页面标题背景 PC版本页面标题背景 移动版本

业务领域

Information Security

To find legal advice on information protection is the best way to prevent legal risk. The importance of privacy is more emphasised than time. News /p>

CONTENTS
  • 1. Information Protection | Legal Needs
    • - Copyright (c) 2015 SHINSEGAE. All Rights Reserved.
  • 2. Copyright (C) 2018. All Rights Reserved.
    • - Criminal punishment and administrative disposition
  • 3. Information Protection | Major Risks To Be Reduced by Management Mibi City
    • - Copyright (c) 2015 SHINSEGAE. All Rights Reserved.
    • - Trade contract termination and risk of business disruption
    • - Responsible for damages due to industrial density and sales density flux
  • 4. Information Protection | Duty not optional
    • - Copyright © 2015 COINJINJA K.K. All rights reserved.

1. Information Protection | Legal Needs

Protective Legal necessity

Protective is strategically placed beyond just legal obligations.

The 4th Industrial Revolution and Digital Transformation accelerated data to the core asset of the enterprise and the importance of information protection is more emphasised than ever. News br>
Unique Privacy Act, Privacy Policy, The Company uses ‘cookies’ that frequently save and retrieve your information. A cookie is a very small text file that the server, used to operate the Company’s website, sends to your browser. The file is saved in the hard disk of your computer. News

Incorporation of Incorporation of private equity and equity risk factors related to information protection, which should be integrated into real-world law strategy.

Information Protection is an essential element that secures the trust and sustainability of enterprise beyond just legal obligations.

Each company is a systematic preparation for information protection risk, It is the point of strategic approach to strengthen corporate reputation protection and competitiveness. <% if (imgObj.width >= imgObj.height) { %>

Copyright (c) 2015 SHINSEGAE. All Rights Reserved.

The company must conduct the following contents for information protection. News br>
1. Internal privacy policy check and improvements


Privacy policy and internal regulations Comprehensive review

Privacy collection·Using and checking procedures and maintenance

Privacy impact evaluation (PIA) implementation and results reporting


2. Legal Response Strategy Establishment and Administrative Disposal


Construction of administrative services such as deposits, pay fees, visibility commands, etc.

Construction of personal information disputes and administrative services consulting

3. Information protection education and employee awareness program provided


Privacy Policy and related statutes education

Privacy leak cases and response manual training

4. Personal information leak incident response and response system construction

In case of leakage accidents, emergency response procedure is established

In case of accidents investigation and cause analysis support

In case of victims notice, report and follow-up action implementation

5. IT·Security System Advisory for privacy

Security Policy and Access Control System Design Advisory

Privacy Encryption, Accessibility Management Implementation

6. Personal information protection related contracts·Form review and creation

Privacy Policy, Collection of Personal Information and Use Agreements

Non-Millisecond Contract Review

Internal Policy and Manual Legal Advisory

2. Copyright (C) 2018. All Rights Reserved.

The government and public institutions have the right to personal information. News br>

1. Personal information will only be collected at least required information

2. We will not handle sensitive information such as resident registration number and health information without the basis of law

3. We will use different purpose of collecting personal information or not to provide third parties

4. Personal information processing policy will be disclosed to the privacy policy

5. To ensure the stability of the personal information is not leaked by hacking

6. If you are a member of our website, we will introduce you to the replacing of the resident number.

7. When the purpose of collection of personal information is achieved, it will immediately be destroyed.

8. If your personal information is leaked, you will notify the information subject within 5 days

9. If you run a CCTV, you will need to install a guide panel that addresses the purpose of installation, shooting range, operating policy, etc.

Information protection obligations and if your personal information is leaked, you will be punished by the following figures: News /p>

Criminal punishment and administrative disposition

actBare water level
If you provide personal information to third parties without the consent of the information subject 5 years or less fine

If the information is not obliged to provide the information protection obligation, the Company will receive the following administrative disclosures. News /p>

Exclusive charge in a range that does not exceed 3% of total revenues
*In the privacy statements of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree of the Enforcement Decree: 2.1% or more 2.7% or less

Volunteer: <% if (imgObj.width >= imgObj.height) { %> Less than 0.9%
Approximately violated: 0.03% or less than 0.9%

actDisposable
시정조치
Reel Reel

3. Information Protection | Major Risks To Be Reduced by Management Mibi City

Protective risks

If the company does not comply with the information protection management system or legal obligations, it is appropriately punishable. In addition to administrative disposition, it is also serious that the zontal itself of the enterprise.

You will find more details on the following items: News /p>

Copyright (c) 2015 SHINSEGAE. All Rights Reserved.

When the information protection accident occurs, is a serious blow on corporate brand and reputation.

Customers and traders can direct their personal information leaks and hacking incidents to the company’s trust drops, to impose high interests such as downtime, contract termination, withdrawal of investment, etc.

One dude trust is very difficult to recover, long-term sales drops and increased management.

Specification of personal information, such as financial, medical, education, etc., is greater damage. News /p>

Trade contract termination and risk of business disruption

If you charge an external IT service such as cloud service, AI platform, information protection provisions are included, and if you violate this, you may be subject to contract termination and service suspension immediately. News br>
This may be spread to customer data access control, damage claims, additional legal disputes as well as service failures. News br>
Compliance with information protection obligations on contracts is key to securing business continuity. News /p>

Responsible for damages due to industrial density and sales density flux

In case of leaking industrial technology, sales density, customer information, etc. managed inside the company, has serious damage to the competitors and may result in damages to civil damage claims . News br>
In case of special spills or due to maintenance, the court will acknowledge significant damages. News br>
This event will lead to corporate competitiveness and trust in the market. News /p>

4. Information Protection | Duty not optional

Data protection is mandatory

is simply not responsible for the technical and technical issues of IT.

Protecting personal information surrounding the company today, Privacy Policy, AI Data Ethics, Information protection laws such as industrial confidentiality protection are very complex and rapidly changing, so you don’t know exactly what you do and if you don’t comply with it, you’ll need to have a great compensation and criminal punishment, Send can face great interests such as reputation losses. News /p>


In accordance with this, the company will inspect the privacy laws and regulations systemically and establish internal guidelines and security systems that meet the latest laws. The information protection provisions of the contract must be thoroughly reviewed.

Also Check the processing process of personal information protection training and personal information processing for all employees, The information protection compliance check system operation must be carried out in accordance with actual risk management .


Company’s information protection capability is now the basis of competitiveness and trust management.

The information protection system building and law risk management will soon be clearly recognized as the strategy to ensure the trust of customers and the value of the enterprise and will be governed by the legal risk through systematic management system. News /p>

Copyright © 2015 COINJINJA K.K. All rights reserved.

敬请查看与该业务案例
相关的视频内容。

  1. ‘Right to request transmission of personal information’ fully implemented... The need for data utilization is increasing compared to companies and institutions

相关信息
背景

大伦的核心优势

大伦律所独有的 AI·IT
技术应用诉讼策略
260名以上
核心成员
每月 1,200+
案件受理量

* 2026년 1월 변호사협회 경유증표 발급 기준

*遵守大韩律协广告规定第4条第1项

律师
法律咨询预约

所有咨询都将在专业律师审核案件后进行,
为了专业地进行,将采用预约制。

请尽早预约咨询,
请遵守预约时间。
我们将尽力提供令您满意的咨询服务。

电话
咨询 1800-7905

365天24小时
可受理咨询

电话预约

Kakao
咨询

Kakao Talk频道

大伦法律法人 律师

Kakao预约

在线
咨询

为您提供
定制化法律服务。

在线预约
Quick Menu

KakaoTalk