• Title/Summary/Keyword: Security business Law

Search Result 149, Processing Time 0.024 seconds

The Role and Issue analysis of the ADR's Committee in the Revision of Personal Information Protection Act (데이터 3법 개정에 따른 분쟁조정위원회 역할과 이슈분석)

  • Yoon, Duck Joong;Jee, Yoon Seok;Kim, Youngae;Shin, Yongtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.279-286
    • /
    • 2020
  • On February 4, 2020, the Personal Information Protection Act ("Privacy Act") was amended to facilitate the convergence and utilization of data, a key resource of the Fourth Industrial Revolution, and to support the development of the data industry. As the scope of the law applies to telecommunications operators, financial operators, and personal information processing providers, the scope of related dispute settlement is expected to increase. Therefore, this paper first introduces the role and function of the Personal Information Dispute Committee and the institutional standards for personal information dispute mediation, and researches the roles and issues that the Personal Information Dispute Mediation Committee should play in accordance with the revision of the Data 3 Law. In this study, For efficient operation of personal information dispute mediation, expert deliberation by field, new adjustment criteria for new industrial technologies, way to secure business continuity between the Personal Information Dispute Committee and the Personal Information Committee, Secure the link between the mediation decision and courts, and Suggested the strengthening of the operational standards for collective dispute mediation.

A Study on the Effective Countermeasure of SPAM : Focused on Policy Suggestion (불법스팸 방지를 위한 개선방안 : 정책적 제안을 중심으로)

  • Sohn, Jong-Mo;Lim, Hyo-Chang
    • Journal of Industrial Convergence
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2021
  • Today, people share information and communicate with others using various information and communication media such as e-mail, smartphones, SNS, etc. However, it is being used in malicious attacks to send a large amount of illegal spam or to use it for fraud by using illegally collected personal information and devices that are vulnerable to security. Illegal spam, smishing, and fraudulent mail(SCAM) cause a lot of direct and indirect damage to companies and users, including not only social costs such as mental fatigue, but also unnecessary consumption of IT infrastructure resources and economic losses. Although there are regulations related to spam, violators of the law are still on the rise by circumventing the law, and victims are constantly occurring, so it is necessary to review what the problem is. This study examined domestic and foreign spam-related regulations and spam-related response activities, identified problems, and suggested improvement countermeasures. Through this study, it was intended to suggest directions for improving spam-related systems in order to block illegal spam and prevent fraudulent damage.

Features of Administrative Liability for Offenses in the Informational Sphere

  • Iasechko, Svitlana;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Mota, Andrii;Demchyk, Nadiia;Berizko, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.51-54
    • /
    • 2021
  • The article is devoted to the study of the features of administrative liability for offenses in the informational sphere, the definition of the concept and features. Based on the examples of implementation of instruments of European legislation into the national legal system and examples of national legal practice, the authors have identified the features of informational and legal sanctions aimed at restricting the rights of access of subjects to information, prohibiting them to disseminate certain information, restricting the rights to disseminate certain information, and suspending informational activities. It has been substantiated that the administrative liability for informational offenses as a protective legal institution is created to contribute to the solution of such acute problems of legal support of human and society interests in the new informational dimensions.

The extent of the role of internal control of Northern Borders University in maintaining the non-waste of public money

  • Oweis, Khaled Adnan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.187-199
    • /
    • 2021
  • The research aims to measure the control procedures' effectiveness, followed by the University of Northern Borders employees. A questionnaire was developed and distributed to the target sample of financial and auditing affairs employees at the university, where the researcher followed the existing descriptive-analytical approach. The researcher relied on the field survey, and statistical analysis (spss) was used. The researcher has found that the control procedures used are highly efficient in reducing public money waste. The researcher has presented recommendations that may contribute to developing the work of oversight in combating waste of public money. These recommendations include: Increase the interaction between the General Oversight Office and the internal oversight departments at the University of Northern Borders, the incentives provided to the oversight and accounting staff for their efforts to combat public money waste. It encourages them to maintain public money and work to obliging employees to undertake training courses periodically to develop their skills and rehabilitate them in line with modern control procedures. Also, more studies and scientific research on the waste of public money and types of administrative and financial Corruption and the law in all state sectors and reach conclusions and recommendations will help decision-makers amend laws and regulations to serve the public benefit of the university and the state.

Analysis of The Application of Information and Innovation Experience in The Training of Public Administration Specialists

  • Smyrnova, Iryna;Akimov, Oleksandr;Krasivskyу, Orest;Shykerynets, Vasyl;Kurovska, Ilona;Hrusheva, Alla;Babych, Andrii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.120-126
    • /
    • 2021
  • The article analyzes the possibility of using information and innovation experience in training public administration specialists, and also explores the system of training public administration and management specialists abroad. It was determined that in the European Union, Japan and other developed countries, three concepts of qualified personnel training will be developed: the concept of specialized training is focused on the present or near future and is relevant for the respective workplace; the concept of multidisciplinary training is effective from an economic point of view, as it increases intra-production and non-production mobility of an employee; the concept of learner-centered learning with the aim of developing human qualities.

