, this research tries to derive an analytical tool - maintenance community - of the law and compare some important points of the family law of Korea with those of 16 EU-countries in terms of regime classification. The method used is, firstly, to describe the subjects of family law with a focus on partnering and parenting without subjective interpretation, and secondly, to classify the countries' family-law regimes with the criteria of privacy and autonomy using cluster analysis. The results show that the countries can be classified into three clusters: Nordic (Norway and Sweden), West-Northern (Denmark, France, England, Finland, and Belgium) and Middle South (Italy, Spain, Austria, Portugal, Netherlands, Greece, Ireland, Germany, and Korea). This result can be compared to a precedent research result which showed that 21 OECD countries can be classified in three clusters according to family policy. The number of the clusters is the same as this study, but some countries belong to other clusters; for example Denmark and Finland belong to the Nordic cluster according to family policy, while they belong to the West-Northern according to family law, and Austria, Germany, and Ireland belong to the Middle-South cluster according to family law, while they belong to the Continental according to family policy. From this result we can interpret Korean family law to be in the middle range according to both criteria of privacy and autonomy like other South-European countries including some Continental countries. We can make some theoretical suggestions. The fact that both family law and family policy regimes in countries can be classified into three clusters can be interpreted to mean that there exists parallelism between family law and family policy in a broad sense. But from the fact that some countries belong to different clusters according to family law and family policy, we can say that the family policy in a country is not always consistent with family law.

A Study of Digital Library Service Records and User Privacy (디지털도서관서비스기록과 이용자프라이버시에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

Enhance Issues of the global competitiveness of Telemedicine Industry in Korea (우리나라 원격의료산업의 글로벌 경쟁력 강화를 위한 정책 과제)

  • Yoon, Young-Han
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.325-351
    • /
    • 2011
  • This paper is focused on problem in the law and system caused by the infringement of medical information and in the law and system indicate the solution. Interests in the medical service are increasing in internet environment as life quality of the people improves because of development in information and medical technology. The current main issues of the legislative system and the law improvement suggestion for telemedicine activation which is related to the ubiquitous health in which the medicine field and IT technology convergence appearance. In particular, South Korea in the privacy-related legislation should be amended. The reason, Medical information record contains a lot of patient's private secrets. Therefore, if privacy protection is not enough this could cause problem violate a patient's privacy. Thus we need consequently the maintenance of the health medical treatment field to suit a telemedicine environment of a law system. Specifically, this law enacted to protect medical treatment information and the technical security services with confidence and stability against security treats are necessary.

  • PDF

Drones flying and violations of privacy laws, such as riskon (드론비행과 사생활침해 등 법률위반 위험성 연구)

  • Jeong, Soonchae;Mfitumukiza, Joseph;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.22-27
    • /
    • 2017
  • In this paper, A heightened interest in the latest drone, yet steady increase in the field to exploit them. The next market is expected to be vastly improved, and use drone also increasingly will be strengthened. But also not a few side effects of him. In order to use safer and more commonly a drone safety and privacy protection, and there are many issues that need to be considered. Violating privacy laws, such as relations caused by the drone flight and review this study ways to resolve the breach. The flight due to a draw at peace with human life and behavior and enjoy it, but this problem created by new outbreak.

Legal Institutional Considerations of UAV-based Convergence Services : Privacy Protection (UAV기반 융합서비스에 대한 법·제도적 고찰 - Privacy 보호를 중심으로 -)

  • Noh, Jong-ho;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.31-40
    • /
    • 2017
  • UAV (Unmanned Aerial Vehicle) is increasingly used in diverse fields such as disaster, distributi on, and logistics, but it is pointed out that the inadequacy of related laws and invasion of privacy is an obstacle to industrial growth. The regulatory framework for UAV convergence services is pr oposed based on the regulatory framework. From the technical point of view, regulation on archite ctural design, from the market point of view, concurrent operation of services in a limited area, a l egal evaluation based on post-evaluation rather than a pre-regulation under the legislation of visua l information protection law and a social consensus will contribute to the early settlement of UAV -based convergence services.