Korean Security Protection Law is getting better -certain laws are getting revised,
Those that are applied in 2012 are as follows
1. Prohibit managers from using users’ private information
expiration time of personal information
2. Activate personal information protection law
Encryption of personal information
OECD Privacy Protection
ISTPA’s identity protection frame
IPC’s 10 f
Regulation of IT Risk
In order to regulate the IT risk, governments work to address threat to computer crime. For example, representatives of 29 countries - including Canada, Japan and the U.S. – signed the Council of Europe Cybercrime convention in 2001. The convention deals with substantive and procedural cybercrime law. The substantive defines the following activities as crimina
We are facing the moment that we have to make a decision about Seo and Lee’s case.
According to the land -mark decision,
If the plaintiff (See & Lee) doesn’t sue the defendant
( Media & puplic), even though they have been damaged their social value, the defamation law doesn’t work.
Moreover, It cannot be concluded as an Invasion of Privacy here on account of that they are de
Ⅰ. 서론
가상화 과정에서는 막대한 조직의 변화가 수반된다. 가상 기업은 기업 환경의 변화에 즉시 대응할 수 있는 “실시간” 기업이다. 업무절차 재혁신의 주요한 동인 중의 하나는 인력의 유연성과 적응성이다. 전자상거래 환경 하에서는 많은 조직의 학습과 적응이 필요하고 새로운 업무 기술이
2. Invasion of privacy
We are facing the moment that the decision has to be made about the case of Seo and Lee. As students studying journalism, we have been learning what news should be or have to be. Unfortunately, some media have been invading their private life(Seo&Lee's). But, in some points, it seems they(the media) just do what people want if 'Right to know' is thought as a priority. As