Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0316 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-12-13 ÃÑÆäÀÌÁö 18
ÇѱÛÇ¥Áظí Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼­ °³ÀÎÁ¤º¸ º¸È£ Áöħ
¿µ¹®Ç¥Áظí Guidelines on the Protection of Personally Identifiable Information in Cloud Computing Environments
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ÆÛºí¸¯ Ŭ¶ó¿ìµå ȯ°æ¿¡¼­ Ŭ¶ó¿ìµå ¼­ºñ½º ÀÌ¿ëÀÚ°¡ Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚ¸¦ ¼±ÅÃÇÒ ¶§³ª °è¾àÀ» ü°áÇϱâ Àü¿¡ °í·ÁÇØ¾ß ÇÒ Å¬¶ó¿ìµå ¼­ºñ½º ÀÌ¿ëÀÚ¿¡ ´ëÇÑ °³ÀÎÁ¤º¸º¸È£ Áöħ, Ŭ¶ó¿ìµå ÀÌ¿ëÀÚÀÇ ¿ä±¸»çÇ×À» ¸¸Á·ÇÏ´Â °Å¹ö³Í½º ü°è¸¦ °®Ãß°í ÀÖÀ½À» º¸¿©Áִ Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚ¿¡ ´ëÇÑ °³ÀÎÁ¤º¸º¸È£ Áöħ, ±âÁ¸ Á¤º¸º¸È£°ü¸®Ã¼°è¿¡ Ŭ¶ó¿ìµå Ưȭ ÅëÁ¦¸¦ ´õÇØ °³ÀÎÁ¤º¸º¸È£°ü¸®Ã¼°è ±¸ÃàÀ» À§ÇÑ ÁöħÀ¸·Î ±¸¼ºµÈ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes PII protection guidelines which can be used by cloud service customer before enforcing agreement with cloud service providers and cloud service providers which demonstrate that they satisfy all PII specific requirements requested by cloud service customers, and which present methods for establishing PII specific management.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0316.pdf TTAK.KO-12.0316.pdf            

ÀÌÀü
Á¤º¸±â¼ú - µ¥ÀÌÅÍ ¿ä¼ÒÀÇ ¸í¼¼¿Í Ç¥ÁØÈ­ - Á¦1ºÎ : µ¥ÀÌÅÍ ¿ä¼ÒÀÇ ¸í¼¼¿Í Ç¥ÁØÈ­¸¦ À§ÇÑ ±âº»Æ²
´ÙÀ½
Á¤º¸±â¼ú - °³¹æÇü ºÐ»ê ó¸® - Æ®·¹À̵ù ±â´É Á¦1ºÎ: ¸í¼¼