• 4th APB Forum, Fall 2017

    Privacy by Design Across Border

  • Keynote Speech

    A Case on International Cooperation Viewed through Personal Information Breach

    in Hong Kong

    - Stephen WONG (Privacy Commissioner for Personal Data, Hong Kong)

    With the webcam hacking incident and the customer data leakage incident of VTech in Hong Kong, we realized the importance of global cooperation to solve issues regarding personal information breach. To protect victims whose hacked information had spread online as far as the UK, the PCPD Hong Kong requested the British government to ban monetary trade of webcam data to prevent exposure of privacy. In the case of VTech, leaked information of customers spread all around the world and the PCPD Hong Kong worked as a hub for sharing and delivering information about the case to each country to obtain cooperation for protection of personal data and implementation of new security policies.

    Do Not Assume that Future Technology Will Bring Happiness to Us

    - Eunkook SUH (Professor of Psychology, Yonsei University)

    Technology has brought us a more comfortable, efficient, and safer life. So,
    are we happier than ever? It is known that we feel happy when a “pleasure
    light bulb” flickers in our brain. The pleasure light bulb flickers, for example,
    when we eat delicious food or spend time with good people. A sense of social
    belonging is one of the most basic desires for humans to feel happiness.
    Then, how can science and technology satisfy our desire to feel this sense of
    social belonging? Can the need for the sense of belonging be fulfilled through
    online social network services? It is time for us to have a more thorough
    discussion on ICTs and psychological happiness.

  • Track A. Asia Privacy Bridge Forum

    Evelyn GOH

    (Communication Policy, PDPC, Singapore)

    In the time of a rapidly changing digital economy, responsibilities between nations on privacy protection are becoming more important than ever. As the policies of each country on privacy protection are different, a bridge to connect them is needed. It is important to reinforce privacy protection and cooperative research for mutual benefits by sharing information and knowledge to develop a mechanism that can transfer data between countries.

    Hyein SONG

    (Korea Internet & Security Agency, South Korea)

    It is necessary to build a regional privacy cooperation system using a multidimensional approach to establish effective privacy protection policies between countries. In the domestic/personal sector, KISA has conducted research on privacy in cooperation with academia and tried to reflect the result on policy development. The region/government sector aims to establish multidisciplinary cooperation between parties in terms of executing privacy protection law. In the global/government sector, we need to consider how to apply solutions that are derived through international discussions into domestic laws.

    Takayuki KATO

    (Asia University, Japan)

    Japanese government has a regulation to limit international data transfer. Data generated in Japan can be transferred only to the countries where PIPC (Personal Information Protection Commission) sets the privacy protection level. This resembles the conformity assessment of the EU. However, there is still a need for further agreement among nations about the scope of the consent and the definition of data transfer across borders. Since international data transfer is more complicated than domestic transfer, the demand for proper assessment increases.

    Sonny ZULHUDA

    (Civil Law Department, Ahmad Ibrahim Kulliyyah of Laws, International Islamic University, Malaysia)

    The judicial branches and assembly in Malaysia are actively discussing privacy. The Executive Committee is responsible for implementing enforcement regulations in two ways. One is by promoting the principles of industrial practice, and the other is through law enforcement and prosecution.
    Indonesia does not have any clear regulations on this matter. There are few legal frameworks, but they are still in the pre-implementation phase. Enactment of major privacy protection laws will take longer time.

    Beomsoo KIM

    (Barun ICT Research Center, Yonsei University,

    South Korea)

    Korea will strive to continuously establish close cooperation between countries with the help of Privacy International Cooperation Center, APEC CBPRs, and the APB Forum. With the Privacy International Cooperation Center, we will conduct research on privacy protection regulations of foreign countries and support the people and enterprises of Korea. Through the participation of APEC CBPRs, we will support the establishment of privacy policies that are aligned with the APEC Privacy Framework. With APB Forum, we plan to improve privacy rights, such as redressing privacy, by understanding the diversity of privacy laws in Asian nations and building friendly relations with them.

