• Title/Summary/Keyword: Security Business Act

Search Result 94, Processing Time 0.024 seconds

A Study on the Current Status and Development Plan of Private Security Industry (현행 민간경비업 관련법상의 문제점과 입법론적 고찰)

  • Kwon, Sang-Ro
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.317-321
    • /
    • 2006
  • Endless criminal act has serious effect on safety of the nation and lives of the citizens and it is causing major disorder in ruling of the nation and the society. Also internet generalization in public put country's information foundation on the latest trend on the other hand, due to lack of security concept, cyber crime is on the rise such as hacking and viruses. But with various crime occurrence and increased desire for safety of citizens, there is limit to provide high quality public security service with just police force and equipments. To solve the problems, advanced crime prevention system, not on the nation's level but on the private level was activated private security business some time ago. And now it has its firm place as a corresponding existence with crime prevention capability of police force. Still private security industry of Korea has relatively many weak points when compared with advanced countries and it should be backed up with improvement of the law and the system.

  • PDF

The legal responsibility of the unmanned aircraft operators and insurance (무인항공기 운영자의 법적책임과 보험)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.367-418
    • /
    • 2018
  • Just as safety is the most important thing in aviation, safety is the most important in the operation of unmanned aircraft (RPA), and safety operation is the most important in the legal responsibility of the operator of the unmanned aircraft. In this thesis, the legal responsibility of the operator of the unmanned aircraft, focusing on the responsibility of the operator of the unmanned aircraft, was discussed in depth with the issue of insurance, which compensates for damages in the event of an accident First of all, the legal responsibility of the operator of the unmanned aircraft was reviewed for the most basic : definition, scope and qualification of the operator of the unmanned aircraft, and the liability of the operator of the Convention On International Civil Aviation, the ICAO Annex, the RPAS Manual, the Rome Convention, other major international treaties and Domestic law such as the Aviation Safety Act. The ICAO requires that unmanned aircraft be operated in such a manner as to minimize hazards to persons, property or other aircraft as a major principle of the operation of unmanned aircraft, which is ultimately equivalent to manned aircraft Considering that most accidents involving unmanned aircrafts fall to the ground, causing damage to third parties' lives or property, this thesis focused on the responsibility of operators under the international treaty, and the responsibility of third parties for air transport by Domestic Commercial Act, as well as the liability for compensation. In relation to the Rome Convention, the Rome Convention 1952 detailed the responsibilities of the operator. Although it has yet to come into effect regarding liability, some EU countries are following the limit of responsibility under the Rome Convention 2009. Korea has yet to sign any Rome Convention, but Commercial Act Part VI Carriage by Air is modeled on the Rome Convention 1978 in terms of compensation. This thesis also looked at security-related responsibilities and the responsibility for privacy infringement. which are most problematic due to the legal responsibilities of operating unmanned aircraft. Concerning insurance, this thesis looked at the trends of mandatory aviation insurance coverage around the world and the corresponding regulatory status of major countries to see the applicability of unmanned aircraft. It also looked at the current clauses of the Domestic Aviation Business Act that make insurance mandatory, and the ultra-light flight equipment insurance policy and problems. In sum, the operator of an unmanned aircraft will be legally responsible for operating the unmanned aircraft safely so that it does not pose a risk to people, property or other aircraft, and there will be adequate compensation in the event of an accident, and legal systems such as insurance systems should be prepared to do so.

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing

  • Hundera, Negalign Wake;Mei, Qian;Xiong, Hu;Geressu, Dagmawit Mesfin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.455-472
    • /
    • 2020
  • As a user in modern societies with the rapid growth of Internet environment and more complicated business flow processes in order to be effective at work and accomplish things on time when the manager of the company went for a business trip, he/she need to delegate his/her signing authorities to someone such that, the delegatee can act as a manager and sign a message on his/her behalf. In order to make the delegation process more secure and authentic, we proposed a secure and efficient identity-based proxy signcryption in cloud data sharing (SE-IDPSC-CS), which provides a secure privilege delegation mechanism for a person to delegate his/her signcryption privilege to his/her proxy agent. Our scheme allows the manager of the company to delegate his/her signcryption privilege to his/her proxy agent and the proxy agent can act as a manager and generate signcrypted messages on his/her behalf using special information called "proxy key". Then, the proxy agent uploads the signcrypted ciphertext to a cloud service provider (CSP) which can only be downloaded, decrypted and verified by an authorized user at any time from any place through the Internet. Finally, the security analysis and experiment result determine that the proposed scheme outperforms previous works in terms of functionalities and computational time.

