Korean Security Protection Law is getting better -certain laws are getting revised,
Those that are applied in 2012 are as follows
1. Prohibit managers from using users’ private information
expiration time of personal information
2. Activate personal information protection law
Encryption of personal information
OECD Privacy Protection
ISTPA’s identity protection frame
IPC’s 10 f
personal information. They have to wait until the product is delivered and if the product is unsatisfying their expectation or has a defect itself, consumers have to return or exchange items, which will cause huge inconvenience for them
- Controlling activities: In order to provide a high quality customer experience, Blue Nile has to continue to invest substantial amounts of resources in our web
information systems and networks. Although the guideline is subject to further review, it proposes 9 principles that each member state should adopt to promote a culture of security.
The principles are:
Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security, they also should be aware of the potential harm to
occupations (139,064) in NY. Others service occupations in US are 24,634 [Exhibition12] (Bureau of labor statistics, 2011).
In U.S. here are several organizations related in consumer. Especially, the most well known organization is U.S. Food and Drug Administration (FDA). They protect the public health by assuring that foods are safe, wholesome, sanitary and properly labeled. It advocates
The Concept of Government Information
Information provided by Gov.
include all publication, information, data, records.
the government website does prevalent role nowadays.
make people understanding how toperform their Government policies.
know the reality of policies of Government
Internet Tech Development
Before development tech.
by writing down or typing and keeping in e