A Study on the System of Private Investigation

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.167-174
    • /
    • 2022
  • Since the Promotion Committee was established on March 25, 2021, urging the enactment of the Detective Business Act, many opinions and attention from all walks of life have been gathered. The Detective Business system, which is also one of the presidential pledges of the current 19th President Moon Jae In, is expected to be significant in that it can promote the development of a welfare state as well as efficient parts such as meeting the demand for security reinforcement services, improving the judicial system, and enhancing internationalization. In accordance with the consensus of the nine judges of the Constitutional Court that the lower part of Article 40 of the "Act on the Use and Protection of Credit Information" which prohibits the use of similar names such as investigating the general life of certain people does not violate the Constitution, detective work became possible regardless of the general life investigation. In particular, the detective job officially appeared on August 5, 2020, and it will be able to provide effective work services to the public by competing with prosecutors, police, and lawyers who have occupied exclusive positions in the field of a criminal investigations. However, although the role of detectives is gradually expanding and society is rapidly changing, illegal activities are prevalent throughout society, and more than 1,600 companies are currently operating suspiciously using the only name of "detectives", but the police are virtually letting go of the situation saying that they are "unauthorized.", and the damage is only going to the people, so at this point, the most worrisome thing is the absence of the law. Meanwhile, amid concerns over institutions overseeing illegal activities caused by the emergence of the detective industry, private security and detectives are similar to each other as in the United States, and it is expected to be able to gain public trust by entrusting the police in charge of managing and supervising private security companies. Therefore, at this time when most OECD countries except Korea legislate the Detective Business Act, prematurely allowing only the detective industry without enacting industry-related laws and systems can further fuel social confusion and hinder the detective industry along with the new fourth industry.

The information process on labor and the protection of information human rights (노동정보처리와 정보인권보호)

  • 하우영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.17-32
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers' side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers' side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals' with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

A Suggestion on the Traffic Flagger System in Japan (일본 교통유도 경비제도의 시사점)

  • Kim, Il-Gon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.200-203
    • /
    • 2010
  • The obstructive factors of the smoothly running traffic are street improvement, major commercial buildings like department stores, the large markets, the stadiums, the concert buildings, a lot of steady cars for using parking lot. The accident of cost many lives and traffic congestion from these factors cause the result that it enables to pay the enormous expenditure socially and financially. For solving these problems, Japan adopts the Traffic Flagger System in 1972. This task has the effects of improving traffic flow in the traffic jam and mitigating risk of car accidents as leading pedestrians and vehicles thereby the task carries into effect in the area where the accident took place. Moreover, this security task is rapid growth after adopting and 59.6%(5,317) of the whole security company 8,924 in Japan based on December 2009 registered as the traffic leading security business. While South Korea is demanded of the measures about obstructive factors of the smoothly running traffic, it represents the limitation of the system and the safety management. Thus the current study suggests the we will analyze South Korea's actual condition and then discuss the law and education system for a realizable plan reached the public-Private cooperation for adopting Japan's Traffic Leading Security System.

  • PDF

Maritime Interdiction against the DPRK's Illicit Maritime Practices (북한의 불법 해상활동에 대한 해양차단에 관한 연구)

  • Kim, Jeong-Soo
    • Strategy21
    • /
    • s.46
    • /
    • pp.29-56
    • /
    • 2020
  • Despite the deep concerns against the DPRK and the harsh sanctions imposed on it, the country renders the sanctions futile by facilitating various illegal trades such as the ship-to-ship transfers of petroleum or coal. Recently, the international community went into paying attention to solve this matter. Among the measures the community can take, "reinforcing the search and inspection of the DPRK related vessels transiting in the high and territorial seas" is the best policy approach to reduce the sanction evasion and provide the international community with considerable bargaining advantages. This measure requires the forceful action by legal enforcement agencies, also known as VBSS. (Visit, Board, Search, and Seizure) It would make the deals prohibited by the UNSCRs (United Nation Security Council Resolutions) less profitable by reducing the expected return on the deals and increasing the cost for them. So, it would make the illegal deals under the table less attractive. The DPRK has been able to render the sanctions futile by exploiting the limitations of the current maritime sanctions. The resolutions are short of being specific about law enforcement, and the PSI (Proliferation Security Initiative) is legally nonbinding. However, if the UNSCRs and the PSI are combined, they can generate a new source of power and exploit the weakness of the DPRK. Noting that the recent UNSCRs stipulated all the legal discussions in the resolutions are confined and applied only to the DPRK, the PSI can target the commercial trade as well as the WMD-related materials in the case of the DPRK's illegal maritime practices. Therefore, the PSI endorsing partners should go beyond mere commitments. They should discuss action plans to implement the maritime interdictions to the extent that they discourage the DPRK and its business partners continuing the illegal activities.

The Devices for Improvement against the Precedents about unfair Transactions in the Security Industries (경비업계에 있어서의 불공정거래의 사례 개선방안)

  • Kim, Tae-Wan
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.37-60
    • /
    • 2006
  • The area of security service has been maintaining the high growth curve annually by improving security consciousness from increase of the income and the progress of public services's level by the accomplishment in the info-communication field, recently the demand for unmanned security system is extended form commercial purposes into public offices and individual's houses. In addition to, the possible distance of offering services is scheduled to magnify. At the period when security company's influence has been becoming significant, the injustice transaction is the serious factor which obstructs the development of security companies. Therefore, it is urgent thing to devise counterplans to extirpate injustice transactions. There are the legalistic approaches of the breakthroughs against injustice transactions. One thing is settling the standard of the judgment and the other is renovating the provision of injustice transactions. Utilizing the principles of the fair competitions and importing self-obedience programs within the range of trade actions which is permitted by law, acted as the system approach. Moreover, there are such three things which can achieve mutual balances as establishing the range of the permitted action toward business corporations, applying spontaneously the fair competition principles and introducing the system of standard agreements. Gong further, this can establish order of security service areas and control them. Besides, it is possible for every organizations to make and operate the system appropriately by importing the self-observance system.

  • PDF