Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAS.KO-06.0111 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2006-03-15 ÃÑÆäÀÌÁö 0
ÇѱÛÇ¥Áظí RFID ÇÁ¶óÀ̹ö½Ã º¸È£ °¡À̵å¶óÀÎ
¿µ¹®Ç¥Áظí RFID Privacy Protection Guideline
Çѱ۳»¿ë¿ä¾à 1. Ç¥ÁØÀÇ ¸ñÀû
º» Ç¥ÁØÀÇ ¸ñÀûÀº RFID ½Ã½ºÅÛÀÇ ÀÌ¿ë¿¡ µû¸¥ ÀÌ¿ëÀÚÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ º¸È£ÇÏ°í ¾ÈÀüÇÑ RFID ÀÌ¿ëȯ°æÀ» Á¶¼ºÇÏ´Â °ÍÀ» ¸ñÀûÀ¸·Î ÇÑ´Ù.

2. ÁÖ¿ä ³»¿ë ¿ä¾à
ÁÖ¿ä ³»¿ëÀ¸·Î´Â RFID Ãë±Þ»ç¾÷ÀÚÀÇ RFID ű׿¡ °³ÀÎÁ¤º¸ ±â·ÏÀÇ ±ÝÁö, RFID ű׸¦ ÅëÇÑ °³ÀÎÁ¤º¸¸¦ ¼öÁýÇÏ´Â °æ¿ì ´çÇØ ÀÌ¿ëÀÚ¿¡°Ô ÅëÁö ȤÀº Ç¥½Ã, RFID ű×ÀÇ ¹°Ç°Á¤º¸ µî°ú °³ÀÎÁ¤º¸ÀÇ ¿¬°è ½Ã ÀÌ¿ëÀÚ¿¡°Ô ÅëÁö ȤÀº Ç¥½Ã, ÀÌ¿ëÀÚ°¡ ¾Ë¾Æº¼ ¼ö ÀÖµµ·Ï RFID ÅÂ±× ºÎÂø »ç½Ç ¹× RFID ű×ÀÇ ±â´ÉÁ¦°Å ¹æ¹ý µî¿¡ ´ëÇØ Ç¥½Ã µîÀ» ´ã°í ÀÖ´Ù.
±× ¿Ü¿¡, RFID ű×ÀÇ ÀÎüÀÌ½Ä µî ±ÝÁö, RFID ¸®´õ±â ¼³Ä¡ÀÇ Ç¥½Ã, RFID ½Ã½ºÅÛÀÇ °³ÀÎÁ¤º¸º¸È£¸¦ À§ÇÑ °ü¸®Àû?±â¼úÀû Á¶Ä¡, RFID ½Ã½ºÅÛ¿¡ ´ëÇÑ ÇÁ¶óÀ̹ö½Ã ¿µÇâÆò°¡, °³ÀÎÁ¤º¸°ü¸®Ã¥ÀÓÀÚÀÇ ÁöÁ¤, RFIDű׿¡ ´ëÇÑ ÀÌ¿ëÀÚÀÇ ÀÎ½Ä Á¦°í, °³ÀÎÁ¤º¸ ÀÌ¿ë?Á¦°ø?Æı⠵îÀ» ´ã°í ÀÖ´Ù.

3. Ç¥ÁØ Àû¿ë »ê¾÷ ºÐ¾ß ¹× »ê¾÷¿¡ ¹ÌÄ¡´Â ¿µÇâ
RFID ±â¼úÀº Àü ¼¼°èÀûÀ¸·Î »ê¾÷ Àü¹Ý¿¡ °ÉÃÄ °¡Àå Å« ¿µÇâÀ» ¹ÌÄ¥ ¼ö ÀÖ´Â ±â¼úÀÇ Çϳª·Î »ê¾÷±¸Á¶, ½ÃÀ屸Á¶ÀÇ º¯È­»Ó¸¸ ¾Æ´Ï¶ó Àΰ£ÀÇ »îÀÇ ÇüűîÁö º¯È­½Ãų ¼ö ÀÖ´Â Áß¿äÇÑ ¹Ì·¡ ±â¼úÀÌ´Ù. ±×·¯³ª RFIDÀÇ ´ëÇ¥Àû Ư¼ºÀÎ »ç¿ëÀÚ Á¤º¸¿¡ÀÇ ¡°ÃßÀû?Á¢±Ù ¿ëÀ̼º¡±À¸·Î »ç¾÷ÀÚÀÇ ¿À³²¿ë ¶Ç´Â RFIDÀÇ ¿ÀÀÛµ¿À¸·Î ÀÎÇÑ ÇÁ¶óÀ̹ö½Ã ħÇØÀÇ À§Çù Áõ´ë ¿ì·Á°¡ Á¦±âµÇ°í ÀÖ´Ù. º» Ç¥ÁØ¿¡¼­ Á¦°øÇÏ´Â °¡À̵å¶óÀÎÀº RFID ½Ã½ºÅÛÀÇ ÀÌ¿ë¿¡ µû¸¥ ÀÌ¿ëÀÚÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ º¸È£ÇÏ°í ¾ÈÀüÇÑ RFID ÀÌ¿ëȯ°æÀ» Á¶¼ºÇϴµ¥ ±â¿©ÇÒ °ÍÀÌ´Ù.
¿µ¹®³»¿ë¿ä¾à 1. The Purpose of Standard
The aim of RFID privacy protection guidelines is to protect a user's privacy, and at the same time, to create an environment where services using RFID can be safely offered.

2. The summary of contents
This guideline contains the following items: Limit on the writing of personal information on RFID, Limit on the collection of personal information via RFID, Connection of personal information and goods information, etc through RFID, Notification of the fact that RFID is attached, Notification of mechanism for Stopping Function of RFID by Consumer, Limit on the transplanting a RFID tag on a human body, Notification about the installation of RFID Reader, Technical and Administrative actions for protecting personal information of RFID system, Privacy Impact Assessment of RFID System, Appointment of a person in charge of personal information management, Fortification of the recognition on RFID, Use, provide and destroy of personal information beyond the guideline, etc.

3. Applicable fields of industry and its effect
RFID is a core technology of ubiquitous computation which is expected to make renovation in security, safety, environmental control, etc. as well as material network establishment, stock control, and robbery prevention through real time handling of information. That is, it is supposed to maximize synergy effect and to contribute to increasing of diversity and convenience of life in connection with newly growing industry such as telematics, home network, etc. However, there is worry of increasing infringement of privacy due to mal-use of supplier or mal-function of RFID because of "easy pursuit and access" to user information which is representative characteristics of RFID. These guidelines contribute to the creation of an environment where RFID can be safely used, and the prevention of violation of consumer personal information and privacy according to the use of RFID by defining basic items that those who (hereinafter "business groups") deal with products attached with RFID and services related to it (hereinafter "goods").
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-06.0111_[1].zip
Ç¥ÁØÀÌ·Â
±¸ºÐ ÀÏÀÚ Ç¥ÁعøÈ£ º¯°æ³»¿ª
°³Á¤ 2011-12-21 TTAE.IT-X.1275
ÆóÁö 2015-12-16 TTAS.KO-06.0111 Ç¥ÁØ ¹Ì»ç¿ë
(Á¤Ã¥Àû °¡À̵å¶óÀÎÀÌ°í È°¿ëµµ°¡ ÀúÁ¶)

ÀÌÀü
URL(Uniform Resource Locator) ±â¹ÝÀÇ RFID ÄÚµå ü°è
´ÙÀ½
¸ð¹ÙÀÏ RFID ÄÚµå µî·Ï ÇÁ·ÎÅäÄÝ