• Title/Summary/Keyword: personal rights

Search Result 208, Processing Time 0.026 seconds

A Case Study for Improvement of Users' Right to Informational self-determination: Focusing on the GDPR of EU and the CCPA of California, USA (국내 기업의 개인정보 자기결정권 강화를 위한 논의: EU의 GDPR과 미국 캘리포니아주의 CCPA를 중심으로)

  • Yoon, Young-Ho;Yoon, Hyun Shik
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.65-103
    • /
    • 2019
  • Purpose The purpose of this study is to find out in extent to which the companies in Korea and oversea, which has been subjected by different laws of their country, have guaranteed the personal information rights and have provided proper 'right to access' to the information subjects. Design/methodology/approach This study compared Korean laws with 'General Data Protection Regulation (GDPR)' of EU and 'California Consumer Privacy Act (CCPA)' to check each of the level of 'right to access' guarantee. In terms of the difference in guaranteeing the right, this study compared Korean IT leading companies with US global leading IT companies to find out how much 'right to access' are properly implemented in their policies and functions they provide. Findings The result of the study shows that 'right to access' has not been well guaranteed by Korean law, as it does not provide the right to choose method and medium by information subjects and does not clarify the types of diverse information. This was clearly opposite with the other laws providing the right to choose what method and medium that subjects want with clarifying every types of personal information possible to be more. In addition, 'right to access' has not been well guaranteed by Korean companies in comparison with by the oversea companies which proactively guarantee the right by setting the function enabling subjects to browse their information through their websites or applications.

A Proposal of Methods for Building Databases about the Accumulation of Disuse Utilizing the Political System to Discard Private Information According to the Expiration of In-service Life and Observation of Legal Standards (보존연한 도래 및 법적기준 준수를 위한 개인정보 정책적 폐기시스템을 활용한 폐기 누적현황 데이터베이스 구축에 관한 방안 제안)

  • Seo, Wooseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.45-53
    • /
    • 2018
  • The Personal Information Protection Act has been revised continuously since its establishment, and as a way to secure stability properly, the guidelines as well as enforcement ordinances and regulations have been changed, too. It seems that people's recognition and awareness of private information have already evolved to a certain level that is regarded to be fairly high. However, no one can exactly imagine how much ripple effect scrapping discarded paper regarded simply as waste material which is often and easily practiced in our everyday lives exerts and how many socially significant events it may arouse in our lives. Private information is produced, operated, preserved, utilized, distributed within the frame of law unidentified, and then discarded with a particular purpose. While going through a series of processes, each piece of that private information comes to be reproduced melting a lot of information. It is used and also changed beneficially sometimes to richen our lives or as basic material for welfare. Meanwhile, its importance is decided by its weight or mass and then often gets discarded after all. It means that the process of disuse is being done in a way to arouse the possibility of invasion of personal rights and also the second and third and also more exposure of private information. Therefore, approaching the meaning of automation politically, this study aims to suggest how to secure stability in the process of discarding private information in terms of logical automation.

GDPR Compliant Blockchain Based Access Control(GCBAC) (GDPR 준수 가능한 블록체인 기반 접근제어 시스템)

  • Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.981-997
    • /
    • 2020
  • Blockchain technology can provide a high level security based on a decentralized distributed ledger and consensus-based structure. In order to increase the utilization of blockchain technology, it is necessary to find a way to use it in fields that require personal data processing such as health care and e-commerce. To achieve this goal, the blockchain based system should be able to comply with data privacy regulations represented by European Union(EU)'s GDPR(General Data Protection Regulation). However, because of the properties of the blockchain like the immutability and decentralized recorded data, it is difficult to technically implement the requirements of the existing privacy regulations on the blockchain. In this paper, we propose a multi-chain based access control system that can guarantee the rights of the personal data subject required by GDPR by utilizing Chameleon Hash and Attribute Based Encryption (ABE). Finally, we will show through security analysis that our system can handle personal data while maintaining confidentiality and integrity.

A System of Software Asset Management in Company using the Server (서버를 이용한 사내 소프트웨어 자산관리 시스템)

  • Lee, Young Gyo;Park, Jin Kyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Illegal software use have been abroad through online (internet) and offline (CD, DVD, USB, etc.). It infringes intellectual property rights and weakens the will to software development. Also, it generates the software errors and virus intrusion in PC. It hinders national software industry and induces the personal and national trade friction. Many group (company, office, organization, institution, etc.) have been realized the prohibition of illegal software use. But, it is too hard to monitor and control illegal software use. In this paper, we propose a method of software management in a group. A software module of client agency is installed in all PC of the group. A main server of the software management controls the all of the PC through the communication. The server blocks the install of illegal software, permits the install / use of honest goods software, monitors the license (term, amount) in all the PC. The system prevents errors of illegal software use, all cuts the virus intrude through the illegal software, improves the performance of PC relatively.

