Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAS.KO-12.0053 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑÆäÀÌÁö | 24 |
ÇѱÛÇ¥Áظí | °³ÀÎÁ¤º¸ »ý¸íÁֱ⺰ º¸¾È °ü¸®¸ðµ¨ | ||
¿µ¹®Ç¥Áظí | Security Management Model for Life Cycle of Personal Information | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº °³ÀÎÁ¤º¸ °ü·Ã ±âº»Á¤ÀÇ ¹× °³ÀÎÁ¤º¸ÀÇ Áß¿äµµ¿¡ µû¸¥ ºÐ·ù ±âÁØÀ» Á¤ÀÇÇÏ°í,
°³ÀÎÁ¤º¸ÀÇ ¼öÁý, ÀúÀå ¹× °ü¸®, ÀÌ¿ë ¹× Á¦°ø, Æı⿡ À̸£´Â »ý¸íÁֱ⿡ µû¶ó ¿ä±¸µÇ´Â ´Ù¾çÇÑ °³ÀÎÁ¤º¸ º¸¾È¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. ƯÈ÷, °³ÀÎÁ¤º¸ »ý¸íÁֱ⺰ º¸¾È¿ä±¸»çÇ×Àº »ý¸íÁֱ⿡ µû¸¥ º¸¾È ħÇØÀ§Çù ¹× ħÇعæ¹ý¿¡ ´ëÇØ °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇÑ ±â¼úÀû, °ü¸®Àû ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | This standard describes basic definitions related with personal information and
classifies personal information by importance. And this standard suggests security requirements that help IT service provider to manage personal information securely, when they collect, store, use and destroy personal information. Moreover, this standard describes various privacy infringement causes and measures. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAS.KO-12.0053.pdf |