    Yanqing HONG

    (Internet Development Research Institute,

    Peking University, China)

    If private information needs to be provided at the request of the operation of an institution, security evaluation must be carried out with the relevant department of State Council in accordance with measures enacted by the national Internet information department. If there is other regulation under the law, then that regulation takes precedence. Data that may cause harm to national and public interests through violation, loss, abuse, falsification, destruction, accumulation, merger, and analysis is considered as “important”.

    Kwangbae PARK

    (Lee & Ko, South Korea)

    In the big data era, it is necessary to review the concept of generated information inferred from observed personal data. A legal basis to create and use such data must be established. The existing prior-consent framework needs to be revised and the legal terms related to a preliminary notice on
    collection and use of the generated information must be added to the law. It is also important to discuss the necessity of supplementary provisions related to the data subject for inferred data.


    (Law Enforcement University of Mongolia,Mongolia)

    Mongolia must take the following measures to strengthen the legal system for privacy protection.
    First, research to develop privacy protection must be carried out. In addition, the privacy protection system must be improved to focus on data types and activities in the specific industries such as financial service, health and medical service, and communication. Special laws on privacy protection must also be enacted and each legal procedure must be supplemented to meet international


    (Ministry of Finance and Mass Media, Sri Lanka)

    The people of Sri Lanka have low awareness on Privacy-related laws and legal rights. Self-regulated acts through behavior rules developed by the industrial circles are carried out as an alternative to government regulation. It is necessary to make an effort to implement data protection laws suggested by the EU Guidelines.

  • Track B. 4th Industrial Revolution and Change in Jobs

    The future of artificial intelligence and its impact on jobs

    by Tony LEE (Manager, NVIDIA)

    Data scientists are becoming popular with the increased connection between devices and the development of artificial intelligence, machine learning, and deep learning. Data scientists analyze a massive volume of structured and unstructured data and provide analysis results according to the needs or purposes of client companies. An analysis report written by data scientists should be easy enough to be understood by the general public.

    3D Printer, maker movement and the 4th Industrial Revolution

    by San KO (CEO, ATEAM VENTURES Co, Ltd.)

    ATEAM VENTURES, founded in September 2013, designed a new, high-quality 3D printer that can be easily used by anyone. Recently, it also launched “Shapeengine,” which is an online manufacturing platform. The goal of ATEAM VENTURES is to build an environment where people can use the factories and equipment as their own. In the era of the digital manufacturing revolution, through the democratization of manufacturing, anyone can become the main agent of production.

    Drone industry and job prospects in the era of 4th Industrial Revolution

    by Bosung LEE (Researcher, Korea Aerospace Research Institute, Unmanned Vehicle Advanced Research Center)

    A drone is a prosumer-oriented product that combines the expertise of various fields, including hardware, software, communication, electronics, and machinery. Individuals or specialized companies of small scale have advantages over mass-production a drone will play active roles than
    a single company focusing on mass production. The possibility of applying advanced technologies of the existing industry to a drone is expanding, and companies and producers that can accurately read the needs of consumers will succeed in the future. A market that prioritizes individual’s ability over the size of a business will be established.

    Job issues and government responses in the era of 4th Industrial Revolution

    by Pansik HWANG (Assistant Manager, Ministry of Science and ICT, Future HR Development Division)

    Up to 47.9% of existing jobs will be replaced by automation due to job changes by the 4th Industrial Revolution, and about 80,000 new jobs in the field of intelligent information will be created by 2030. The possibility of automation within the same occupation group will be different according to duty. Job mismatching by field has been intensified, causing unemployment and manpower shortage at the same time. Jobs are scarce in simple repeated works, while occupations that require creative or professional competence suffer from a shortage of talent. In response to this, new promising jobs must be discovered, and technologies and knowledge required for these new jobs must be found. It is also necessary to foster the related industries by developing qualifications through new training and education programs.