Cloud Computing Strategy Recommendations for Korean Public Organizations: Based on U.S. Federal Institutions' Cloud Computing Adoption Status and SDLC Initiative (한국의 공공기관 클라우드 컴퓨팅 도입 활성화 전략: 미국 연방 공공기관 클라우드 컴퓨팅 도입현황 시사점 및 시스템 개발 수명주기(SDLC) 프로세스 전략을 중심으로)

  • Kang, Sang-Baek Chris
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.103-126
    • /
    • 2015
  • Compared to other countries, cloud computing in Korea is not popular especially in the government sector. One of the reasons for the current not-fully-blossomed situation is partly by early investment in huge government datacenters under Korea's e-government initiative; let alone, there was no strong control tower as well as no enforcing law and ordinances for driving such cloud computing initiative. However, in 2015 March 'Cloud Computing and Privacy Security Act' (hereinafter, Cloud Act) had been passed in the Parliament and from September 2015 Cloud Act was deployed in Korea. In U.S., FedRAMP (Federal Risk Assessment and Management Program) along with Obama Adminstration's 'Cloud First' strategy for U.S. federal institutions is the key momentum for federal cloud computing adoption. In 2015 January, U.S. Congressional Research Service (CRS) has published an extensive monitoring report for cloud computing in U.S. federal institutions. The CRS report which monitored U.S. government cloud computing implementation is indeed a good guideline for Korean government cloud computing services. For this reason, the purpose of the study is to (1) identify important aspects of the enacted Korean Cloud Act, (2) describe recent U.S. federal government cloud computing status, (3) suggest strategy and key strategy factors for facilitating cloud adoption in public organizations reflecting SDLC strategy, wherein.

The Private Security Officer ' Actual Condition of First-Aid Education (민간경비원의 응급처치 교육에 대한 실태조사)

  • Kim, Hyun-Ho;Kang, Hyeon
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.275-290
    • /
    • 2017
  • Since the establishment of Security Business Act in 1976, the Korean private security industry has rapidly grown in the qualitative and quantitative aspects. In the circumstance, various roles of private security guards have been demanded. A private security guard as the first contactor of the users of multi-use facilities should first find an accident field situation and make a response when an accident occurs, and should give first aid as most as possible until emergency medical workers arrive. However, there is a lack of first-aid education for the private security guards who are responsible for the safety of facility users. Therefore, the purpose of this study is first to find how many times private security guards have job and first-aid education, and analyze how the education count influences their first-aid ability; secondly to analyze how private security guards' satisfaction with first-aid education influences their first-aid ability. To achieve the purpose, this researcher conducted a questionnaire survey on first-aid ability of the private security guards working in the metropolitan areas. For data analysis, Stata se/ 14.0ver was applied. For the analysis on validity and reliability, exploratory factor analysis was conducted and a Cronbach's a value was drawn. To find the actual conditions of first-aid education, frequency analysis, inter-group difference analysis, and multi-regression analysis were conducted. According to the data analysis, there were not enough times of job education and first-aid education for private security guards, and their satisfaction with first-aid education and first-aid ability were difference depending on the job and first-aid education counts. Also, their satisfaction with first-aid education partially influenced their first-aid ability.

  • PDF

A Study on Export Bond Insurance as a Security for Independent Bank Guarantee in International Transactions (국제거래에서 독립적 은행보증서에 대한 담보장치로서의 수출보증보험에 관한 연구)

  • Kim, Sang-Man
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.39
    • /
    • pp.59-85
    • /
    • 2008
  • An independent bank guarantee(aka an independent guarantee) is provided as an security on a principal obligor's performance of his obligation, and a guarantor should pay the guaranteed amount only upon a beneficiary's written demand. A standby letter of credit has been used in the United States, since it was construed that a bank should not issue a guarantee. There was wide misunderstanding that a standby letter of credit differs from an independent bank guarantee. However, a standby letter of credit is the same security as an independent bank guarantee, and in international business a standby letter of credit is not differentiated from a independent bank guarantee. An independent bank guarantee are independent from the underlying contract, unconditional, and irrevocable. And a guarantor should pay upon written demand without proving a principal obligor breaches the underlying contract. These features of an independent bank guarantee has been abused in international transactions. Thus it has been proposed that some exceptions to the features of an independent bank guarantee should be allowed. United Nations Convention on Independent Guarantees and Standby Letter of Credit(1995) stipulates some exceptions to payment obligation. Export bond insurance, a part of export insurances, operated by the Korea Export Insurance Corporation under the Export Insurance Act, is used as a security for unfair calling by a beneficiary under an independent bank guarantee. Most of the export subsides by the government are prohibited under WTO's Agreement on Subsidies and Countervailing Measures. However, as export insurance is allowed under the WTO, it operates a significant role in enhancing the export. In the event that export bond insurance is provided for a guarantor, an obligor who is subject to recourse by a guarantor, can be exempt from the recourse in case of unfair calling. The Korea Export Insurance Corporation, an insurer, bears unfair calling risk by a beneficiary. Generally it is understood that a demand shall be made before the expiry of an independent bank guarantee. However this is not absolutely true, it shall be decided by URDG, ISP98, the governing law.

