• Title/Summary/Keyword: Privacy information protection law

Search Result 96, Processing Time 0.022 seconds

A Study on Medical Information Privacy Protection Law and Regulation in the Information Age (정보화시대의 환자진료정보 보호에 관한 법.제도적 고찰)

  • Youn, Kyung-Il
    • Korea Journal of Hospital Management
    • /
    • v.8 no.2
    • /
    • pp.111-129
    • /
    • 2003
  • This study discusses the direction of legislation to strengthen the legal protection of medical records privacy in information age. The legislation trends on privacy protection of medical records in European Union and United States are analysed and the current law and regulation of Korea on medical records are compared. The issues discussed include the ownership of medical records, the patient's right of access to medical records, medical information publication for other than treatment or insurance processing use, confidentiality responsibility of provider organizations, medical information management in provider organizations, penalty for the unlawful use of patient information. This study concludes that the patients' right on medical record and provider organization's responsibility in processing patient information should be strengthened in order to protect patients' privacy and to conform to the international standard on medical record protection in the information age.

  • PDF

The Protecton of Privacy on Secondary Use of Personal Health Imformation (의료기관 개인건강정보의 이차적 이용)

  • Kim, Jang-Han
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.1
    • /
    • pp.117-143
    • /
    • 2010
  • Along with the development of digital technologies, the information obtained during the medical procedures was working as a source of valuable assets. Especially, the secondary use of personal health information gives the ordeal to privacy protection problems. In korea, the usage of personal medical information is basically regulated by the several laws in view of general and administrative Act like Medicine Act, Public institutions' personal information protection Act, Information-Network Act etc. There is no specific health information protection Act. Health information exchange program for the blood donor referral related with teratogenic drugs and contagious disease and medical treatment reporting system for income tax convenience are the two examples of recently occurred secondary use of health information in Korea. Basically the secondary use of protected health information is depend on the risk-benefit analysis. But to accomplish the minimal invasion to privacy, we need to consider collection limitation principle first. If the expected results were attained with alternative method which is less privacy invasive, we could consider the present method is unconstitutional due to the violation of proportionality rule.

  • PDF

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

About the Designation of Privacy and Information Protection Firm (정보보호전문업체 지정에 즈음하여)

  • Shin, Hoon
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.62-64
    • /
    • 2001
  • As of July 1. 2001, the Law of Information 8t Telecommunication Protection has been compulsory to audit protection status on national information and Telecommunications Infra facilities such as communication, electricity, waterworks, airport, railway, primary facilities of government and the first financial circles. In U.S. institutions, organizations and corporations in each field are trying to prepare for Safe Har-bor agreed on Internet privacy regulation between U.S. and Europe to be effective in 2003. The Safe Harbor was motl-vated by strict European standard. Other countries make privacy and information protection law according to their own interest. Therefore Korean technical experts have to develop the law responding to national interest and public welfare. Besides scientific Held, experts in the field of politic, economy and academy also have to work hard to develop the law.

  • PDF

A Study on Consumer Personal Information in Information Society (정보사회에서의 소비자 개인정보보호에 관한 연구)

  • 남수정;김기옥
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.10
    • /
    • pp.55-66
    • /
    • 1999
  • The purpose of this study is to propose consumer policy related to the protection of personal information on the basis of regulations and laws in the developed countries. From this study, implications for the protection consumer privacy are discussed as follows. First, Consumer education is needed to enhance consumers'knowledge on their privacy right and this should be done not only by private consumer organization but also by businesses. Second, Businesses should realize ethical responsibilities of consumers'privacy right when they use personal information by databasemarketing. Finally, Government should establish a privacy law concerning both public and private sectors.

  • PDF

The Improvement Plan of the Individual Information Protection of the Law on the Development of Cloud Computing and User Protection (클라우드 컴퓨팅 발전 및 이용자 보호에 관한 법률상 개인정보 보호에 대한 개선방안)

  • Lee, Hie-Houn
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.219-225
    • /
    • 2019
  • Today, in the era of the 4th Industrial Revolution, the cloud computing sector has advantages for cost reduction and efficiency of work, but problems related to privacy may arise. Therefore, the law on the development of cloud computing and user protection should be improved to enable providers of cloud computing services to proactively identify whether or not they contain their personal information, or to take steps to protect their privacy. And this same law is desirable to improve the implementation of a national mandatory certification system for privacy protection systems for cloud computing businesses. This same law is also desirable that cloud computing service providers create direct accountability for privacy breaches and appropriate scope for those responsibilities.

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

The Protection of Privacy and the Restriction of Its Commercial Use in Telecommunications (통신산업에서 개인정보의 보호와 영업적 이용의 한계)

  • Hong, Myung-Su
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.303-335
    • /
    • 2011
  • The rapid changes in telecommunications have exercised an important influence on the telecommunications law system, including the protection of the privacy. It was a decisive assignment that telecommunications law protected the confidentiality of privacy. But in new digitalized telecommunications circumstance, every steps of the conveyance of the individual informations should be protected, in particular by telecommunications carriers as a subject of the protection of information. EU Privacy Directive in 2003 and the amendment of Communications Act in U. S. A. in 1996 have reflected the necessity of the privacy from a new point of view. In Korea, "Protection of Privacy Act" has been established as general law as to the protection of privacy and "Electronic Communications Net-work Act" and "Location Data Act" have been functioned as special law in telecommunications, and these laws have developed the legal systems about the protection of privacy in telecommunications. Such a legal system could be affirmatively evaluated. But the regulations should be reformed in a way that corresponds to the detailed types of the privacy and it should be devised a method, that the consent of users could be fulfilled practically.

A Comparative Analysis of EU GDPR with Privacy Laws in South Korea (EU GDPR과 국내 개인정보보호 법제 비교분석)

  • Kim, Sung Hyun;Lee, Chang Moo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.83-92
    • /
    • 2018
  • The GDPR implemented since 25 May 2018 is common to all EU Member States and is legally binding. It is also important and legally valuable in that it takes into account the latest trends related to privacy protection. The purpose of this study is to propose a comprehensive review and improvement direction of the personal information protection laws in South Korea through a comparative analysis of EU GDPR and privacy related laws in South Korea. As a result of this study, the differences between the GDPR and privacy related laws in South Korea are Definition of personal sensitive information, Right to data portability, Data protection officer, Transfers of personal data to third countries, Supervisory authority, and Punishment, etc. The differences in these regulations were necessary to protect the rights and interests of data subjects and to properly handle personal information of personal information controllers. Therefore, based on the results of the comparative analysis of this study and suggestions on improvement direction of the law related to personal information protection, it is expected that it will contribute to the overall inspection and improvement of the law related to personal information protection in South Korea.

  • PDF

A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory (인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로)

  • Park, Chanouk;Lee, Sang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.59-71
    • /
    • 2014
  • This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law's effect on privacy awareness and behavioral change. The study finds that there exists a significant difference in privacy protection behavior according to privacy rights awareness. Independent variables are as follows: Five variables (Perceived vulnerability, Perceived severity, Perceived response effectiveness, Perceived barriers, Privacy Rights awareness) were tested as critical variables influencing Behavioral Intention in PMT model. Privacy awareness had a moderating effect on the relationship between perceived severity and privacy protection behavior. This study would contribute on theoretical expansion of Protection Motivation Theory and also provide practical implications for effective ways to promote behavioral changes.