• Title/Summary/Keyword: Privacy Laws

Search Result 91, Processing Time 0.023 seconds

A Study on Dispute Resolution and Policy Problem in the Drone Logistics Industry (드론 물류산업의 분쟁해결과 정책적 과제)

  • Park, Jong-Sam
    • Journal of Arbitration Studies
    • /
    • v.26 no.4
    • /
    • pp.151-179
    • /
    • 2016
  • Emerging as a strategic domain of the service industry, the drone logistics industry is evolving into a zero effort industry, which realizes smart device service ranging from corporate services to daily customer services. The role of the drone industry is becoming increasingly important in strengthening national competitiveness, as well as corporate competitiveness, beyond the strengthening of product competitiveness. Although drones have various strengths and weaknesses for industries, there are plenty of possibilities for diverse disputes and conflicts due to lack of related laws, regulations, and institutional norms, as well as unsolved problems related to technologies and operations; that is, there are still policy tasks and problems to be solved such as unauthorized seizure of drones, hacking, protection of personal privacy, safety concerns, regulation and limitation of flying areas, damage relief, and dispute settlements. Thus, in order to vitalize the drone industry as a future growth engine while responding to the changes in the environment of the drone industry in Korea and overseas and to strengthen national and corporate competitiveness by harmonizing with advanced management innovations, it is necessary to conduct in-depth discussions and review policy issues related to the vitalization of the drone industry. Therefore, the purpose of this study is to review the domestic and overseas realities and statuses of the drone logistics industry and application cases, analyze policies regarding the drone logistics industry of each country, review general theories on the solution of disputes arising out of the transactions in the drone logistics industry, and, as a conclusion, suggest desirable policy issues for the vitalization of the drone logistics industry in Korea.

A Study on the Protecting of Personal Information in Offline Transactions : Focused on the Housing Lease Agreements (오프라인 거래에서 개인정보 보호방안 : 주택임대차계약을 중심으로)

  • Kim, HyoSeok;Park, Soon-Tai;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.243-252
    • /
    • 2020
  • Recently, the proportion of housing lease has been increasing to an overwhelming level in line with the increase of single-person households and the change in the form of housing. In the normal case, the use of rental-type housing is subject to a housing lease agreement through a licensed real estate agent. In the event of a transaction conclusion, licensed real estate agent shall issue a contract containing the personal information of the lessee, the renter, and the licensed real estate agent to the transaction party. In this case, it is necessary for the lessee to provide the contract to a third party. This paper analyzes relevant laws and regulations and the status of housing transactions, focusing on personal information processed between offline housing lease agreements. And when issuing a contract through IRTS, we propose a way to protect personal information by providing a third party in three forms: information Data Subject-based, Purpose of usage-based De-identification, and Certificate of Contract.

Improvement of Selective Consent Method in the Collection Process of Personal Information of Financial Institutions (금융기관의 개인정보 수집 절차 중 선택적 동의 방식의 개선방안)

  • Sun, Jong-chun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.123-134
    • /
    • 2020
  • Although the rights of data subjects are defined through laws such as the Personal Information Protection Act, the consent process for collecting personal information by financial institutions is only formal and does not guarantee the right of self-determination of personal information. Therefore, it is necessary to analyze the problem by information provision items of the current model, and to improve by changing the structure such as replacing the current method provided with the text with pictures and videos, and mandatory to provide the information subjects with personal information flow related images from the signing up stage. The improvement model is presented as a way to add a procedure to the current model. The effect was verified through a survey. It is hoped that the proposed model is actually reflected through the review to create an environment that can be a true meaning agreement that reflects the information subject's right to self-determination.

Research on Utilizing Method of CCTV System for Crime Prevention and Safety Accident Reduction (범죄예방 및 안전사고 감소를 위한 CCTV시스템의 활용방안에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • Recently, people in cities of developed countries are exposed to unfortified damages of crime and disaster due to urbanization, industrialization and information-oriented era caused by congestion of population in terms of hardware and various social pathology phenomena and frequent and large scale of disaster caused by crime and disorder, which occur in the course of going through nuclear family, a gap between rich and poor and aging society in terms of software. In this regard, demand for security upon individual life and property has been increased but the police that are responsible for the public security does not effectively reduce damage in life and property because their activities are mainly oriented in coping with security accidents more than prevention. Shortage of manpower and budget, retarded equipment, and heavy overwork are the reasons. In order to confront with this kind of situation, we should utilize CCTV system with the purpose of declining possible chances of crime, not for eliminating cause of crime as crime prevention activities to predict danger in advance as a way of prevention and we may expect a role of damage prevention by installing CCTV in places where security accident may possibly happen. In conclusion, there are invasion of privacy, misuse of the system, insufficiency of overall monitoring office management, lack of citizens' understanding and economical allotment of the system installation costs in installation of CCTV system. However. it is necessary to install the CCTV system for effective prevention of crime and prevention activities of security accidents and accurate PR of purposes of installing CCTV to local residents, establishing relevant laws about system misuse, allotment of equipment costs and fees by R&D of the system machinery, cost reduction method of storage, management and replacement, saving costs from co-operative attitude of government, and local autonomous entities and local residents should be involved.