    ICT advancement and job changes

    by Kang-shik CHOI (Professor, Department of Economics, Yonsei University)

    The 4th Industrial Revolution can be characterized as destructive innovation and massive discontinuity, with overflowing anxiety similar to the 1st Industrial Revolution. However, there is also a positive view that artificial intelligence is just a tool, and advancement of new technologies will bring changes in the process of manufacturing. There are two types of jobs that will not be computerized: abstract jobs and service industries, such as security guards, cleaners, drivers, flight crew, food service workers, and home care aids. These
    jobs will have an increase in employment due to developing technologies and complementary relations. However, repeated works such as production jobs, office jobs, and sales jobs will be computerized and replaced with technologies regardless of how complicated they are, which will lead to a gradual decrease in employment.

  • Track C. Cyber-bullying & Internet Ethics

    Internet use and family relations of cyberbullying victims

    by Young-sam KOH (Professor, Tongmyong University)

    17.2% of elementary/middle/high school students responded that they have experienced cyberbullying in the past year. Cyberbullying is a very serious problem for general netizens, including teenagers, but basic researches on the causes, progress, and results of cyberbullying are still insufficient.
    As a result of investigating a correlation between use of Internet, cyberbullying, and family relations, the more people use Internet, the less the bond and closeness between family members are formed. Damages from cyberbullying are higher when the bond and closeness between family members are low. Involvement of parents, supervisors, or families on Internet use by teenagers can play a big role in preventing cyberbullying from anonymous online attackers.

    The current condition of cyberbullying connected to school violence

    by Seung Hye KIM (Head of Agency, Blue Tree Agency)

    Studies on cyberbullying show that teenagers with higher digital literacy and higher usage of cohesive social media, such as Kakao Talk or Facebook, have more experiences with cyberbullying. Bonding with parents can reduce cyberbullying, and a free and open conversation with parents can reduce verbal violence via mobile phones.
    To prevent and respond to cyberbullying, it is necessary to carry out activities such as expansion of cyber ethics, reinforcement of comprehensive media literacy education, invigoration of a self regulatory control system, encouragement of report and consultation related to cyberbullying, expansion of programs that can promote social interactions, supporting teenagers to solve
    cyberbullying voluntarily, and training cyber mentors as peer coordinators.

    Current status and counter measures of cyberbullying between teenagers

    by Changho LEE (Senior Research Fellow, National Youth Policy Institute)

    Cyberbullying events have significant negative impacts because the number of witnesses is higher than offline and traces of bullying remain longer in cyberspaces. Cyberbullying is distinct from traditional bullying that happens when a bully and a victim are physically in the same place, because it happens in online spaces based on anonymity, and therefore, people can act without restraints.
    It is necessary to prepare countermeasures against cyberbullying such as strict punishment on the cyber bullies, training of cyber mentors, awareness on the seriousness of cyberbullying, and reinforcement of education for parents.

    A new direction of Internet ethics education

    by Cheung Moon CHO (Principal Researcher, National Information Society Agency)

    The current education on Internet ethics is not systemic due to the lack of consent on its purpose and contents. Since it focuses on deviant behaviors, education on ethical online behaviors is still inadequate. Teaching methods are insufficient and impractical. Thus, it is important to suggest principles that are differentiated from general ethics education and provide learner-centered
    education from the perspective that students are subjects that can think and form meanings.

    A plant for Internet ethics education to cope with pleasure of Internet addiction and bullying

    by Mi-sun YOON (Associate Researcher, Seoul Women’s University)

    Activities for preventing/confronting cyberbullying are suggested as follows:
    1) Expanding education on ethics of cyberspaces and reinforcing integrated media literacy education;
    2) Invigorating a self-regulatory system;
    3) Encouraging reporting and counseling related to cyberbullying;
    4) Expanding programs for promoting social interactions, supporting teenagers to solve cyberbullying voluntarily, and training cyber mentors as peer coordinators;
    5) Promoting moderate use of media and practice of cyber ethics;
    6) Increasing cognitive empathy and cyber ethics, developing and implementing arbitration programs to increase the level of satisfaction in schools;
    7) Enacting and implementing school regulations related to cyberbullying and arranging laws related
    to school violence.

