• Title/Summary/Keyword: Protection Law

Search Result 972, Processing Time 0.021 seconds

Gender and healthcare issues related to the Protected Birth Act in Korea (보호출산제 시행과 젠더 및 보건의료 이슈)

  • Jiah Jeong
    • Women's Health Nursing
    • /
    • v.30 no.2
    • /
    • pp.101-106
    • /
    • 2024
  • This paper discusses the implications of the birth notification system and the Protected Birth Act in Korea. Aiming to prevent infanticide and abandonment of infants, the law will enter into force on July 19, 2024 in South Korea. The birth notification system mandates that both parents and the head of the medical institution where the birth occurred must report the event. In parallel, the Protected Birth Act will be implemented, allowing pregnant women in crisis who wish to remain anonymous, the option to give birth outside of a hospital setting in a way that safeguards the life and health of the child. However, many issues are being raised in Korean society in advance of the implementation of the Protected Birth Act. There is widespread concern that the Protected Birth Act fails to protect either women or children, especially as it raises issues regarding the need for legislation to protect children with disabilities and to address gaps for migrant women and children. This paper examines the gender and healthcare issues relating to the Protected Birth Act, focusing on women's health and human rights. The Act continues to perpetuate discrimination against out-of-wedlock pregnancies and upholds the ideology of the traditional family model. Furthermore, the legislative process did not address protective measures for the various reasons behind child abandonment. Critical issues such as women's autonomy, safe pregnancy termination, and paternal responsibility in childbirth are also notably absent. However, with the Act set to take effect soon, it is crucial for healthcare providers to comprehend the rationale and procedures associated with birth notification and the Protected Birth Act, and to prepare for its nationwide implementation. The law defines the socially vulnerable as its main beneficiaries, and it is necessary to strengthen social safety nets to improve their access to healthcare, eliminate prejudice and discrimination against out-of-wedlock pregnancies, and embrace the diversity of our society. We eagerly anticipate future discussions on gender and healthcare issues, as well as amendments to the law that reflect real-world circumstances to provide genuine protection for pregnant women in crisis and their infants.

Impact of Enforcement of Dark Pattern Law on Consumers and Online Platform Companies

  • Sung-su SHIN;Yoon-hwang JU
    • The Journal of Economics, Marketing and Management
    • /
    • v.12 no.5
    • /
    • pp.21-30
    • /
    • 2024
  • Purpose: As competition in the online platform market heats up due to the growing online presence, there is a growing interest in consumer protection legislation to protect consumers. The current online platform law has been criticized for its limitations in regulating the rapidly evolving platform economy. In particular, there is an ongoing need to regulate 'dark patterns' that deceive and mislead consumers. Research Design and Methods: This trend has been recognized not only in Korea, but also in Europe and the United States, which have enacted related regulatory bills, making some types of dark patterns illegal. It is necessary to protect consumers from dark patterns. However, there are some opinions that legal regulations do not protect consumers, but reduce consumer choice, as there is no specific definition of 'dark patterns' or analysis of the damage status. It has also been argued that extensive regulations could shrink the online platform market. Results: Therefore, it is necessary to clarify the areas that can resolve consumers' complaints about dark patterns before the revised law is implemented. In addition, it should be a rational and efficient system so that the continuously growing online platform market does not shrink due to excessive regulations and can develop healthily through the prevention of dark patterns. Conclusions: Here, it is also extremely important to specifically present the scope and standards of regulations and reduce the scope for unnecessary legal interpretation. It can also be a good idea to strengthen the education of consumers and businesses on dark pattern problems and their solutions, and to create a foundation that allows them to solve problems autonomously.

A Study on Problems and Improvement of Personal Protective Regulations in Security Industry Act (경비업법상 신변보호 관련 규정의 문제점과 개선방안)

  • Park, Jung-Sub
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.81-100
    • /
    • 2017
  • Recently, Crime patterns in our society are diversifying as followed on the urbanization of population and the influx of immgrants. Existing murder, kidnap, sexual assault, etc. Especially, the crimes such as school violence, dating violence, domestic violence, violent abuse and even social hatred a crime, motiveless crime are spreading into every phase of national life. Due to the social situation, the sharp increase in demand for personal protection, the scale of private security industry has been constantly expanded. Following this trend, the personal protective regulations in Security Industry Act has been revised several times since the it was enacted in 1995. However, despite the fact that the legal and institutional aspects should have been amended and improved systematically according to the industrial development, the regulations adopted initially adopted has been maintained so far, which have resulted in various problems as they could not coincide with the purpose of private security, being divorced from the reality of private security industry and social changes. Especially, in the case of personal protection service and facility security service, the legal requirements of both services are identical with each other in terms. Such legal systems may cause confusion to security businesses and employees, or the police managing and supervising them, regarding the scope and duties of security services. In order to improve such problems, the regulations of permission requirement that the personal protective regulations in Security Industry Act should be revised system. In this study, relevant personal protection provisions prescribed in the Security Industry Act have been reviewed critically in this paper. And also the regulations were review of those personal protection provisions enacted in security industry Act, so that the improvement plan for the personal protection provisions that are apposite to the cases in this country could be suggested in order to amend the current laws and provide real grounds for the law enforcement.

