• Title/Summary/Keyword: Act for Private Security

Search Result 93, Processing Time 0.026 seconds

An Impact and Problem by the Personal Information Protection Act. on the Financial Sector (개인정보보호법이 금융권에 미치는 영향과 문제점에 관한 고찰)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.31-36
    • /
    • 2013
  • The personal information protection act has been enacted from 2011 for the protection of public and private privacy. Since the application area of the law is so broad, there is a limit to covers everything in the financial field. In this paper, I'll discuss an impact and problem by the personal information protection act. and propose some new task to build an efficient personal information protection governance on financial sector.

Strengthening the Legal Basis for Security Rule to Protect Technology and Trade Secrets for Small Businesses (중소기업의 기술 및 영업비밀 보호에 대한 보안규정의 법적 근거 강화방안)

  • Ahn, Sang Soo;Lee, Jung hun;Son, Seung Woo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.57-77
    • /
    • 2020
  • In Korea, various schemes have been implemented to prevent the outflow of technology, but they do not bring practical effects. In general, we focus on follow-up measures such as strong punishment in case of violation of the law. In terms of proactive prevention, it is not shown to have any real preventive effect, even though it includes such matters as imposing security measures on companies or conducting a survey. this paper examines the need to strengthen the protection of business secrets by reviewing the employment rules between companies and workers presented in the Labor Relations Act and the Labor Standards Act as a realistic alternative. In most companies, even though the employment rule is the highest standard of private regulations, the employment rule has no matters on the prevention and protection of technology leakage. The employment rules require all employees working for companies to agree and notify in the Labor Standards Act, so it is necessary to reflect them as standards in the standard employment rules because it shows that all employees of the company can have a common sense of security and present legal compliance with security-related documents, such as security pledges and security-related guidelines and procedures.

Crime prevention role and limitations of private security organizations (민간방범기구의 범죄예방 역할과 한계)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.33-41
    • /
    • 2012
  • Important crime prevention is emphasized. Depending on the type of criminal act itself, but with many material and human damage because it is a threat to the safety of civil life. The traditional police power of the police in patrolling the derailment by the diversification of the crime, globalization, organizing, specialization, and ferocious anger by far exceeds the capabilities of the police crime prevention are occurring. Civilian police crime prevention organizations in the area of the region as a base for complementary activities, and even if the purpose of commercial availability, but many organizations is the autonomous and spontaneous personality voluntary work civic life is to serve as the safety fence. But that suits the role of these organizations and social support and lack of institutional support and practical and effective crime prevention activities has not been effective. Law reform and the role of the Organization for the maintenance of redundancy, or a series of systematic effort to equip networks and take advantage of the functional and has been factory.

Improvement Proposals for Biometric Information Protection Guideline based on the Analysis of Global Bio Information Privacy Issues (글로벌 바이오정보 프라이버시 논점 분석을 기반으로 한 바이오정보 보호 가이드라인 개선 방안)

  • Jung, Boo-geum;Kwon, Hun-yeong;Park, Hea-sook;Lim, Jong-in
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.87-94
    • /
    • 2018
  • Privacy means the right not to interfere with the private life of an individual. Bio data is the most private personal information about the person itself, and according to advancement of technology, it is possible to analyze and judge individual as well as identify individual. The Personal Information Protection Act is based on global privacy principles, but the legislation for the protection of bio information has yet to be enacted. Therefore, it is time to protect biometric data as more sensitive information than general personal information. We will review the global privacy discussions for protecting biometric information and propose additional privacy principles and measures for utilization that should be defined in the biometric information protection guideline.

