• Title/Summary/Keyword: data protection law

Search Result 183, Processing Time 0.023 seconds

A Study on Integrated Approaching Factors of Environmentally-Friendly Companies Certification Scheme and Environmental Impact Assessment of Korea (환경친화기업지정제도와 환경영향평가제도에서의 통합적 환경관리 요소에 대한 기초적 연구)

  • Hong, Jun-Suk;Kim, Kyu-Yeon;Kwon, Oh-Sang
    • Journal of Environmental Impact Assessment
    • /
    • v.17 no.2
    • /
    • pp.113-124
    • /
    • 2008
  • A worldwide trend of permitting system for industrial installation to achieve a high level of protection of the environment has been moved from single media to multimedia in approach. The Council of the European Community issued the Directive 96/61/EC, the IPPC Directive, concerning integrated pollution prevention and control in 1996. The IPPC Directive is one of the most ambitious legal measures that the European Union (EU) has initiated with a view to applying the prevention principle for industrial activities. The IPPC aims to achieve the integrated prevention and reduction of environmental pollution emitted by those industrial installations with a higher potential of emissions to the environment. Organization for Economic Cooperation and Development (OECD) recommended on Environmental Performance Reviews of Korea in 2006 that IPPC permitting concept should be considered for large stationary sources at the national and regional levels. Any Korean law doesn't provide for integrated pollution control with a single process covering all pollution from economic activities. However, one exception might be the "environmentally-friendly companies" certification scheme, introduced in 1995, in which participants agree to meet targets beyond the legal emission limit values in exchange for government technical and financial support to operate environmental management systems. The other exception might be Environmental impact assessment (EIA) of projects, in 1977, which has been strengthened and reinforced to be more preventive through development of the prior environmental review system (PERS) in 1999. The aim of this work is to introduce the contents of IPPC Directive at the viewpoint of Korea policy and to survey the integrated approaching concept of Environmentally-Friendly Companies (EFC) Certification Scheme and EIA policy of Korea. The study will be helpful in the future to prepare the infrastructure of integrated permitting system and to enforce the integrated permit which the authorities of local government issues on industrial activities. It can be said that the data calculated through both EFC Certification Scheme and EIA will be discussed as worthful information to determine Korean BAT reference notes for integrated permitting process.

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

Korean 'Social Welfare' Delivery System and Its Discourse Relation - Historical Formation, Pathway, and Present Issues - (우리나라 '사회복지' 전달체계와 담론적 작용 - 역사적 형성과 경로, 쟁점 -)

  • Kim, Young Jong
    • Korean Journal of Social Welfare
    • /
    • v.69 no.1
    • /
    • pp.175-197
    • /
    • 2017
  • This study aims to analyze the formation of Korean social welfare delivery system and its pathway, from which the pending issues are to be discussed on the organizations and personnel of the delivery system using the word 'social welfare' with its related discourse. Historical institutionalism is chosen as the perspective to explain path-dependent change and critical juncture, and various legislative data are used as the indicative signals for the discourse of 'social welfare'. The results of the study are as follows. First, the term 'social welfare' began to be institutionalized in Korea by the enactment of Livehood Protection Law(1961). Second, the policies by the year 1987 of expanding social welfare center and introducing social welfare professionals as civil servants form a critical juncture which makes the social welfare discourse realized as the institutional realities. Third, until the year around 2014, the system has not changed in the perspective of macro framework. Fourth, currently the system shows several signs of severe turmoil, which might lead to dismantle the system of 'social welfare' discourse. To conclude, this study shows the possibility of explaining organizations and personnel composing the social welfare delivery system by the usage of discourse analysis, treating it as an analytical entity.