  • Track D. Barun ICT Research Projects

    Suicide in Korea – Analysis and prevention

    by Sang Joon KIM (Professor, Yonsei Univ. Department of Political Science & International Studies)

    The suicide rate in OECD countries other than Korea has been decreasing, while Korea particularly has a higher suicide rate. In the case of elders, a rapid decrease in ability to take care of personal affairs as they age causes depression.
    The introduction of Telemedicine, a mobile and remote medical service, is recently being promoted to prevent suicide among the elderly. Specifically, through a community broadcasting system, a remote medical system, which relies on a Moving Care Unit and the local community (community building) is
    carried out in high risk areas that need remote medical treatment.

    Development of senior citizen classification system and key requirement research to suggest a direction of ICT service for the elderly

    by Kyongmee CHUNG (Professor, Yonsei Univ. Department of Psychology)

    It was difficult to understand service demands of the elderly because the previous studies focused on the specific group of the elderly instead of the entire population of the elderly. Therefore, the study classified the subgroups of the elderly using a multiaxial system and derived four service areas for the elderly. The three key services were pleasant life, intellectual life, and maintenance of relationships, but safe life was found as the main service area for elderly in their 80s. With regard to ICT services, most of the elderly complained about “difficulty of use” and it implies that the focus must be on easiness of use.

    An empirical study on empowerment mechanism through learning by failures of other organizations

    by Seung Hyun KIM (Professor, Yonsei Univ. School of Business)

    Personal data leakage of enterprises is occurring every year and the breach rate of privacy protection is continuously increasing. Although it is important for hospitals to adopt EHRs to protect privacy of patients, systematic preparations against violation of medical information are still insufficient.
    To prevent private information leaks that repeatedly occur, it is important to establish an active information-sharing system between organizations to create an environment where organizations can learn from the cases of other organizations related to personal data leakage.

    Development of an indoor navigation system for visually impaired people

    by Jin Bae PARK (Professor, Yonsei Univ. School of Electrical and Electronic Engineering)

    People with visual impairment lead an active social life as ordinary people. White cane walk, which is a general way of walking for people with visual impairment, causes the frequency of getting lost on the first trip, and therefore, a device to guide the visually impaired is needed. Considering 71% of the visually impaired people are familiar with smartphone use, development of an indoor navigation system using CCTV and a smartphone is suggested.

    Is smart environment integrating the society? Light and shadow of social integration in the digital era

    by In Han SONG (Professor, Yonsei Univ. Graduate School of Social Welfare)

    By 2015, half of the world population uses a smartphone, both a smartphone and SNS connect more people. However, social integration is inactive compared to such high usage of smartphones. It is necessary to investigate whether a connection between individuals via a smartphone accelerates or hinders social integration. The results of the study revealed that people engage in social integration and social conflicts at the same time through a smartphone. Social integration was mainly observed in the areas of voting and relations. Social conflicts are often expressed in the areas of politics and class.

    Development of a capacity building model for adaptive smartphone use

    by Sungman SHIN (Professor, Handong Univ. Counselling Psychology & Social Welfare)

    Adaptive smartphone use means using a smartphone profitably by maximizing the advantages and minimizing the disadvantages of smartphone use. The EU is also carrying out capacity-building policies for Internet users to control the purpose and time of use, claiming “maximization of opportunities and minimization of risks.” With a model that applies the concept of a balanced
    motive to adaptive smartphone use, it is possible to suggest a new perspective that can help teenagers to build ability to control themselves.

    Health and medical values of online customer reviews on medicine

    by Song Hee HONG (Professor, Seoul National Univ. College of Pharmacy)

    Providing information to a patient can improve the intellectual level of the patient and lead to smooth communication with a doctor. Through this, the doctor can reflect on the information that is not revealed through clinical figures, symptoms that the patient feels, preferences of the patient, etc. to find the best treatment. In the case of the elderly, too many drugs are used and they cause
    more side effects such as weakening of physical functions. Because participation of the elderly in clinical tests and treatment is low, providing medical information is even more important.
    Accordingly, the need for an ICT system where consumers of medicine can voluntarily write and share their review is rising. It can contribute to enhancing the quality of life by increasing safety and efficiency of drug use through the medicine service customized for each patient, and it will also increase the understanding of patients who use the medicine by promoting communications among medicine users as well as between medicine users and medicine experts.

