ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0316 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-12-13 ÃÑ ÆäÀÌÁö 18
ÇÑ±Û Ç¥Áظí Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼­ °³ÀÎÁ¤º¸ º¸È£ Áöħ
¿µ¹® Ç¥Áظí Guidelines on the Protection of Personally Identifiable Information in Cloud Computing Environments
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ÆÛºí¸¯ Ŭ¶ó¿ìµå ȯ°æ¿¡¼­ Ŭ¶ó¿ìµå ¼­ºñ½º ÀÌ¿ëÀÚ°¡ Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚ¸¦ ¼±ÅÃÇÒ ¶§³ª °è¾àÀ» ü°áÇϱâ Àü¿¡ °í·ÁÇØ¾ß ÇÒ Å¬¶ó¿ìµå ¼­ºñ½º ÀÌ¿ëÀÚ¿¡ ´ëÇÑ °³ÀÎÁ¤º¸º¸È£ Áöħ, Ŭ¶ó¿ìµå ÀÌ¿ëÀÚÀÇ ¿ä±¸»çÇ×À» ¸¸Á·ÇÏ´Â °Å¹ö³Í½º ü°è¸¦ °®Ãß°í ÀÖÀ½À» º¸¿©Áִ Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚ¿¡ ´ëÇÑ °³ÀÎÁ¤º¸º¸È£ Áöħ, ±âÁ¸ Á¤º¸º¸È£°ü¸®Ã¼°è¿¡ Ŭ¶ó¿ìµå Ưȭ ÅëÁ¦¸¦ ´õÇØ °³ÀÎÁ¤º¸º¸È£°ü¸®Ã¼°è ±¸ÃàÀ» À§ÇÑ ÁöħÀ¸·Î ±¸¼ºµÈ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard describes PII protection guidelines which can be used by cloud service customer before enforcing agreement with cloud service providers and cloud service providers which demonstrate that they satisfy all PII specific requirements requested by cloud service customers, and which present methods for establishing PII specific management.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0316.pdf TTAK.KO-12.0316.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼­ °³ÀÎÁ¤º¸ º¸È£ Áöħ TTAK.KO-12.0316 2017-12-13 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0316.pdf