• Title/Summary/Keyword: data protection law

Search Result 183, Processing Time 0.025 seconds

Meanings and Tasks of the Three Revised Bills which Ease Regulations on the Use of Personal Information (데이터 3법 개정의 의미와 추후 과제)

  • Kim, Seo-An
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.59-68
    • /
    • 2020
  • In January 2020, the National Assembly passed the revisions of three bills which ease regulations on the use of personal information. The revised laws include the launch of an independent supervisory body, the arrangement of redundant regulations, and regulations for the development of the data economy. This paper analyzes the content and meaning of each law of the Three Revised Bills that Ease Regulations on the Use of Personal Information. And the future challenges outline three aspects: the establishment of a system to ensure the right to informational self-determination of privacy concerns, the establishment of a certification system and the presentation of reasonable guidelines, and the expectation of professional performance by the Personal Information Protection Commission.

The Measurement of Flash Point for Binary Mixtures of 2,2,4-Trimethylpentane, Methylcyclohexane, Ethylbenzene and p-xylene at 101.3 kPa

  • Hwang, In Chan;In, Se Jin
    • Clean Technology
    • /
    • v.26 no.4
    • /
    • pp.279-285
    • /
    • 2020
  • Laboratories and industrial processes typically involve the use of flammable substances. An important property used to estimate fire and explosion risk for a flammable liquid is the flash point. In this study, flash point data at 101.3 kPa were determined using a SETA closed cup flash point tester on the following solvent mixtures: {2,2,4-trimethylpentane + methylcyclohexane}, {2,2,4-trimethylpentane + ethylbenzene}, and {2,2,4-trimethylpentane + p-xylene}. The purpose of this work is to obtain flash point data for binary mixtures of 2,2,4-trimethylpentane with three hydrocarbons (methylcyclohexane, ethylbenzene, and p-xylene), which are representative compounds of the main aromatic hydrocarbon fractions of petroleum. The measured flash points are compared with the predicted values calculated using the GE models' activity coefficient patterns: the Wilson, the Non-Random Two-Liquid (NRTL), and the UNIversal QUAsiChemical (UNIQUAC) models. The non-ideality of the mixture is also considered. The average absolute deviation between the predicted and measured lower flash point s is less than 1.99 K, except when Raoult's law is calculated. In addition, the minimum flash point behavior is not observed in any of the three binary systems. This work's predicted results can be applied to design safe petrochemical processes, such as identifying safe storage conditions for non-ideal solutions containing volatile components.

Policy Suggestions on Personal Data Utilization by Analyzing Domestic and International De-identification Policy (국내외 비식별화 현황 분석을 통한 개인정보 활용 정책 제언)

  • Kang, Hye-young;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.41-48
    • /
    • 2019
  • In the era of Internet of Things and Artificial Intelligence, it has become essential to digitize mass data, which leads 'data-driven economy'. Digitalized personal data can be easily collected, stored, duplicated and analyzed. As ICT technology is evolving the concept of traditional personal data has changed. The United States, the European Union, Japan, Korea and many countries have introduced new concept of personal data into law such as de-identification, anonymization, and pseudonymization to protect and utilize digitalized personal information. These concepts are distinguishable depending on countries. Therefore, this study will be done by researching and analyzing personal data related policies of several countries. Based on this study, this paper will suggest policy on di-identification to draw the right balance between personal data protection and use, which contributes to the development of digital economy.

