• Title/Summary/Keyword: Privacy Laws

Search Result 91, Processing Time 0.028 seconds

A Study on the Alienation and Inheritance of the Right of Publicity (퍼블리시티권의 양도성과 상속성에 관한 연구)

  • Kwon, Sang-Ro
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.532-536
    • /
    • 2009
  • Recently the entertainment and sports/advertisement industry have developed rapidly, and the name or identities of celebrities such as entertainers or athletics for the advertisement so that following troubles are occurred continually. Some celebrities actually started a suit for there right of publicity was violated, and won the case. Meanwhile, the right of publicity has become a growing issue in the society. In the States, the right of publicity which controls using one's identity for commercial use, and it is recognized as a right of property separated from the right of privacy. But in Germany, the right of publicity is protected as a human right. On the other hand, in Korea, there is an argument that the mental human right and the right of publicity which has property-characteristic are not separated clearly, and also the attitude of precedent toward the right of publicity is not unified. Especially in Korea, where it is taking the written laws principally, it is not easy to recognize the right of publicity which is a monopoly and exclusion without basis such as any actual laws such as regulation of agreement or any conventional laws. Therefore, as the right protection of celebrities is becoming the social state and there is an agreement with the constituents of the society, now Korea shall progress legislation about the right of publicity, and prepare a legal basis which regulates the remedies for the realization condition, alienation, inheritance, objectives, duration and violation of the right of publicity.

  • PDF

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

Domestic and Foreign Status of Using MyData and Measures for Vitalization (마이데이터(MyData) 활용의 국내외 현황 및 활성화 방안)

  • Shim, Youn Sook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.553-558
    • /
    • 2020
  • Data has emerged as a key driver of national, corporate and individual competitiveness as a result of the entry into the data economy. The value of personal information is increasing in various fields such as customized services and social problem solving. MyData refers to a new paradigm in which individuals have the authority to manage and control their information and make active decisions on where to use and scope of personal information. MyData, which is emerging as a big topic in the data economy, is a necessary concept in an era when the value of data is important, and related laws and systems should be prepared.

Secure Biometric Data Utilization and Protection (바이오인식 정보의 안전한 활용 및 보호방안)

  • Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.841-852
    • /
    • 2021
  • Biometric recognition refers to a technology that identifies or verifies an individual after registering each individual's physical, physiological, and behavioral characteristics with an automated device. However, the biometric data used here corresponds to personal information since it can identify an individual. Therefore, when it is compromised or misused, it negatively affects the privacy of the data subject. In this paper, we review the current status of domestic laws related to biometric information and the status of infringements related to this. And then, some biometric application models are derived and vulnerabilities and countermeasures for each model are discussed. Finally, for the developer and service provider of the biometric system, protection guidance is presented.

Recognition and attitude of paramedic students regarding patient privacy protection (응급구조(학)과 학생들의 환자 개인정보보호에 대한 인식 및 태도)

  • Shin, Yo-Han;Kim, Jung-Sun;Kim, Bo-Kyun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.25 no.2
    • /
    • pp.113-128
    • /
    • 2021
  • Purpose: This study sought to analyze perceptions and attitudes regarding patient personal information protection according to the general characteristics of paramedic students and their clinical practice experience. Methods: A total of 215 paramedic students from G university in I metropolitan city and D university in G do were surveyed. Frequency analysis, percentage analysis, and one-way distribution analysis were conducted using the software SPSS version 23.0. Results: First, recognition regarding the operation of laws and systems related to medical law and personal information protection was high among students who had no clinical practice experience, and there were no differences with regard to students' general characteristics. Second, the level of recognition regarding patient personal information protection and exposure did not differ depending on students' general characteristics and clinical practice experience. Conclusion: Based on the results of this study, students' recognition and attitude should be improved by carrying out continuous education on patient personal information protection. Furthermore, more specialized and systematic training related to patient personal information protection should be conducted to nurture appropriately trained paramedic students.

Constitutional Protection for the Secrecy of Wire Communication and Freedom of News Reporting on Public Affairs (공적 인물의 통신비밀보호와 공적 관심사에 대한 언론보도의 자유: '안기부 X파일' 사건에 대한 서울고법 2006노1725판결을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.211-244
    • /
    • 2007
  • Article 17 and 18 of the Korean Constitution respectively prescribe the violation of individual's right to privacy and the secrecy of wire communication. Meanwhile, Article 20 of the Criminal Code provides that an act which is conducted within the ambit of laws or pursuant to accepted business practices or which does not violate the social norms shall not be punishable. In 1999, the Constitutional Court held that media reports on public matters of public figures must be given strong constitutional protection, and treated differently from reports on private matters of private figures. In accordance with the decision, the Supreme Court has expanded the scope of constitutional guarantee of freedom of expression since 2002. This study analyzes the issue of media liability for publication of illegally intercepted wire communication by a third person. Particularly, it reviews Seoul High Court's ruling on 'X-file scandal' which disclosed intercepted wire communications between notable public figures regarding a slush fund for a presidential candidate. In the light of this analysis, the study concludes that the media reporting of the intercepted communication does not violate social norms of Article 20, and therefore it is entitled to a constitutional privilege.

