Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAS.KO-12.0053 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2007-12-26 ÃÑÆäÀÌÁö 24
ÇѱÛÇ¥ÁØ¸í °³ÀÎÁ¤º¸ »ý¸íÁֱ⺰ º¸¾È °ü¸®¸ðµ¨
¿µ¹®Ç¥Áظí Security Management Model for Life Cycle of Personal Information
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº °³ÀÎÁ¤º¸ °ü·Ã ±âº»Á¤ÀÇ ¹× °³ÀÎÁ¤º¸ÀÇ Áß¿äµµ¿¡ µû¸¥ ºÐ·ù ±âÁØÀ» Á¤ÀÇÇÏ°í,
°³ÀÎÁ¤º¸ÀÇ ¼öÁý, ÀúÀå ¹× °ü¸®, ÀÌ¿ë ¹× Á¦°ø, Æı⿡ À̸£´Â »ý¸íÁֱ⿡ µû¶ó ¿ä±¸µÇ´Â
´Ù¾çÇÑ °³ÀÎÁ¤º¸ º¸¾È¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. ƯÈ÷, °³ÀÎÁ¤º¸ »ý¸íÁֱ⺰ º¸¾È¿ä±¸»çÇ×Àº
»ý¸íÁֱ⿡ µû¸¥ º¸¾È ħÇØÀ§Çù ¹× ħÇعæ¹ý¿¡ ´ëÇØ °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇÑ ±â¼úÀû,
°ü¸®Àû ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes basic definitions related with personal information and
classifies personal information by importance. And this standard suggests security
requirements that help IT service provider to manage personal information securely,
when they collect, store, use and destroy personal information. Moreover, this
standard describes various privacy infringement causes and measures.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-12.0053.pdf TTAS.KO-12.0053.pdf            

ÀÌÀü
ÄÄÇ»ÅÍ Æ÷·»½Ä °¡À̵å¶óÀÎ
´ÙÀ½
»çÀ̹ö°ø°Ý ÃßÀû À̺¥Æ® ±³È¯ Æ÷¸Ë