  • PDF

A Study on Home Accidents of Preschool Children (from 1 to 6) in Korea and Prevention Measures (영유소아기 가정사고의 원인과 예방에 관한 연구)

  • 변수자
    • Journal of Korean Academy of Nursing
    • /
    • v.4 no.1
    • /
    • pp.107-120
    • /
    • 1974
  • Necessity and purpose of this study: In a large number of countries it has been founded that children′s domestic accidents are at great risk year by year In the United States, they publish detailed accident statistics at regular intervals. In Korea. there have been just a few studies on Accidents-At-Home of preschool children. But it can not be said that there have been any systematic statistics about this area. and any study accounting for the relations of home accidents and preschool: children in detail, Therefore, the purpose of this thesis was focused on the inquire of these relations so as to make a little contribution to Korean preschool children′s health and security measures. So, the detail-purposes are to study following questions and to testify following hypothesis. Prob. 1. What the types of accidents of Preschool children, where the place accidents occurred\ulcorner Prob. 2. What the cause of accidents and, the main factors of the cause\ulcorner Prob. 3. How about the number of their children. the disparity of age among their children and mother′s age in each case of accidents\ulcorner hypothesis 1. There will be differences in the density of protection of parents according to the number of their children. hypothesis 2, There will be differences in accident-types and first-aid methods according to parents socio-economic background. Method; This study employed the interviewing survey method, in which 130 preschool children ware random.sampled, who visit hospital to have medical care. These children (from 1 to 6 years olds) were selected at the emergency room of five hospitals in Seoul (Hosp: Severance, Woosok, Medical Center, Hanyang Medical College Hospital and Seoul Medical Col1age Hospital during study-period (from Aug. to Oct, 1973). Four head nurses in above Hospitals were employed as accident members for this study. Concerning research analysis, the method of hypothesis verifying is used. Conclusion: As two American experts on this subject. Dr, Raymond Neuter and Mr. Ross Mc Garland have drawn attention to "minor epidemics of accidents" that could be avoided by fairly simple measures. preschool children′s accidents could be avoided by parents fair attentions. In other words, one of the most common causes of preschool children′s accidents derived from their parent′s inattention. Therefore, one important task on this subject is to instruct the parents fairly about the children′s accidents. Many accidents could be avoided by the exorcist of a little self-discipline. Also, as much the prevention of accidents is important, as the first-aid Is Important and necessary at the case of the accidents. So, the methods of proper first-aid treatment must be emphasized, and must be taught in school, especially in girls school. And there could be other means available for prevention of accidents. Firstly, the public authorities can take legal measures. More stringent safety standards can be made enforceable by law. Building materials and equipment for domestic us: ought to meat minimum safety criteria at all times. Next the public itself has to understand the seriousness of the problem, and here the dissemination of information is of great importance. All mass media should be brought into play to promote greater public awareness of the question. At last, it will be needed to obtain more detailed epidemiological data through additional surveys and statistics after this study.

  • PDF

A Study on Lawsuit Cases and Measures of Emergency Medical Service (응급의료서비스 중 발생되는 소송사례와 대책 연구)

  • Kwon, Hay-Ran
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.3
    • /
    • pp.77-90
    • /
    • 2009
  • Civil complaints and lawsuits filed in the process of providing emergency medical service include fall accident on the way of carrying the patient, transfer consent, refusal and rejection of rescue request, range and behavior restriction of emergency medical technicians, false registry of logbook, neglect of duty and emergency patient, and violation of traffic laws on the way of dispatch to the scene of accident. This study suggested the measures by cases as follows. 1. The accidents on the way of carrying a patient could be divided into fall of patient and fall by paramedic's mistake. In the former case, damages caused by the ambulance's shaking must be notified to the patient and guardian and recommended to fasten seat belt, in the latter case, the plan of patient's posture, route of transport, rescue and equipments should be comfirmed before fixing the patient. 2. Transfer consent must be made as implied when the patient is unconscious under delusion and was not able to consent physically, and paramedic must take an action by his judgment and record details of services on logbook. 3. When a patient refused to transfer, get 'confirmation of transfer refusal' and inform him of refusal. Paramedic should receive the signature. In addition, in case of refusal, transfer request should be made after hearing doctor's opinion and it should be notified to transfer request and superintendent of fire station after making 'confirmation of transfer refusal'. 4. Emergency medical technicians should perform their duties within the range of services prescribed by Article 41 of Law of Emergency Medical Service and Article 33 of Its Enforcement Regulations and shall not make announcement of death. In case of reporting the death to guardian, it is desirable to use record data like ECG results. 5. The best way to have protection from legal problems is making and keeping the exact records of accident and patient. Paramedic should not mention his subjective opinion about the accident-related matter. He must record correctly and keep the original medical records. 6. As emergency medical technicians are responsible for taking care of emergency patients, they must contact a briefing room when they meet a difficult situation suddenly due to vehicle stop or treatment of other patients and then must have support from neighboring hospital and other safety centers. 7. Since the ambulance operator is responsible for safety and careful driving of ambulance, he must be careful when he violates traffic regulations unavoidably. The operator should drive slowly below 10km/h at an intersection and pass it after getting way from general vehicles driving from all directions.

