• Title/Summary/Keyword: Government Information Sharing Act

Search Result 19, Processing Time 0.018 seconds

Enhancing Information Sharing in the Public Sector: An Empirical Study (행정정보공동이용제도의 개선방안에 관한 연구)

  • Yoon, Kwang Seok
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.83-104
    • /
    • 2012
  • Information sharing is one of the key factors enhancing government efficiency and public convenience. However, critics argue that Korean government is now facing various kinds of barriers such as insufficient collaboration among agencies, inappropriate statutes, and technical problems. Thus, this study aims to develop policy alternatives that help resolve the existing problems suggested above. In order to achieve research objectives, this study employs both quantitative and qualitative methods as ways to investigate different dimensions of information sharing in government. Both survey and interview include six dimensions such as organization, technology, culture, management, policy and law. The results show that Korean government needs to implement following alternatives; developing its own database that helps support government decision making, changing organizational culture, continuous extension in terms of the number of object information and affiliated agency, and developing a statute dealing with government information sharing.

  • PDF

The Trends and Reality of Korean National Information Policy (한국정보정책의 방향과 실제)

  • 김영삼
    • Journal of Korea Technology Innovation Society
    • /
    • v.1 no.1
    • /
    • pp.23-36
    • /
    • 1998
  • The 1995 Informatization Promotion Act was passed to advance the national quality of life and to develop national economy by promoting informatization, forming the ground of telecommunication industry, and realizing the advancement of telecommunication infrastructure. This article was written to review whether this act's purpose was being achieved by Korean government. Even if Korean informatization policy implemetation structure is strongly centralized around the Ministry of Information and Communication, Information policies are formulated and implemented among agencies. To explain this phenomenon, I suggested the following factors : (1) The Korean government's lack of informatization experiences, (2) The political abuse of information policy, (3) the conceptual rigidity on the structure of information superhighway, (4) the absence of the basic principles for electronic government, (5) the uniformed regional informatization.

  • PDF

A Study on the Data-Based Organizational Capabilities by Convergence Capabilities Level of Public Data (공공데이터 융합역량 수준에 따른 데이터 기반 조직 역량의 연구)

  • Jung, Byoungho;Joo, Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.97-110
    • /
    • 2022
  • The purpose of this study is to analyze the level of public data convergence capabilities of administrative organizations and to explore important variables in data-based organizational capabilities. The theoretical background was summarized on public data and use activation, joint use, convergence, administrative organization, and convergence constraints. These contents were explained Public Data Act, the Electronic Government Act, and the Data-Based Administrative Act. The research model was set as the data-based organizational capabilities effect by a data-based administrative capability, public data operation capabilities, and public data operation constraints. It was also set whether there is a capabilities difference data-based on an organizational operation by the level of data convergence capabilities. This study analysis was conducted with hierarchical cluster analysis and multiple regression analysis. As the research result, First, hierarchical cluster analysis was classified into three groups. It was classified into a group that uses only public data and structured data, a group that uses public data on both structured and unstructured data, and a group that uses both public and private data. Second, the critical variables of data-based organizational operation capabilities were found in the data-based administrative planning and administrative technology, the supervisory organizations and technical systems by public data convergence, and the data sharing and market transaction constraints. Finally, the essential independent variables on data-based organizational competencies differ by group. This study contributed. As a theoretical implication, this research is updated on management information systems by explaining the Public Data Act, the Electronic Government Act, and the Data-Based Administrative Act. As a practical implication, the activity reinforcement of public data should be promoting the establishment of data standardization and search convenience and elimination of the lukewarm attitudes and Selfishness behavior for data sharing.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

A Study on the Standard for Automatic Exchange of Financial Account Information (정기 금융정보교환을 위한 조세조약 이행규정 고찰)