    A study on development of smartphone stress index for satisfactory smartphone use by life stage

    by Kihak LEE (Professor, Yonsei University, Department of Psychology)

    The need for a healthy way of using smartphones is rising, as the number of people who are at the level of pathological addiction but have difficulties in controlling moderate use is increasing. For healthy use of smartphones, it is important to understand differences in the purpose and behavior of using smartphones according to age and life stage based on user experiences; differentiated experiences; and stress based on smartphone use. Accordingly, a psychological structure of stress factors for using a smartphone by life stage (adolescence, early stage/middle stage of adulthood) was investigated, and a stress index for using smartphones by life stage was developed.

    은 “개인정보 보호법(이하 개인정보보호법)”  웹사이트 운영을 위해 준수해야 할 관련 법령의 개인정보 보호 규정을 준수하고 있으며, 이를 바탕으로 정보주체의 권익보호를 위해 최선을 다하고 있습니다.
    의 개인정보 처리방침은 다음과 같은 내용을 담고 있습니다.
    제1조 (개인정보의 수집 항목 및 방법)
    가. 개인정보 수집 항목
    - 필수정보 : 성명, 소속 기관, 부서명, 직위(직책), 휴대전화, 이메일주소
    나. 수집방법 : 온라인 사전 등록 신청서 작성
    제2조 (개인정보의 처리 목적)
    가.  운영
    ‘바른ICT연구소’ 행사 참가 안내, 참가 신청 확인 및 출입증 발급, 참가 확인증 발급 등  운영에 관련한 목적으로 개인정보를 처리합니다.
    나. 민원처리
    개인정보 열람, 개인정보 정정·삭제, 개인정보 처리정지 요구, 개인정보 유출사고 신고 등 개인정보와 관련된 민원처리를 목적으로 개인정보를 처리합니다.
    제3조 (개인정보의 처리 및 보유 기간)
    은 관련 법령에서 명시하고 있는 개인정보 보유ㆍ이용기간 또는 정보주체로부터 동의 받은 개인정보 보유ㆍ이용기간 내에서 개인정보를 처리ㆍ보유합니다. 각각의 개인정보 처리 및 보유 기간은 다음과 같습니다.
    가. 참가자 정보 : 참가일로부터 3년
    나. 개인정보 열람 등 요구 처리 사용자 정보 : 개인정보 열람 등 요구 접수시부터 3년
    다. 유출사고 신고 처리 사용자 정보 : 유출신고 접수 시부터 3년
    제4조 (개인정보의 제3자 제공)
    은 원칙적으로 참가신청자의 개인정보를 제3자에게 제공하지 않습니다.
    제5조 (개인정보처리 위탁)
    ① 은 원활한 개인정보 업무처리를 위하여 다음과 같이 개인정보 처리업무를 위탁하고 있습니다.
    가. 위탁받는 자 (수탁자) : ㈜이인벤션
    - 주소 : 서울시 구로구 디지털로33길 50, 301(구로동, 벽산디지털밸리 7차)
    - 전화 : 02-2630-8777
    - 근무시간 : 09:00 - 18:00
    - 위탁하는 업무의 내용 : 시스템 운영 및 유지보수, 데이터 추출 및 가공
