• Title/Summary/Keyword: social security act

Search Result 109, Processing Time 0.022 seconds

A Study on Act on Certified Detective and Certified Detective Business (공인탐정 관련 법률(안)의 문제점과 개선방안에 관한 연구)

  • Kim, Bong-Soo;Choo, Bong-Jo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.285-305
    • /
    • 2019
  • In the bill of [Act on Certified Detective and Certified Detective Business] (hereinafter referred to as the Certified Detective Act) proposed and represented by the member of National Assembly, Lee Wan-Yong in 2017, the legislative point of view showed that various incidents and accidents, including new crimes, are frequently increasing as society develops and becomes more complex, however, it is not possible to solve all the incidents and accidents with the investigation force of the state alone due to manpower and budget, and therefore, a certified detective or private investigator are required. According to the decision of the Constitutional Court in June 2018, Article 40 (4) of the Act on the Use and Protection of Credit Information is concerned with 'finding the location and contact information of a specific person or investigating privacy other than commerce relations such as financial transactions' are prohibited. It is for the purpose of preventing illegal acts in the process of investigation such as the location, contact information, and the privacy of a specific person and protecting the privacy and tranquility of personal privacy from misuse and abuse of the personal information etc. Such 'privacy investigation business' currently operates in the form of self-employment business, which becomes a social issue as some companies illegally collect and provide such privacy information by using illegal cameras or vehicle location trackers and also comes to be the objects of clampdown of the investigative agency. Considering this reality, because it is difficult to find a resolution to materialize the legislative purpose of the Act on the use and protection of credit information other than prohibiting 'investigation business including privacy etc' and it is possible to run a similar type of business as a detective business in the scope that the laws of credit research business, security service business, the position of the Constitutional Court is that 'the ban on the investigations of privacy etc' does not infringe the claimant's freedom to choose a job. In addition to this decision, the precedent positions of the Constitutional Court have been that, in principle, the legislative regulation of a particular occupation was a matter of legislative policy determined by the legislator's political, economic and social considerations, unless otherwise there were any special circumstances, and. the Constitutional Court also widely recognized the legislative formation rights of legislators in the qualifications system related to the freedom of a job. In this regard, this study examines the problems and improvement plans of the certified detective system, focusing on the certified detective bill recently under discussion, and tries to establish a legal basis for the certified detective and certified detective business, in order to cultivate and institutionalize the certified detective business, and to suggest methodologies to seek for the development of the businesses and protect the rights of the people.

The risk of the Information-oriented society and the role of private security (정보화 사회의 위험적 요소와 민간시큐리티의 역할)

  • Gong, Bae Wan
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • Informatization of society through the computer and the Internet, because large amounts of information production and exchange and new way of communicating is born. Passive way past the one-sided information flows actively interact to evolve in a manner of information producers and information consumers distinction and personal relationships that enhance the online Social Networking Service (SNS) has developed into the social structure of. Thus, the spread of information work closely with the social network structure spark social conflict may act as a factor, and systems and the environment, personal and cultural adaptation of speed to keep up with the rapid development of science and technology as the inability conflict and confusion should lead to even. This paper the characteristics of the information society, with a look at the evolution of social risk factors as the wavelength of information about this look at the role of private security sought to evaluate. Information Society in time and space by shrinking the area of human life that has brought the convenience and simplicity, whereas the non-performance due to the nature of anonymous raises many social side-effects are. This made the preparation of national regulatory measures, but for the protection of personal protection devices in the private sector has not yet been discussed. Way of life and property of the purchaser to protect an individual's private security will have to charge it.

A study on Korean welfare policy examined through Mokminsimseo (목민심서를 통해 한국적 복지정책에 대한 연구)

  • kim Bong wha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.669-674
    • /
    • 2023
  • This study examined the specific contents of social welfare policies of the Joseon Dynasty through the analysis of Mokminsimseo, Aemin Sixjo and Jinhwang Yukjo, and identified the connection between them and today's social welfare policies. As a result, In the Care of the People, it contained the basic contents of the Elderly Welfare Act and welfare services for the elderly, and in the Freedom, it included welfare policy services related to infants and children, and the value system of welfare for the disabled through government affairs. The policy direction was confirmed, and it was found that disaster relief calls for social integration in response to social crises and disasters. This also confirmed that major areas of social welfare policy such as family safety, income security, health policy, and social integration have been emphasized through social welfare policy indicators. In addition, through the analysis of Qinhwangyukjo, it was found that it contains not only the basic ideology and values of the social security system and social insurance system in terms of visa, scale, and power, but also the details of specific policy implementation. Today's social welfare policies and social service policies, which are equipped with social welfare facilities and are implementing systematic social welfare services for each target, were able to confirm their foundation through the Qinhwangyukjo. This confirms that the emphasis on social integration and income security is prominent in the Qinhwangyukjo through the social welfare policy indicators of the current policy system.