A Study on the Traits of Multicultural Society of Rural Areas in Korea (한국농촌의 다문화사회의 특징)

  • Lim, Hyung-Baek;Lee, Seong-Woo;Kang, Dong-Woo;Kim, Mi-Young
    • Journal of Agricultural Extension & Community Development
    • /
    • v.16 no.4
    • /
    • pp.743-773
    • /
    • 2009
  • The objectives of this study were to study multicultural society of rural areas in Korea. USA immigration law permits permanent settlement but Korea immigration law prohibits permanent settlement. USA adopted the territorial principle but Korea adopted the personal(nationality) principle. So a large number of people immigrated and settled in USA and mass(collective) immigrants is usual in USA. But foreign workers(temporary immigration) and international marriage women(individual immigrants) is usual in Korea. According to the positive law, foreign workers cannot settle down in Korea. So international marriage women immigrants are main cause of multicultural society in rural areas in Korea. This is the particularity of multicultural society in rural areas in Korea. So it is necessary to differentiate multicultural society policy according to areas and residents. Many peoples see multicultural society from a point of view of human rights and welfare. But it is also necessary to see multicultural society from a point of view of economic and policy.

  • PDF

Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device (모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호)

  • Kwon, Goo Rak;Kim, Young Ro
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.

Dynamic Device Management Scheme for Rights Object Sharing in the Personal Private Networks (개인 정보 네트워크에서의 권한 정보 공유를 위한 동적 디바이스 관리 기법)

  • 장경아;이병래
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.679-681
    • /
    • 2003
  • 개인 정보 네트워크는 근거리 무선 통신을 기반으로 구성된 디바이스간 정보 공유 및 무선인터넷의 확장으로 디지털 컨텐츠 교환의 활성화가 예상되고 있다. 본 논문에서는 무선 및 휴대용 디바이스의 한계적 계산 능력과 불안정한 대역폭 및 기존 네트워크 환경과의 확장을 고려한 표준화 논의 내용을 기반으로 DRM 관련 권한 정보 공유를 위한 개인 정보 네트워크 내의 동적 디바이스 관리 기법을 제안하였다. 제안한 기법은 개인 정보 네트워크를 구성하는 사용자 디바이스의 성능을 고려하여 Proxy를 통한 Store/ Forward 서비스 구조를 기반으로 기존 유무선 네트워크의 컨텐츠 제공자 및 권한 제공자와의 서비스를 수행하도록 하였으며, Proxy에 그룹 키 관리 기능을 구성하여 개인 정보네트워크 내의 권한 정보 공유를 위한 디바이스의 참가 및 탈퇴를 관리하도록 하였다.

  • PDF

Analysis of Anti-SPAM Regulations in Korean IT Law (정보통신망법 스팸 규제 개선 방안 연구)

  • Kim, Seongjun;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2011
  • Spam refers to any unwanted or unauthorized commercial messages. Spam may violate individuals' privacy or other personal rights. Spam often overloads network traffic, wastes individuals' time, lowers productivity and quality of life, and limits the trustworthiness of Internet businesses. As the use of mobile messaging services and social networking services both on mobile communication networks and on the Internet increase, newer and more complex types of IT applications and services are often used as new means of spam. In this research, the characteristics and impact of new and future forms of spam, and anti-spam related policies and regulations are surveyed. To improve the effectiveness of anti-spam policies and regulations in Korea, adding a definition of spam in the law, changing policies to focus on the 'type of services' rather on the medium of transmission, and redefining the scope of 'commercial purposes' in Korean law are suggested.

Concept Analysis of Rehabilitation Motivation in Patients with Rheumatoid Arthritis (류마티스 관절염 환자의 재활동기에 대한 개념분석)

  • Lee, Eun Nam;Kong, Kyoung Ran
    • Journal of muscle and joint health
    • /
    • v.25 no.3
    • /
    • pp.240-249
    • /
    • 2018
  • Purpose: This study was to identify the attributes, antecedents, their consequences, and empirical indicators of rehabilitation motivation in rheumatoid arthritis patients. Methods: Walker and Avant's method was used to analyze the concept. Articles published after 1990 were searched in Medline, CINAHL, NSDL, and RISS databases using "rehabilitation", "motivation" and their combination as keywords. Results: The attributes of rehabilitation motivation are: 1) certitude and trust toward rehabilitation treatment; 2) confidence in the rehabilitation process; 3) efforts and commitments to achieve health goals; 4) psychological needs to act toward health recovery. Its antecedents include: 1) rights of self-determination; 2) goal setting and goal-oriented attitude; 3) personal needs; 4) getting rewards; 5) social and family support; 6) professional behavior of healthcare providers; and 7) least risks or costs for actions taken. Conclusion: The study results could be used as a conceptual framework for developing tools to measure the motivation of rheumatoid arthritis patients.

Principles and Conceptual Framework for the Introduction of Korean Sickness Benefit (한국형 상병수당 도입을 위한 제도 설계의 원칙과 개념적 틀)

  • Kang, Hee-Chung
    • Health Policy and Management
    • /
    • v.31 no.1
    • /
    • pp.5-16
    • /
    • 2021
  • Both access to healthcare services and income security in case of personal illness are being needed to achieve universal health coverage, which is enshrined in the human rights to health and social security and international standards on social protection. Income security acts on both the social determinants and the adverse consequences of ill health and thus would break the vicious disease-poverty cycle. The government is supposed to implement a demonstration project of sickness benefit in 2022 and to publicize its more specific blueprint for all workers. This study is to suggest basic principles and a framework to design a new sickness benefit for universal health coverage, which is based on reviews on previous studies, related issues, and institutional conditions. This is to provide a theoretical basis to promote further discussion and to support its decision-making.