  • PDF

A Study on Transborder Data Flow of Personal Information: Policy Suggestion based on EU's Approach (국경간 개인정보 이전 규제에 대한 개선방안 연구: EU사례를 중심으로)

  • Lee, Sang-Hyuk;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1013-1023
    • /
    • 2016
  • Transborder data flow(TBDF) of personal information in Korea has been limited by current Privacy law which request data subject to give consent. As the IT industry is growing at an incredible rate, there is a need to review the existing law to cope with growing industrial demand and increasing numbers of international data transfer. The transfer of personal data overseas not only allow businesses providing IT services including finance, internet, e-commerce to thrive, but also impact every aspect of our lives which are increasingly depended on these technology. Transmitting personal data across borders raises serious questions of privacy protection and restriction of business operation. In ordrer to promote interoperability of personal data in international environment, a considerable amount of research and debate needs to be taken before implementing a sound policy. This paper presents a need for a sound TBDF policy in Korea by examine the main policy challenges associated with TBDF. Finally, the paper identify policy suggestions based on European Union's approach as they have successfully implemented TBDF policy that balanced data privacy and economic agenda.

Improvement of Selective Consent Method in the Collection Process of Personal Information of Financial Institutions (금융기관의 개인정보 수집 절차 중 선택적 동의 방식의 개선방안)

  • Sun, Jong-chun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.123-134
    • /
    • 2020
  • Although the rights of data subjects are defined through laws such as the Personal Information Protection Act, the consent process for collecting personal information by financial institutions is only formal and does not guarantee the right of self-determination of personal information. Therefore, it is necessary to analyze the problem by information provision items of the current model, and to improve by changing the structure such as replacing the current method provided with the text with pictures and videos, and mandatory to provide the information subjects with personal information flow related images from the signing up stage. The improvement model is presented as a way to add a procedure to the current model. The effect was verified through a survey. It is hoped that the proposed model is actually reflected through the review to create an environment that can be a true meaning agreement that reflects the information subject's right to self-determination.

Study on Blockchain Based University Public Records Management Service (블록체인 기반 대학 공공기록물 관리 서비스 설계 연구)

  • Hong, Gi Wan;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.1
    • /
    • pp.79-91
    • /
    • 2021
  • The public records of universities shall be classified according to the Enforcement Decree of the Public Records Act and public records management activities shall be carried out accordingly. Among various kinds of public records of the university, the records of performance management are still managed as paper documents, such as attendance books, answer sheets, and assignments, and the management system and methods of each school are different, making it difficult for the management manager to manage them. In this paper, we propose a service model that can perform blockchain-based records management of records related to performance at universities currently kept in paper documents. The proposed service is expected to reduce resource consumption, such as the cost, time and effort spent on storing and managing paper documents.

A Efficient Network Security Management Model in Industrial Control System Environments (산업제어시스템 환경에서 효과적인 네트워크 보안 관리 모델)

  • Kim, Il-Yong;Lim, Hee-Teag;Ji, Dae-Bum;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.664-673
    • /
    • 2018
  • The industrial control system (ICS) has operated as a closed network in the past, but it has recently been linked to information and communications services and has been causing damage due to cyber attacks. As a countermeasure, the Information Communication Infrastructure Protection Act was enacted, but it cannot be applied to various real control environments because there is only a one-way policy-from a control network to a business network. In addition, IEC62443 defines an industrial control system reference model as an international standard, and suggests an area security model using a firewall. However, there is a limit to linking an industrial control network, operating as a closed network, to an external network only through a firewall. In this paper, we analyze the security model and research trends of the industrial control system at home and abroad, and propose an industrial control system security model that can be applied to the actual interworking environments of various domestic industrial control networks. Also, we analyze the security of firewalls, industrial firewalls, network connection equipment, and one-way transmission systems. Through a domestic case and policy comparison, it is confirmed that security is improved. In the era of the fourth industrial revolution, the proposed security model can be applied to security management measures for various industrial control fields, such as smart factories, smart cars, and smart plants.