The Role of Korea Institute for Health and Social Affairs (한국보건사회연구원의 역할)

  • Jo, Jaegoog
    • Health Policy and Management
    • /
    • v.28 no.3
    • /
    • pp.217-221
    • /
    • 2018
  • Korea Institute for Family Planning (KIFP) was established on July 1, 1971 (Law 2270) and Korea Health Development Institute (KHDI) was established on April 19, 1976 (Law 2857). Korea Institute for Population and Health (KIPH) was formed through the merger of KIFP and KHDI (Act 3417) on July 1, 1981. Korea Institute for Health and Social Affairs (KIHASA), the former KIPH, was renamed KIHASA on December 30, 1989 (Law 4181) with its additional function of research in social security. It was transferred on January 29, 1999 to the Office of State Affairs Coordination pursuant to the Law on the Establishment, Operation and Promotion of State-Sponsored Organizations (Law 5733). Annually it conducts approximately 50 short- and long-term research projects to accumulate a wide range of research experience. Also it studies and evaluates the primary issues of national health services, health and medical industries, social insurance, social security, family welfare, and population. it conducts joint research projects and active information exchange programs with related domestic and international organizations through seminars and conferences. It executes specific research and development projects according to the government's requests. it educates and trains people domestically and abroad by disseminating a wide-range of information on health and social affairs. it conducts national household surveys on areas of fertility, health and medical care of the disabled, the elderly, and low-income earners. The mid- and long-term research goals of KIHASA should be established and managed systematically. A new organization such as 'Center for Policy Evaluation' is needed to enhance research abilities and experiences. Able research personnels should be recruited and current researchers should try to develop their abilities.

A Study on the Countermeasure of Traffic Terror (대중교통테러의 대응방안)

  • Kim, Jin-Hyeok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.109-123
    • /
    • 2007
  • Traffic terror is one of the terror types subject on transportation means. However, unlike the aircraft or ship, there is no case of negotiating with passengers as hostage but to unconditionally attack that the human casualty would be much greater. In act, the terror on subway or bus would have much bigger damage than the terror on aircraft or ship. Because of such fact, there is a need for full preparation thereto, however, there is no preparation of advance preventive measure, particularly, when comparing to the cases involving aircraft. In addition, the passengers who use railway and others in the position of citizens do not have any defense mechanism against any terror activity to make the problem even more serious. Therefore, in order to prevent traffic terror, the first thing is to implement the identity confirmation of passengers, followed by the through search of cargos of the passengers, supplement the capability against the terror by the security team members, strengthen the responsive capability of citizens, thorough check on facilities, expansion of social security network and others. All terrors are within the reach of our neighborhood at the time when we neglect it, and the most secured and safe way to prevent the terror is to check and prepare at all times beginning from our familiar facilities or means.

  • PDF

Research on disaster management personnel improvement measure of local government

  • Young Ran Kim;JungHyun Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.1-9
    • /
    • 2023
  • The purpose of this study is to examine the disaster management system of local governments by diagnosing the current status of disaster management experts in Korea, deriving problems and improvement measures, and looking at local governments' total labor cost system. The status and status of disaster management personnel were compared and analyzed to find ways to improve the local government's disaster management response system under the Framework Act on Disaster and Safety Management in Korea. Considering Korea's reality, because national security and disaster management exist together, we devised a plan to improve on-site response capabilities and seek solutions by deriving the problems of the currently operating security and safety-related organizations.

A Study on the Safe Use of Data in the Digital Healthcare Industry Based on the Data 3 Act (데이터 3법 기반 디지털 헬스케어 산업에서 안전한 데이터 활용에 관한 연구)

  • Choi, Sun-Mi;Kim, Kyoung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.25-37
    • /
    • 2022
  • The government and private companies are endeavoring to help the digital healthcare industry grow. This includes easing regulations on the big data industry such as the amendment of the Data 3 Act. Despite these efforts, however, there have been constant demands for the amendment of laws related to the medical field and for securing medical data transmissions. In this paper, the Data 3 Act of Korea and the legal system related to healthcare are examined. Then the legal, institutional, and technical aspects of the strategies are compared to understand the issues and implications. Based on this, a legal and institutional strategy suitable for the digital healthcare industry in Korea is suggested. Additionally, a direction to improve social perception along with technical measures such as safe de-identification processing and data transmission are also proposed. This study hopes to contribute to the spread of various convergent industries along with the digital healthcare industry.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

The Proposal for Improvement of Legal System for the Persons with Disabilities (장애인복지 관련 법제의 발전방향)

  • Woo, Jooh-Hyung
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.125-170
    • /
    • 2011
  • In Korea, the evolution of welfare for people with disabilities can be divided largely four stages. The first phase is before 1981, the second is from 1981 to 1988, the third is from 1989 to 2006 and the fourth phase is from 2007 to now. In the first phase people with disabilities were considered as ones of charity. In the second period the welfare ideal for people with disabilities was appeared. In the third, the framework of welfare system for people with disabilities was formed and welfare services began to be expanded. The fourth phase has been the time to secure human right and social services for people with disabilities. In Korea, for people with disabilities, 2007 was the year of historical turning point. "The Act of Prohibition on Disability Discrimination and Remedy for Right"was built that year and became effective the next year. Also "The Special Education Act for People with disabilities" was enacted newly. "The Disabled Welfare Act" was amended for the change of welfare paradigm. The change is introduction of Independent Living. After 2007 Korean legal systems for people with disabilities have been improved largely.

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.