  • Ryu, Hae-Young;Chae, Soo-Joon
    • Asia-Pacific Journal of Business
    • /
    • v.8 no.2
    • /
    • pp.31-39
    • /
    • 2017
  • Countries around the world have been engaging in automatic exchange of information to tackle tax evasion. The same goal became the basis of the enactment of the Foreign Account Tax Compliance Act (FATCA) by the United States Congress. In order to establish a common approach to counter tax evasion among different countries, the Organization of Economic Cooperation and Development (OECD) released the Standard for Automatic Exchange of Financial Account Information in Tax Matters which consists of the Competent Authority Agreement (CAA) and the Common Reporting Standard (CRS). Specifically, the automatic exchange of information is the exchange of financial account information between Tax Authorities in relevant countries. The law requires this information to be collected by financial institutions around the world for reporting to Tax Authorities. Automatic exchange of Information is made up of two information sharing frameworks: The Foreign Account Tax Compliance Act (FATCA) and The Common Reporting Standard (CRS). Under the automatic exchange of information, all financial institutions must identify accounts held by customers who are foreign tax residents or entities connected to foreign tax residents. Financial institutions must report these to the relevant Tax Authority who will then automatically exchange the account information with the relevant foreign Tax Authorities. Korean government has enacted domestic laws to require financial institutions to collect and report this information and has entered into international agreements to exchange the information with other governments. This paper analyzed the FATCA and CRS rules overall and proposed solutions for the legal and practical issues. This paper contributes to the existing literature on the automatic exchange of information by considering two information sharing frameworks.

  • PDF

A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data (보건의료정보의 법적 보호와 열람.교부)

  • Jeong, Yong-Yeub
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF

Status of Policies Relating Biosafety

  • Jang, Hi-min
    • Journal of Plant Biotechnology
    • /
    • v.5 no.1
    • /
    • pp.13-17
    • /
    • 2003
  • Biotechnology is certainly one of the major landmarks in the 20th century history of science. It may produce enormous utility to human beings, but at the same time, it carries huge potential risks to the environment and public health. Thus, with a view to securing safety for the environment and public health in relation to the development and use of living modified organisms (LMOs), the Cartagena Protocol on Biosafety was adopted, in which a regulation Procedure as to the transboundary movements, transportation, handling, and use of LMOs were drawn up. In order to prepare for the entry into force of the Protocol, the Republic of Korea legislated the "Act on the Transboundary Movements of living modified organisms(hereinafter referred as the 'Act')" in Mar 2001, and has pre-announced the enactments of the enforcement ordinance and the enforcement regulation to the Act. Pursuant to the Act, the Ministry of Commerce, Industry and Energy, as a Competent National Authority, is making efforts to implement domestic biosafety schemes in cooperation with other bio-related government ministries. In order for these efforts to reap fruits, industry, academia, and research institutions should cooperate with one another, and civic groups and NGOs should narrow the differences in opinions and timely respond to the fast-changing situations. Focusing on the precautionary principle, the Protocol puts a great emphasis on the importance of information sharing amongst countries, and the Act also follows this principle. In order to gurantee biosafety, countries around the world, including the ROK, agreed to establish National Biosafety Clearing, designed to provide the information on the export/import of LMOs, R'||'&'||'Ds, risk assessment, safety control, etc. and register it on the CBD Central Biosafety Clearing House.e.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

A Study on Problem and Improvements of Registration System in Water Leisure Crafts (수상레저기구 등록 시스템의 문제점과 개선 방안)

  • Yang, Young-Cheol;Lee, Jae-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.273-282
    • /
    • 2016
  • This study analyzed the origin and status of the registration system of water leisure craft to suggest an improvement plan for the ocean leisure industry. To identify the transition of the registration system, related water leisure craft, registration procedures and revised acts from "water leisure safety act", which was established in the early 2000 and enacted since then were examined. To understand the problems raised, the management of the registration system and related other systems were analyzed. The results were as follows. First, the registration system was designed just to check the number of registrations of water leisure craft so it does not provide various and useful information that administrators and registrants want. Second, it is impossible to utilize and reconstruct the information regarding water leisure craft. In addition, the current registration system does not have a data sharing system with the Ministry of Government Administration and Home Affairs so self-governing administrations are not connected to each other or to other electronic government systems. To resolve these problems, the construction of a new registration system is required. The new registration system of water leisure craft should facilitate not only processing registration files and administration work, but also multiple electronic governmental services that provide the water leisure users with useful information and encourage them to learn about their craft management and so on.