  • PDF

Legal and Technical Issues of Using Location Information for Police Rescue (경찰 위치추적권 활용의 법적·기술적 문제와 개선방안)

  • Park, Kwang-Ju;Jang, Yun-Sik;Park, Ro-Seop
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.211-228
    • /
    • 2017
  • In May 2012, the police was empowered to electronically obtain location information of mobile devices from the telecommunication service provides for the purpose of rescue by the Act on the Protection, Use, ETC. of Location Information, after years of pressure with repeated serious violent crime outbreaks and controversy concerning the risk of breaching privacy. This study examines the environmental, legal, and technological challenges related to location tracking at the time of five years after the amendment of the law. The bottom line of police's locating power is to secure the lives of people in deadly emergent circumstance. Therefore, location tracking using given information should be swiftly proceeded after consideration and judgment of justification in timely manner to electronically request information to mobile carriers, and it is necessary to have somewhat flexibility of interpretation to be applied to diverse situation. In addition, location tracking technology should be continuously updated through cooperation with the stake-holders. Recognizing substantial problems in practice, we identified and explored the issues including obtaining prior consent for tracking the user's location in case of emergency, confirmation of emergency situation requiring police presence, qualification of legitimate requester, and limited applicability in various circumstances, which are required to reconsidered in conjunction with the personal information protection laws. Additional practical issues may include the expenses for information provision and other incentives to promote active cooperation by the telecom companies.

  • PDF

A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA (FTA 체결에 따른 금융정보 국외이전에 대한 정책적 대응방향 연구)

  • Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.117-130
    • /
    • 2011
  • In a situation where worldwide free trade between countries has expanded recently, our country is being rapidly pushed FTA agreements with the financial developed countries such as United States, EU. According to the agreement, the user information of foreign financial companies in Korea is expected to be transfered overseas. In this paper, we need to define the scope and the definition about the transfer of information and analyze the relating domestic and foreign laws preparing for Cross Border Financial Information Transfer. Also, we review the expected issues about the transfer of information divided into institutional and technical sectors and arc presented the policy implication such as differentiation of regulatory information, enactment and amendment of Personal Information Protection Law(Draft) and related regulations, ensuring the safety of financial companies, raise the standard guidelines of the transfer of information. We refers to the needs for policy formulation to differentiate our privacy information from financial information to protect the privacy of users. The proposed countermeasures in this paper is expected to be helpful the measures to prepare for other institutions such as banks and supervisory authorities prepare for the future Cross Border Financial Information Transfer according to PTA.

A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data (보건의료정보의 법적 보호와 열람.교부)

  • Jeong, Yong-Yeub
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence

  • Arshad, Humaira;Jantan, Aman Bin;Abiodun, Oludare Isaac
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.346-376
    • /
    • 2018
  • Digital forensics is a vital part of almost every criminal investigation given the amount of information available and the opportunities offered by electronic data to investigate and evidence a crime. However, in criminal justice proceedings, these electronic pieces of evidence are often considered with the utmost suspicion and uncertainty, although, on occasions are justifiable. Presently, the use of scientifically unproven forensic techniques are highly criticized in legal proceedings. Nevertheless, the exceedingly distinct and dynamic characteristics of electronic data, in addition to the current legislation and privacy laws remain as challenging aspects for systematically attesting evidence in a court of law. This article presents a comprehensive study to examine the issues that are considered essential to discuss and resolve, for the proper acceptance of evidence based on scientific grounds. Moreover, the article explains the state of forensics in emerging sub-fields of digital technology such as, cloud computing, social media, and the Internet of Things (IoT), and reviewing the challenges which may complicate the process of systematic validation of electronic evidence. The study further explores various solutions previously proposed, by researchers and academics, regarding their appropriateness based on their experimental evaluation. Additionally, this article suggests open research areas, highlighting many of the issues and problems associated with the empirical evaluation of these solutions for immediate attention by researchers and practitioners. Notably, academics must react to these challenges with appropriate emphasis on methodical verification. Therefore, for this purpose, the issues in the experiential validation of practices currently available are reviewed in this study. The review also discusses the struggle involved in demonstrating the reliability and validity of these approaches with contemporary evaluation methods. Furthermore, the development of best practices, reliable tools and the formulation of formal testing methods for digital forensic techniques are highlighted which could be extremely useful and of immense value to improve the trustworthiness of electronic evidence in legal proceedings.