  • PDF

A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA (FTA 체결에 따른 금융정보 국외이전에 대한 정책적 대응방향 연구)

  • Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.117-130
    • /
    • 2011
  • In a situation where worldwide free trade between countries has expanded recently, our country is being rapidly pushed FTA agreements with the financial developed countries such as United States, EU. According to the agreement, the user information of foreign financial companies in Korea is expected to be transfered overseas. In this paper, we need to define the scope and the definition about the transfer of information and analyze the relating domestic and foreign laws preparing for Cross Border Financial Information Transfer. Also, we review the expected issues about the transfer of information divided into institutional and technical sectors and arc presented the policy implication such as differentiation of regulatory information, enactment and amendment of Personal Information Protection Law(Draft) and related regulations, ensuring the safety of financial companies, raise the standard guidelines of the transfer of information. We refers to the needs for policy formulation to differentiate our privacy information from financial information to protect the privacy of users. The proposed countermeasures in this paper is expected to be helpful the measures to prepare for other institutions such as banks and supervisory authorities prepare for the future Cross Border Financial Information Transfer according to PTA.

The Present Status of and Development Plans for Legal Technology in the Fourth Industrial Revolution (4차 산업혁명시대 법정보기술의 현황과 발전방안)

  • Lee, Sung-Jin;Lee, Yeon-Ju;Son, Hyoung-Kun;Kim, Gi-Bum
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.3-21
    • /
    • 2021
  • Klaus Schwab's discussion on the Fourth Industrial Revolution provides a framework for predicting the direction of legal technology development. Technological convergence, which has emerged as the core concept of the Fourth Industrial Revolution has a significant effect on legal technology. In particular, various new technologies, such as legal chatbots and platforms, are being introduced to enhance efficiency and accessibility in the legal field. However, legal technology is still in its early stage, with institutional improvement needed to vitalize the industry. In this paper, we first specify the concept and classification of legal technology in Chapter 2, followed by trends and limitations in Chapter 3 and ways of vitalizing legal technology in the future in Chapter 4. To invigorate legal technology development, it is necessary to put in place legal regulatory measures that stipulate the active disclosure of legal data, such as precedents, and make free use of such measures. In the law, many issues, such as the safety of artificial intelligence, personal information protection, and ethical standards, will be discussed in the future. Therefore, via this paper, we hope to promote the formation of social consensus and prepare countermeasures, such as legislative measures.

A Study on the Performance Model and Measurement Method of the SMEs Information Security Support Policy (중소기업 정보보호 지원 사업 성과모델 및 측정 방법에 관한 연구)

  • Bae, Young-Sik;Jang, Sang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.37-52
    • /
    • 2021
  • Due to the spread of COVID-19, it is rapidly changing from face-to-face to non-face-to-face work environments and is changing to a digital work environment that can be accessed anytime, anywhere, providing convenience to all lives. However, the number of breaches, personal information leakage, and technology leakage targeting SMEs that are vulnerable to security continues to increase. Accordingly, the government has been continuously promoting the information security consulting support project for SMEs every year since 2014. Therefore, this study intends to develop a performance model and measurement methodology for continuous and more systematic support and efficient management of information protection support projects in consideration of the importance of information security for SMEs. It is intended to be used as basic data when setting future operational directions and goals. The main method of this study is to derive performance models and indicators for SME information security support projects based on domestic literature, case studies, and survey results, utilize expert advice to verify the developed performance measurement indicators, and use pilot-test questionnaires. Conduct evaluation through surveys. Based on the verified indicators, we would like to present a performance model and measurement index for the information security support project for SMEs.

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF