• Title/Summary/Keyword: privacy rights

Search Result 122, Processing Time 0.029 seconds

Problems and Improvement of Privacy Impact Assessment (개인정보영향평가의 문제점과 개선방안)

  • Choi, Young-hee;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.973-983
    • /
    • 2016
  • It's been almost 6 years since PIA was implemented based on legislation. So I analyzed problems of PIA from the perspective of ITSM 3 elements. I mainly took account of quality improvement of the report when I assessed systems processing personal informations. So, I propose in terms of logical validity improvement of assessment report. The improvements on 4 different outputs for each phase are many cases that I assessed systems processing personal informations. And I propose improvements on qualified assessors having capability of GRC and on process for managing the assessment system. To settle down PIA system as the reasonable and effective assessment system even after 2016, the statutory deadline for completion of PIA, assessors and appointed assessment firms and authorities should cooperate to complete the assessment system.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

Legal Issues In Information Management (정보관리와 관련된 법적문제)

  • Lee Soon Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.19
    • /
    • pp.23-61
    • /
    • 1990
  • Libraries and information centers are no different from any other institutions in our society. Today, their managers have to make many more decisions which have certain legal implications than before. The ignorance of the law on their parts can not be an acceptable excuse anymore, since. the consequences sometimes maybe quite serious. This paper outlines some important legal issues involved in the services and management of libraries and information centers. They are: constitutional rights on human knowledge activities: library act and it's related laws; censorship and right to know; information access and the protection of privacy: library services and copyright law; labor relations; protections of the people and properties of the institutions, etc. The laws are not static: rather, they change with the social, political and technological environments. The managers, as well as the staff members of libraries and information centers should be constantly updated with the changes in the field, in order to give the maximum service to the clients and to prevent any infringement of the laws, which may discredit their services and the institutions.

  • PDF

Design of User Data Management System for Grid Service (그리드 서비스를 위한 사용자 데이터 관리 시스템 설계)

  • Oh, Young-Ju;Kim, Beob-Kyun;An, Dong-Un;Chung, Seung-Jong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.224-226
    • /
    • 2005
  • Grid computing enables the fundamental computing shift from a localized resource computing model to a fully-distributed virtual organization with shared resources. In the grid computing environment, grid users usually get access rights by mapping their credential to local account. The mapped total account is temporally belongs to grid user. So, data on the secondary storage, which is produced by grid operation, can increase the load of system administration or can issue grid user's privacy. In this paper, we design a data management system for grid user to cover these problems. This system implements template account mechanism and manages local grid data.

  • PDF

Social Media Data Analysis Trends and Methods

  • Rokaya, Mahmoud;Al Azwari, Sanaa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.358-368
    • /
    • 2022
  • Social media is a window for everyone, individuals, communities, and companies to spread ideas and promote trends and products. With these opportunities, challenges and problems related to security, privacy and rights arose. Also, the data accumulated from social media has become a fertile source for many analytics, inference, and experimentation with new technologies in the field of data science. In this chapter, emphasis will be given to methods of trend analysis, especially ensemble learning methods. Ensemble learning methods embrace the concept of cooperation between different learning methods rather than competition between them. Therefore, in this chapter, we will discuss the most important trends in ensemble learning and their applications in analysing social media data and anticipating the most important future trends.

The Video Mosaic Streaming Service Design for Privacy Protection (개인정보 보호를 위한 영상 모자이크 스트리밍 서비스 설계)

  • Eun-Gyeom Jang;Young-Gi Heo;Ho-Geun Byeon;Jeong-Min Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.431-432
    • /
    • 2023
  • 본 연구는 초상권을 보호할 수 있는 실시간 영상 모자이크 서비스이다. 실시간 모자이크 서비스에서는 모자이크 처리를 제외하기 위한 이용자 얼굴 등록 기능을 갖고 있다. 이렇게 등록된 얼굴정보는 실시간 영상 스티리밍 서비스에서 모자이크가 되지 않도록 한다. 즉, 모자이크를 원하지 않는 정보를 미리 시스템에 등록하여 실시간 서비스에 어떠한 부분을 모자이크에서 제외 할 것인지 세팅하여 실시간 스트리밍 서비스를 제공한다. 기존 기술과의 차이점은 사람의 얼굴뿐만 아니라 방송에 나오면 안 되는 흉기나 담배 등을 모자이크 처리해 줄 수 있는 기능을 제공하고, 실시간으로 모자이크된 영상 스트리밍 서비스를 제공할 수 있는 장점을 갖는다.

  • PDF

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

A Study on the Conflict Between the Call for Journalists' Phone Records and the Shield Law: Focusing on the Review of Paragraph 2, Article 13 of the Act of Protection of the Secrecy of Correspondence (기자의 통화내역 조회와 취재원 보호 간의 갈등: 통신비밀보호법 제13조 제2항 논의를 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.25
    • /
    • pp.103-133
    • /
    • 2004
  • Korean citizens enjoy not only the freedom of communication but also the secrecy of electronic communication. Article 18 of the Constitution of the Republic of Korea prescribes that the secrecy of correspondence should not be infringed. Namely, all citizens enjoy guaranteed privacy of correspondence. But many people have been experiencing the infringement of those rights. The purpose of this paper is to evaluate whether Paragraph 2, Article 13 of the Act on Protection of the Secrecy of Correspondence infringes on the constitutional rights of privacy of electronic communication. The results of this study indicate that the law violates the Constitution. Paragraph 3, Article 12 (Personal Liberty, Personal Integrity) of the constitution stipulates that "Warrants issued by a judge through due process (upon the request of a prosecutor) have to be presented in case of arrest, detention, seizure, or search." However, prosecutors, the police, and National Intelligence Service have made numerous inquiries calling for the journalists' telephone records without warrants issued by a judge. So, this study suggests that the paragraph should be amended to be compatible with the Constitution. Meanwhile, journalists should make a more concerted effort to protect their news sources in exercising constitutionally protected freedom of the press.

  • PDF

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.