  • PDF

A Study on Tasks for the Legal Improvement for the Governance System in Cybersecurity (사이버안보 추진체계의 제도적 개선과제 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Cyber attacks are threats to national security. Today, cybersecurity threats have various types, the theft or spread of privacy and national secret, the realization of direct attacks to infrastructure and the hacktivism with political or social objectives. Furthermore, There are special situations in South Korea because of North Korea's threats. Thus, It is necessary to handle cybersecurity as a kind of national security problem. It is a time to identify problems of governance system in cybersecurity and to improve related Acts and subordinate statutes. There are several tasks for legal improvement for governance system in cybersecurity. They are improving legal bases for the roles of the relevant authorities in cybersecurity, consolidating national joint response to cyber accidents, establishing and vitalizing information sharing system, constructing foundation of cybersecurity through industry promotion and manpower development, and acquiring defensive tools by enhancement research an development. In order to address these challenges, it is necessary to pay much attention to enactment and to revision laws and to practice legislative procedure.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

A Study on the Safe Use of Data in the Digital Healthcare Industry Based on the Data 3 Act (데이터 3법 기반 디지털 헬스케어 산업에서 안전한 데이터 활용에 관한 연구)

  • Choi, Sun-Mi;Kim, Kyoung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.25-37
    • /
    • 2022
  • The government and private companies are endeavoring to help the digital healthcare industry grow. This includes easing regulations on the big data industry such as the amendment of the Data 3 Act. Despite these efforts, however, there have been constant demands for the amendment of laws related to the medical field and for securing medical data transmissions. In this paper, the Data 3 Act of Korea and the legal system related to healthcare are examined. Then the legal, institutional, and technical aspects of the strategies are compared to understand the issues and implications. Based on this, a legal and institutional strategy suitable for the digital healthcare industry in Korea is suggested. Additionally, a direction to improve social perception along with technical measures such as safe de-identification processing and data transmission are also proposed. This study hopes to contribute to the spread of various convergent industries along with the digital healthcare industry.

A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field (국방 분야 인공지능 기술 접목에 따른 교육훈련 데이터 가명처리 방법론에 관한 연구)

  • Hyunsuk Cho;Sujin Kang;Dongrae Cho;Yeongseop Shin
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2023
  • Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.

  • PDF

A study on Establishment and Management of the CCTV in Operating Room (수술실 CCTV 설치 및 운영에 대한 고찰)

  • Kim, Minji
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.109-132
    • /
    • 2019
  • Recently, medical accidents related to surgical procedures have increased. In addition, the media reported that some of these accidents were involved in health crimes. Patient-advocate groups have called for mandatory establishment and management of CCTV in operating rooms. There is a lot of discussion among the interested parties, so it is necessary to review the relevant laws and regulations. The purpose of this study is to identify the characteristics of CCTV in operating rooms and to review legislations related to establishment and management of the CCTV in operating rooms. Medical institutions use CCTV for management of facilities and patient safety and install it in operating rooms optionally. The Constitution guarantees the privacy and the privacy of correspondence of every citizen, but it can be limited by the law for public welfare. Currently, however, there is no existing law about establishment and management of the CCTV in operating rooms and it can be defect of legal system. Under the current legislations, it is likely that the Self-determination can be violated due to the characteristic of healthcare provider when CCTV is mandatorily installed in operating room. In addition, the regulations on access and leakage of confidential information known by operator are insufficient. So that, the safety of the visual data might be threatened. Furthermore, unless the period and the place of storage of the visual data are clearly defined, it is highly unlikely to meet the original purpose of patient safety and prevention of medical accidents. This study is meaningful as there is few previous study on this topic although the need for legal review about this is growing and several bills are being proposed. It is expected that the results of this study can be utilized as basic data for enactment or amendment of the laws and regulations about establishment and management of CCTV in operating rooms.

A Study on the Access in the Government Archives & Records Service of Korea (한국 정부기록보존소의 역사기록물 공개에 관한 검토)

  • Lee, Jin-Young
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.129-140
    • /
    • 2003
  • The ultimate goal of preserving and maintaining the records is to use them practically. The effective use of records should be supported by the reasonable recordskeeping systems and access standards. In this report, I examined the Korean laws and administrative systems related to the public records access issues. After I pointed out major problems of the access laws, the Government Information Opening Act (GOIA), and the problems in practices, I suggested some alternatives for the betterment of the access system. The GIOA established "eight standards of exemption to access" not to open some information to protect national interests and privacy. The Public Records Management Act (PRMA) applies to the archives transferred to "professional archives." The two laws show fundamental differences in the ways to open the public records to public. First, the GIOA deals with the whole information (the records) that public institutions keep and maintain, while the PRMA deals with the records that were transferred to the Government Archives. Second, the GIOA provides with a legal procedure to open public records and the standards to open or not to open them, while the PRMA allows the Government Archives to decide whether the transferred records should be opened or not. Third, the GIOA applies to record producing agencies, while the PRMA applies to public archival institutions. One of the most critical inadequacies of the PRMA is that there are no standards to judge to open the archives through reclassification procedure. The GIOA also suggests only the type of information that is not accessible. It does not specify how long the records can be closed. The GARS does not include the records less than 30 years old as its objects of the reclassification. To facilitate the opening of the archives, we need to revise the GIOA and the PRMA. It is necessary to clearly divide the realms between the GIOA and the PRMA on the access of the archives. The PRMA should clarify the principles of the reclassification as well as reclassifying method and exceptions. The exemption standards of the GIOA should be revised to restrict the abuse of the exemption clauses, and they should not be applied to the archives in the GARS indiscreetly and unconditionally.