  • PDF

Research on the Access Control Methodology for Dualised Hierarchical Personal Information Life-Cycle (이원화된 계층적 개인정보 Life-Cycle 접근제어 방법론에 관한 연구)

  • Seo, Woo-Seok;Kim, Kye-Soon;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1161-1170
    • /
    • 2013
  • Currently in 2013, a law that was drawn as a result of social agreement for personal information protection was enacted, and through several amendments, definite policy of written law and guideline were presented for definitive information protection in various fields of social business including IT field. Based on a series of social issues about the importance of personal information, a new access paradigm to personal information appeared. And from macroscopic access method called information protection, the necessity of technical access method came to the fore. Of course, it seems somewhat irrational to restrict all data in the form of personal information to a certain category of information until now. But in the deluge of information based on IT field, it is true that the part of checking the flow of personal information and selecting as security target has been standardized. But still there are cases in which it is difficult to routinely apply the five standardized flows of personal information Life-Cycle-collect, process, provide, store, and destroy-to information that all companies and organizations have. Therefore, the researcher proposes the standardized methodology by proposing the access control methodology for dualised hierarchical personal information Life-Cycle. The results of this research aim to provide practical data which makes optimal access control to personal information Life-Cycle possible.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Strengthening the Legal Basis for Security Rule to Protect Technology and Trade Secrets for Small Businesses (중소기업의 기술 및 영업비밀 보호에 대한 보안규정의 법적 근거 강화방안)

  • Ahn, Sang Soo;Lee, Jung hun;Son, Seung Woo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.57-77
    • /
    • 2020
  • In Korea, various schemes have been implemented to prevent the outflow of technology, but they do not bring practical effects. In general, we focus on follow-up measures such as strong punishment in case of violation of the law. In terms of proactive prevention, it is not shown to have any real preventive effect, even though it includes such matters as imposing security measures on companies or conducting a survey. this paper examines the need to strengthen the protection of business secrets by reviewing the employment rules between companies and workers presented in the Labor Relations Act and the Labor Standards Act as a realistic alternative. In most companies, even though the employment rule is the highest standard of private regulations, the employment rule has no matters on the prevention and protection of technology leakage. The employment rules require all employees working for companies to agree and notify in the Labor Standards Act, so it is necessary to reflect them as standards in the standard employment rules because it shows that all employees of the company can have a common sense of security and present legal compliance with security-related documents, such as security pledges and security-related guidelines and procedures.

Population Dose Assessment for Radiation Emergency in Complex Terrain (복잡 지형에서의 주민선량 계산)

  • Yoon, Yea-Chang;Ha, Chung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.12 no.2
    • /
    • pp.28-36
    • /
    • 1987
  • Gaussian plume model is used to assess environmental dose for abnormal radioactive release in nuclear facility, but there has a problem to use it for complex terrain. In this report, MATTEW and WIND04 Codes which had been verified were used to calculate wind field in the complex terrain. Under the base of these codes principle, wind fields were obtained from the calculation of the finite difference approximation for advection-diffusion equations which satisfy the mass-conservative law. Particle concentrations and external doses were calculated by using PIC model which approximate the particle to radioactive cloud, and atmospheric diffusion of the particles from the random walk method. The results show that the adjusted wind fields and the distributions of the exposure dose vary with the topography of the complex terrain.

  • PDF

A Study on Fire Safety Management of Social Welfare Facilities (사회복지시설의 화재안전관리에 관한 연구)

  • Choi, Kyu-Chool
    • Fire Science and Engineering
    • /
    • v.27 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • The fire safety of social welfare facilities increasing at high speed with coming-up of an aging society have been on the rise as a very important social problems. This research paper has analyzed the fire safety laws and standards about the social welfare facilities as a lesson elderly nursing home's fire that occurred in recent years. This research worker have conducted the questionnaire survey including research of the true actual through the fire protection engineers, the professors, the fire facilities managers and the users. This study has proposed the installing of suitable fire protection systems through the law revision, normal maintenance of the facilities, the safety management plan through evaluation about fire protective management and related facilities by the methods of the fire safety management.

A Study on the Countermeasure to Deal with Cyber Terrorism (사이버테러리즘의 대응방안에 관한 연구)

  • Oh Tae-Kon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.93-101
    • /
    • 2005
  • These days, modern society is facing a 'turning point of paradigm' from industrial society to knowledge and information society. It indicates an entry to the high-speed network society centering on knowledge. Specifically, Korea has invested enormously to If Industry and finally other advanced countries are eager to export technologies of our country through benchmarking. However, because of our growth-oriented policy, Korea is not very good at dealing with the dysfunctions of information-centered society, and one of the representative problems is cyber-terrorism. Cyber terrorism which anonymous actors do to the uncertain number of people is one of the new types of terrorism. This study aims at political and legal speculations on cyber terrorism for protection of contents and find its countermeasures.

  • PDF

Monitoring Cathodic Shielding and Corrosion under Disbonded Coatings

  • Varela, F.;Tan, M. YJ;Hinton, B.;Forsyth, M.
    • Corrosion Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.109-114
    • /
    • 2017
  • Monitoring of corrosion is in most cases based on simulation of environmental conditions on a large and complex structure such as a buried pipeline using a small probe, and the measurement of thermodynamics and kinetics of corrosion processes occurring on the probe surface. This paper presents a hybrid corrosion monitoring probe designed for simulating deteriorating conditions wrought by disbonded coatings and for measuring current densities and distribution of such densities on a simulated pipeline surface. The concept of the probe was experimentally evaluated using immersion tests under cathodic protection (CP) in high resistivity aqueous solution. Underneath the disbonded area, anodic currents and cathodic currents were carefully measured. Anodic current densities were used to calculate metal loss according to Faraday's law. Calculated corrosion patterns were compared with corrosion damage observed at the surface of the probe after a series of stringent tests. The capability of the probe to measure anodic current densities under CP, without requiring interruption, was demonstrated in high resistivity aqueous solution. The pattern of calculated metal loss correlated well with corrosion products distribution observed at the array surface. Working principles of the probe are explained in terms of electrochemistry.