• Title/Summary/Keyword: safeguards

Search Result 185, Processing Time 0.027 seconds

Legal Study on the Provision of Financial Services Professionals and the Policy Implication for Korea -Based on the UK Financial Services and Markets Act Systems- (전문직종사자의 금융서비스 제공에 관한 법적 고찰과 국내 시사점 -영국 금융서비스 및 시장법 체계를 바탕으로-)

  • Park, Tae-Jun;Park, Chang-Wook
    • Management & Information Systems Review
    • /
    • v.35 no.3
    • /
    • pp.81-93
    • /
    • 2016
  • UK "FSMA" provides a safe harbour for members of professions, which are lawyers, accountants, and actuaries in their provision of certain financial services, despite the general prohibition, the professions carry on exempt regulated activities. In particular, DPBs(designated professional bodies), which professional bodies are designated by the Treasury, must have rules and have to supervise and regulate their members those activities by rules. Also, the FSA must keep itself informed about the role of DPBs, and may make directions concerning the safe harbour in relation to particular classes of persons of different descriptions of regulated activities. On the other hand, Korea "FSCMA" explicitly except provision of financial services by professions to investment adviser without regard to mainstream financial services activities or incidental activities. Under "FSMA", if the professions conduct provision of financial services as mainstream activities, they must be authorized person and even if their activities is incidental, they have to comply with exemption sections. Therefore, there is a need of prepare the legal safeguards about provision of financial services by professions for the investor protection.

  • PDF

The Analysis of Content Regulation on Social Network Service(SNS): Focusing on the Problem of Legal and Administrative Regulation (표현매체로서 SNS(Social Network Service)에 대한 내용규제의 문제점 분석: 법률적.행정적 규제를 중심으로)

  • Hwang, Yong-Suk
    • Korean journal of communication and information
    • /
    • v.58
    • /
    • pp.106-129
    • /
    • 2012
  • Social Network Service(SNS), which are an emerging form of political architecture, have been a political means to promote civic engagement and shape pubic opinions on social issues. Along with the influence of SNSs, the governmental control on the dissemination of information over SNSs has increased more and more. It would be ideal if the autonomous governance regulates SNSs which facilitate the networks of the dispersed people. It is the fact, though, that compulsory regulations under which the government controls impose policy and legal restrictions on political expressions. The current study addresses expressive and participatory nature embedded in technological characteristics of SNSs and discusses the problems of content regulations of political expression over SNSs. First of all, it is analyzed that light touch regulation or light touch monitoring should be applied to regulating content on SNSs, particularly political expressions. Constitutional Court proclaimed that legal restrictions on the Internet could infringe basic rights of the people and thus under unambiguous standards, the Doctrine of Clear and Present Danger should be applied to its content. Second, it is found that clarifying the definition of illegality in the application of legal restrictions is necessary to minimize the excessive misleading. Third, it is required that Korea Communications Standards Commission under the government control needs to change in determining the scope of illegal information. In a domestic level, there needs to be safeguards for the protection of the self-regulatory organization such as KISO to guarantee voluntary and autonomous regulatory practices.

  • PDF

Uranium Enrichment Comparison of UO2 Pellet with Alpha Spectrometry and TIMS

  • Song, Ji-Yeon;Seo, Hana;Kim, Sung-Hwan;Choi, Jung-Youn
    • Journal of Radiation Protection and Research
    • /
    • v.43 no.3
    • /
    • pp.120-123
    • /
    • 2018
  • Background: Analysis of enrichment of $UO_2$ is important to verify the information declared by the license-holders. The redundancy methods are required to guarantee the analysis result. Korea Institute of Nuclear Nonproliferation and Control (KINAC) used to analyze it with alpha spectrometry and consign to Korea Basic Science Institute (KBSI) Thermal Ionization Mass Spectrometry (TIMS). This article evaluated the similarity of the results with two methods and derive correlation equation. It could be compared to the results measured by TIMS running by KBSI. Materials and Methods: There are not many certified materials for the uranium enrichment value. Therefore, 34 uranium pellets, which have the wide range of uranium enrichment from 0.21 to 4.69 wt%, were used for the experiments by the alpha spectrometry and the TIMS. Results and Discussion: The study shows there are the tendency of analyzed enrichment by each equipment. It shows uranium enrichment with alpha spectrometry evaluated 17% higher than that with TIMS on average. The regression equations were also derived in case the similarity between the two results with two methods is lower than predicted. Two experiments were designed to compare the effect of number of samples. The $R^2$ was 0.9977 with 34 pellets. It shows the equation is appropriate to predict the enrichment values by TIMS with that of alpha spectrometry. The $R^2$ was 0.9858 with four pellets for ten times. The $R^2$ decreased while the number of samples increased. The discrepancy between the lowest and highest enrichment seems to be one of the reason for it. Conclusion: KINAC expects the first equation with 34 samples is useful to predict the result with TIMS, the redundancy method, based on the alpha spectrometry. The extra samples are necessary to collect if the enrichment value analyzed by TIMS is lower than the value predicted with the equation. Further study would be followed related to the impact of the peak counts for each uranium isotopes, sample amount and number of experiments when TIMS established in KINAC by the end of 2018.