  • PDF

A Discussion on Home-Institutions' Relations with Reference to Children with Intellectual Disabilities in Saudi Arabia

  • Bagadood, Nizar H.;Saigh, Budor H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.266-272
    • /
    • 2022
  • Private specialized institutions differ from public ones in that they mostly act independently. This paper reports a study designed to assess the provision of specialized institutions for children with intellectual disabilities in Saudi Arabia. The approach taken in this study was qualitative, involving a case study strategy that enabled the researcher to gain rich and in-depth information based on the shared experiences of participants comprising institution leaders, educators and families from two specific specialized settings, one public and one private. The study aimed to examine the existing disparities in service delivery so as to develop a clear picture of the service quality provided by public specialized institutions for children with intellectual disabilities in Saudi Arabia. The results suggest that the weak relationship with inpatient and specialized institutions is a consequence of the parents' poor responsiveness, which may result in these institutes developing a negative impression of the parents. Conversely, the lack of active initiative on the part of the public specialized institutions led to a negative parental attitude towards these institutions. A sensible approach to resolving this problem might be to recognize that these institutions have a significant responsibility to encourage parents of children with intellectual disabilities to become involved in their children's learning, to promote positive attitudes.

The risk of the Information-oriented society and the role of private security (정보화 사회의 위험적 요소와 민간시큐리티의 역할)

  • Gong, Bae Wan
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • Informatization of society through the computer and the Internet, because large amounts of information production and exchange and new way of communicating is born. Passive way past the one-sided information flows actively interact to evolve in a manner of information producers and information consumers distinction and personal relationships that enhance the online Social Networking Service (SNS) has developed into the social structure of. Thus, the spread of information work closely with the social network structure spark social conflict may act as a factor, and systems and the environment, personal and cultural adaptation of speed to keep up with the rapid development of science and technology as the inability conflict and confusion should lead to even. This paper the characteristics of the information society, with a look at the evolution of social risk factors as the wavelength of information about this look at the role of private security sought to evaluate. Information Society in time and space by shrinking the area of human life that has brought the convenience and simplicity, whereas the non-performance due to the nature of anonymous raises many social side-effects are. This made the preparation of national regulatory measures, but for the protection of personal protection devices in the private sector has not yet been discussed. Way of life and property of the purchaser to protect an individual's private security will have to charge it.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

A Study on the Private Investigator System in U.S.A. (미국의 탐정제도에 관한 연구)

  • Kang, Young-Sook;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.25-50
    • /
    • 2006
  • Private detectives and investigators offer many services, including executive, corporate, and celebrity protection; pre-employment verification; and individual background profiles. They also investigate computer crimes, personal injury cases, insurance claims and fraud, child custody and protection cases, missing persons cases, and premarital screening. This paper focuses on a private detective or investigator system in most developed U.S.A, but it is not easy to describe that system. Licensing requirements vary in U.S.A. Some States have few requirements, and many other States have stringent regulations. A growing number of States are enacting mandatory training programs for private detectives and investigators. Employment and need of private detectives and investigators is expected to grow faster than the average for all occupations. Thus, it is reasonable that korean government should permit private investigation service find the way to minimize the side effects of private investigation service instead of banning the service totally.

  • PDF

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

The Normative Meaning of Cybersecurity Information Sharing Act(CISA) of 2015 (미국 사이버안보 정보공유법(CISA)의 규범적 의의)

  • Park, Sangdon
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.45-52
    • /
    • 2017
  • The Cybersecurity Information Sharing Act(CISA) of 2015, enacted in December 2015, is one of the greatest achievements of cybersecurity legislation in the United States. The promotion of cybersecurity information sharing is one of the tasks to improve cybersecurity governance in Korea. So it is an important issue to be addressed in cybersecurity legislation in Korea in the near future. CISA has many implications for cybersecurity legislation in Korea. Nevertheless, it is difficult to find preceding research that explain the content of CISA and study its normative meaning in Korea. Therefore, in this paper, the contents of the CISA is identified and its normative meaning and implication is found in five categories: definition of terms, establishment of information sharing procedures and conditions, promotion of voluntary information sharing by the private sector, checks on the executive branch and report to the Congress, and other matters. CISA facilitates information sharing based on willingness, while eliminating the side effects that may arise in the information sharing process. It is necessary to appropriately apply the good points of CISA to the cybersecurity legal system in Korea.