Recent Developments in Law of International Electronic Information Transactions (국제전자정보거래(國際電子情報去來)에 관한 입법동향(立法動向))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.155-219
    • /
    • 2004
  • This paper focuses on two recent legislative developments in electronic commerce: the "Uniform Computer Information Transactions Act" ("UCITA") of USA and the "preliminary draft convention on the use of data message in [international trade] [the context of international contracts]" ("preliminary draft Convention") of UNCITRAL. UCITA provides rules contracts for computer information transactions. UCITA supplies modified contract formation rules adapted to permit and to facilitate electronic contracting. UCITA also adjusts commonly recognized warranties as appropriate for computer information transactions; for example, to recognize the international context in connection with protection against infringement and misappropriation, and First Amendment considerations involved with informational content. Furthermore, UCITA adapts traditional rules as to what is acceptable performance to the context of computer information transactions, including providing rules for the protection of the parties concerning the electronic regulation of performance to clarify that the appropriate general rule is one of material breach with respect to cancellation (rather than so-called perfect tender). UCITA also supplies guidance in the case of certain specialized types of contracts, e.g., access contracts and for termination of contracts. While for the most part carrying over the familiar rules of Article 2 concerning breach when appropriate in the context of the tangible medium on which the information is fixed, but also adapting common law rules and rules from Article 2 on waiver, cure, assurance and anticipatory breach to the context of computer information transactions, UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, UCITA contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context. The UNCITRAL's preliminary draft Convention applies to the use of data messages in connection with an existing or contemplated contract between parties whose places of business are in different States. Nothing in the Convention affects the application of any rule of law that may require the parties to disclose their identities, places of business or other information, or relieves a party from the legal consequences of making inaccurate or false statements in that regard. Likewise, nothing in the Convention requires a contract or any other communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract to be made or evidenced in any particular form. Under the Convention, a communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract, including an offer and the acceptance of an offer, is conveyed by means of data messages. Also, the Convention provides for use of automated information systems for contract formation: a contract formed by the interaction of an automated information system and a person, or by the interaction of automated information systems, shall not be denied on the sole ground that no person reviewed each of the individual actions carried out by such systems or the resulting agreement. Further, the Convention provides that, unless otherwise agreed by the parties, a contract concluded by a person that accesses an automated information system of another party has no legal effect and is not enforceable if the person made an error in a data message and (a) the automated information system did not provide the person with an opportunity to prevent or correct the error; (b) the person notifies the other party of the error as soon as practicable when the person making the error learns of it and indicates that he or she made an error in the data message; (c) The person takes reasonable steps, including steps that conform to the other party's instructions, to return the goods or services received, if any, as a result of the error or, if instructed to do so, to destroy such goods or services.

  • PDF

Technique of Range Query in Encrypted Database (암호화 데이터베이스에서 영역 질의를 위한 기술)

  • Kim, Cheon-Shik;Kim, Hyoung-Joong;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.22-30
    • /
    • 2008
  • Recently, protection of personal information is getting more important. Many countries have legislated about the protection of personal information. Now, the protection of relevant personal information is required not for a simple image of enterprises but law obligation. Most databases in enterprises used to store customers' names, addresses and credit card numbers with no exceptions. The personal information about a person is sensitive, and this asset is strategic. Therefore, most enterprises make an effort to preserve personal information safely. If someone, however, hacks password information of DBMS manager, no one can trust this system. Therefore, encryption is required based in order to protect data in the database. Because of database encryption, however, it is the problem of database performance in terms of computation time and the limited SQL query. Thus, we proposed an efficient query method to solve the problem of encrypted data in this paper.

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

Experiments on the Submarine Cable Protection Methods Considering the Connection Type (체결형상을 고려한 해저케이블 보호공법에 관한 실험)

  • Yoon, Jae Seon;Ha, Taemin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.329-329
    • /
    • 2017
  • In this study attempted to evaluate the stability of the protection methods by examining hydraulic characteristics of the area around the point in which marine cable protector is installed such as surf zone occurrence point of shore-end submarine cables suitable for coastal marine environmental conditions, flow rate t the tope of the protector and maximum wave height, and to provide basic data for the selection of the optimal protection method. In performing hydraulic model experiments, the topography of submarine cable installation location was reproduced in 2-D sectional channel, and models appropriate for experimental scale and similitude law were produced and installed for each condition of submarine cables and protectors. Since the topography and submarine cable protectors were reproduced and installed in 2-D sectional channel, the exact reproduction of surf and transformation in shallow water zone was possible, and thus the physical properties could be clearly analyzed. For stability review, an experiment to examine the stability was conducted using a wave maker with 50-year frequency design waves as target, and wave height and cycles were applied based on the approximate lowest low water level(Approx. L.L.W), which is the most dangerous in submarine cable protection methods. As for experimental time, typhoon passing time in summer (about 3 hours) was applied, and wave patterns and deviation ratio of the submarine cable protector were investigated after making irregular waves corresponding to design waves. In addition, current meter and wave height meter were installed at the installation location of the submarine cable protector, and the flow rates and wave height at the top of the protector were measured and analyzed to review hydraulic properties.