A strategic Approach for Establishing Korea's Cyber Terrorism Policy : Focusing on the UK's cyber terrorism policy (국내 사이버테러 정책수립을 위한 전략적 접근방안 : 영국의 사이버테러 정책을 중심으로)

  • Kim, Byung-Hwa
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.173-195
    • /
    • 2017
  • Recently, in South Korea, security management has been strengthened, but there have been an increasing number of cases where the main infrastructure of the country is hacked in the cyber space. South Korea is equipped with sophisticated information and communication technologies, such as Internet, but is threatened by cyber terrorism of North Korea and terrorist organizations. Nevertheless, there is a limit to how to develop a policy and strategic plan for the country, which is related to domestic terrorism and lacks legal and regulatory facilities, and therefore, in this study, proposed suggestions for building adaptive and efficient policy formulation. Based on the theoretical analysis framework of the Strategic Plan for achieving the objectives of the research, we compared the UK 's security strategy with the national security policy of the domestic government. As a result, several problems were derived: First, the domestic security strategy did not take into account the external environment. Secondly, lack of coordination with domestic cyber security goals setting and strategy is causing ambiguity and confusion. Third, the detailed plan of implementation of national security in each province is designed to ensure that there is a possibility that a mixed side effect between ministries and agencies will arise. Fourth, it was found that there was a limit to prepare the evaluation standards for the evaluation and return of domestic security policies in the country. Therefore, in order to establish a policy for the response of domestic cyber terrorism, we set up a vision from long-term perspectives and concrete targets based on the strategic approach of the security policy, It is necessary to present an assignment and formulate an efficient execution plan. It is necessary to maintain and improve the domestic safeguards in order to be able to complement the problems through evaluation and feedback.

  • PDF

Development and Application of the Visual Test Instrument for Spent CANDU Fuel Bundle Serial Number Identification (CANDU형 사용후 핵연료 다발 일련번호 확인을 위한 육안검사 장치 개발 및 적용)

  • Na, Won-Woo;Lee, Young-Gil;Yoon, Wan-Ki;Kwack, Eun-Ho;Park, Seung-Sik
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.19 no.2
    • /
    • pp.93-99
    • /
    • 1999
  • SCAI(spent CANDU fuel bundle serial number identifier) was developed to read serial numbers of spent fuel bundles in the spent fuel storage. For the purpose of effectively identifying the serial number of fuel bundle. SCAI was composed of underwater camera & light part. guiding & supporting part and control & monitor part. So it is easy to assemble and disassemble, and operate. It was tested to read serial numbers of spent fuel bundles loaded in basket during the recent spent fuel transfer campaign at Wolsong Unit 1. And it was also applied to read serial numbers of spent fuel bundles discharging from the initial core at Wolsong Unit 3 by slight change of camera and light. Inspectors could easily operate SCAI after several practices in the storage pond, which was a user friendly. And SCAI provided clear and immediate picture for identification of serial numbers of spent fuel bundles. It was interally evaluated that SCAI greatly contributed to cut inspection efforts for national and international safeguards at Wolsong power plant.

  • PDF

Indonesia's REDD+ National Strategy between Ideal and Reality (인도네시아 REDD+ 국가 전략의 이상과 현실)

  • Bae, Jae Soo
    • Journal of Korean Society of Forest Science
    • /
    • v.102 no.2
    • /
    • pp.189-197
    • /
    • 2013
  • The Cancun Agreements under the United Nations Framework Convention on Climate Change require developing countries aiming to undertake REDD+ activities to develop a national strategy or action plan, addressing the drivers of deforestation and forest degradation, a measurement, reporting and verifying (MRV) system including forest monitoring system, and safeguards to ensure equity and co-benefits for local communities and indigenous peoples, and biodiversity. The Government of Indonesia and the Government of Norway established REDD+ cooperation through signing a 'Letter of Intent' in May, 2010. Indonesia agreed on 'a two year suspension on all new concessions for conversion of peat and natural forest'. In turn, Norway agreed to support Indonesia's REDD+ implementation efforts up to one billion United States dollars. Indonesia's REDD+ national strategy (June, 2012) accepted most of the requests included in the 'Letter of Intent'. The REDD+ national strategy, however, does not reflect requests of the Cancun Agreements which noted identification of the drivers of deforestation and forest degradation and guarantee of real greenhouse gas emissions reductions. Indonesia lays emphasis on Norwegian requests which includes expected financial support rather than the Cancun Agreements which have a weak legally-binding requirements.

A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data (보건의료정보의 법적 보호와 열람.교부)

  • Jeong, Yong-Yeub
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF

A Study on the International Discussion of Digital Trade Norms (디지털 무역규범의 국제적 논의에 관한 연구)

  • Hwang, Ji-Hyeon;Kim, Yong-Il
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • With the spread of digital trade, the share of digital trade under the global trade environment is increasing. However, since there is no international digital trade standard, the discussion to establish a new trade rule has important significance. Countries around the world are implementing digital trade policies in consideration of their own interests, but different regulatory policies are causing trade conflicts. In order to provide safeguards against personal information infringement due to the free movement of data across borders, major countries around the world have taken measures to localize data, and the EU has enacted GDPR. And the United States regards the imposition of the digital tax as a trade barrier, and some countries oppose the implementation of the digital tax for fear of negative impact on their countries. However, discussions on the global digital tax, centered on the OECD and the G20 are making progress. As it is highly likely that a digital tax agreement will be drawn up within this year, countermeasures must also be prepared. Therefore, this study presents implications for the future direction of Korea's trade policy by examining recent trends in digital trade norms and analyzing major issues in digital trade.

The Analysis of Bus Traffic Accident to Support Safe Driving for Bus Drivers (버스운전자 안전운행지원을 위한 교통사고 분석 연구)

  • BHIN, Miyoung;SON, Seulki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.1
    • /
    • pp.14-26
    • /
    • 2019
  • For bus drivers' safe driving, a policy that analyzes the causes of the drivers' traffic accidents and then assists their safe driving is required. Therefore, the Ministry of Land, Infrastructure and Transport set up its plan to gradually expand the equipping of commercial vehicles with FCWS (Forward Collision Warning System) and LDWS(Lane Departure Warning System), from the driver-supporting ADAS(Advanced Driver Assistance Systems). However, there is not much basic research on the analysis of bus drivers' traffic accidents in Korea. As such, the time is appropriate to research what is the most necessary ADAS for bus drivers going forward to prevent bus accidents. The purpose of this research is to analyze how serious the accidents were in the different bus routes and whether the accidents were repetitive, and to give recommendations on how to support ADAS for buses, as an improvement. A model of ordered logit was used to analyze how serious the accidents were and as a result, vehicle to pedestrian accidents which directly affected individuals were statistically significant in all of the models, and violations of regulations, such as speeding, traffic signal violation and violation of safeguards for passengers, were indicated in common in several models. Therefore, the pedestrian-sensor system and automatic emergency control device for pedestrian should be installed to reduce bus accidents directly affecting persons in the future, and education for drivers and ADAS are to be offered to reduce the violations of regulations.

Evaluation of a Thermal Conductivity Prediction Model for Compacted Clay Based on a Machine Learning Method (기계학습법을 통한 압축 벤토나이트의 열전도도 추정 모델 평가)

  • Yoon, Seok;Bang, Hyun-Tae;Kim, Geon-Young;Jeon, Haemin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.2
    • /
    • pp.123-131
    • /
    • 2021
  • The buffer is a key component of an engineered barrier system that safeguards the disposal of high-level radioactive waste. Buffers are located between disposal canisters and host rock, and they can restrain the release of radionuclides and protect canisters from the inflow of ground water. Since considerable heat is released from a disposal canister to the surrounding buffer, the thermal conductivity of the buffer is a very important parameter in the entire disposal safety. For this reason, a lot of research has been conducted on thermal conductivity prediction models that consider various factors. In this study, the thermal conductivity of a buffer is estimated using the machine learning methods of: linear regression, decision tree, support vector machine (SVM), ensemble, Gaussian process regression (GPR), neural network, deep belief network, and genetic programming. In the results, the machine learning methods such as ensemble, genetic programming, SVM with cubic parameter, and GPR showed better performance compared with the regression model, with the ensemble with XGBoost and Gaussian process regression models showing best performance.