  • PDF

Study of the Introduction on the Aviation Safety Data Protection System (항공안전데이터 보호제도 도입 방안 연구)

  • Kim, Eun-jung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.1
    • /
    • pp.81-120
    • /
    • 2018
  • To promote the aviation safety reporting system that is operated to enhance aviation safety and to utilize related information, it should first be preceded by standards for non-punishment and data protection. It is because the purpose of collection and analysis of aviation safety related data through the aviation safety reporting system is to prevent recurrence of accidents by investigating their causes through collection and analysis of diverse types of information related to aviation safety. Both mandatory and voluntary reporting systems are in operation for aviation safety under the current Aviation Safety Act. It is said that they were introduced to survey causes for accidents and to prevent recurrences. In fact, however, it is hard to expect active implementation of the reporting system for aviation safety unless the reporters are firstly exempted from punishment. Therefore, the system should be improved so that it can satisfy its purpose and the purposes of data collection concerning aviation safety through examination of the purposes of the reporting system. One of the matters that needs to be considered to promote the reporting system should be the scope of aviation safety hindrances presupposed under the current institution. The voluntary aviation safety reporting system differs from the systems of ICAO or the key advanced countries, including the USA and the UK as it limits the target accidents subject to reporting to minor aviation safety hindrances only. That being said, improvements should be made by requiring mandatory reporting of aviation safety hindrances based on their severity while recognizing a greater variety of aviation safety concerns like international standards. Safety actions and sharing of information based on collection and analysis of diverse data related to aviation safety will greatly contribute to enhance aviation safety as the purposes of the reporting system are to explore causes for accidents and to prevent their recurrences. What is most important in this regard is strict data protection and non-punishment principles; compliance with them should be secured. We can hardly expect the successful operation of the system unless the reporter is exempted from punishment and the relevant data is protected as promotion of voluntary reporting is an essential factor for enhancing the safety culture. Otherwise, the current system may induce hiding of relevant facts or data to evade punishment. It is true that the regulation for enhancing safety tends to have limitations or blind spots; nevertheless, it should still be enforced strictly and completely. Technological progresses and mistakes of operators appear in different forms based on individual cases. The consequential damages may amount to a truly severe level. Therefore, we have studied and suggested to the methods of activiation and amendments on the aviation safety reporting system, which is referred for one of the proactive safety management systems. The proposed improvement of the reporting system and introduction of non-punishment for collection of aviation safety data for deploying a preemptive prevention system would serve as the backbone for enhancing aviation safety in Korea.

Legal and Institutional Improvement Tasks for Utilizing Mydata in the Transportation Sector for NetZero (탄소중립을 위한 교통분야 마이데이터 활용의 법제도적 개선 과제)

  • Ji-Yeon Lee;Min-Ji Koh;Seung-Neo Son
    • Industry Promotion Research
    • /
    • v.9 no.1
    • /
    • pp.47-55
    • /
    • 2024
  • In the transportation sector, reducing total vehicle mileage and passenger vehicle traffic are proposed as strategies to achieve carbon neutrality. To achieve this, MaaS services must be actively promoted with the goal of revitalizing public transportation. In order to promote MaaS, individual movement data is required, such as the individual's means of movement, route, and conversion of the individual's means of use. However, in Korea, there are legal limitations in collecting and utilizing data on individual movements. As the right to request transmission of personal information was newly established in the revised Personal Information Protection Act in 2023, a law was established to collect and utilize data on individual movements. However, enforcement ordinance, detailed rules, instructions, guidelines must be prepared, and the standardization of data format and transmission system for collecting my data needs to take precedence.

Can a securities law improve investor rationality in processing earnings information?

  • Kwag, Seung Woog
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.6
    • /
    • pp.1557-1567
    • /
    • 2014
  • In this paper, I propose a general hypothesis that after the enactment of the Sarbanes-Oxley Act (SOA) financial statements convey more accurate and reliable corporate information to investors who in turn reflect such improvements in stock prices and test four practical hypotheses that simultaneously feature the degree of information asymmetry, forecast bias, and investor reaction to biased earnings information. The empirical results unanimously suggest that the post-SOA investors take advantage of the improvement in informational efficiency and accuracy and actively adjust for analyst forecast bias in earnings forecasts. The SOA indeed appears to achieve its primary goal of investor protection.