    나. 위탁받는 자 (수탁자) : ㈜온오프믹스
    - 주소 : 서울시 서초구 신반포로 45길 22 은양빌딩 5층
    - 전화 : 02-6080-5579
    - 근무시간 : 09:00 - 18:00
    - 위탁하는 업무의 내용 : 참가자 등록 처리를 위한 데이터 추출 및 가공
    ② 은 위탁계약 시 개인정보 보호 관련 법규의 준수, 개인정보에 관한 3자 제공 금지 및 책임부담 등을 명확히 규정하여 계약내용을 보관하고 있으며, 업체 변경 시 공지사항 및 개인정보 처리방침을 통해 고지하겠습니다.
    제6조(정보주체의 권리ㆍ의무 및 행사방법)
    ① 정보주체는 에 대해 언제든지 다음 각 호의 개인정보 보호 관련 권리를 행사할 수 있습니다.
    가. 개인정보 열람요구
    나. 오류 등이 있을 경우 정정 요구
    다. 삭제요구
    라. 처리정지 요구
    ② 제1항에 따른 권리 행사는 에 대해 서면, 전화, 전자우편, 모사전송(FAX) 등을 통하여 하실 수 있으며 은 이에 대해 지체 없이 조치하겠습니다.
    ③ 정보주체가 개인정보의 오류 등에 대한 정정 또는 삭제를 요구한 경우에는 은 정정 또는 삭제를 완료할 때까지 당해 개인정보를 이용하거나 제공하지 않습니다.
    ④ 제1항에 따른 권리 행사는 정보주체의 법정대리인이나 위임을 받은 자 등 대리인을 통하여 하실 수 있습니다. 이 경우 개인정보 보호법 시행규칙 별지 제11호 서식에 따른 위임장을 제출하셔야 합니다.
    ⑤ 정보주체는 개인정보 보호법 등 관계법령을 위반하여 가 처리하고 있는 정보주체 본인이나 타인의 개인정보 및 사생활을 침해하여서는 안 됩니다.
    ⑥ 정보주체의 열람, 정정, 삭제, 처리정지 요구 거절 시 불복을 위한 이의제기 절차는 다음과 같습니다.
    ▶ 불복 사유
    - 정보공개 청구에 대한 의 열람거절
    - 정보공개 청구에 대한 의 일부열람
    - 정보공개 청구일로부터 20일 이내에 가 공개 여부를 통지 하지 않은 경우
    ▶ 처리 절차
    - 이의신청 : 열람여부의 결정 통지를 받은 날 또는 열람거절의 결정이 있는 것으로 보는 날부터 “30일” 이내 제기
    - 행정심판 : 처분이 있음을 안 날로부터 “90일” 이내 제기(처분이 있은 날로부터 180일을 경과하면 제기 불가
    - 행정소송 : 처분이 있음을 안 날로부터 “90일” 이내(처분이 있은 날로부터 1년을 경과하면 제기 불가).
    제7조(개인정보의 파기)
    ① 는 개인정보 보유기간의 경과, 처리목적 달성 등 개인정보가 불필요하게 되었을 때에는 지체 없이 해당 개인정보를 파기합니다.
    ② 정보주체로부터 동의 받은 개인정보 보유기간이 경과하거나 처리목적이 달성되었음에도 불구하고 다른 법령에 따라 개인정보를 계속 보존하여야 하는 경우에는, 해당 개인정보를 별도의 데이터베이스(DB)로 옮기거나 보관 장소를 달리하여 보존합니다.
    ③ 개인정보 파기의 절차 및 방법은 다음과 같습니다.
    가. 파기절차
    은 파기 사유가 발생한 개인정보를 선정하고, 의 개인정보 보호책임자의 승인을 받아 개인정보를 파기합니다.
    나. 파기방법
    는 전자적 파일 형태로 기록ㆍ저장된 개인정보는 기록을 재생할 수 없도록 로우레밸포멧(Low Level Format) 등의 방법을 이용하여 파기하며, 종이 문서에 기록ㆍ저장된 개인정보는 분쇄기로 분쇄하거나 소각하여 파기합니다.
    제8조(개인정보의 안전성 확보조치)
    는 개인정보의 안전성 확보를 위해 다음과 같은 조치를 취하고 있습니다.
    ① 관리적 조치 : 내부관리계획 수립ㆍ시행, 정기적 직원 교육 등
    ② 기술적 조치 : 개인정보처리시스템 등의 접근권한 관리, 접근통제시스템 설치, 보안프로그램 설치
    ③ 물리적 조치 : 자료보관실 등의 접근통제
    제9조(개인정보 보호책임자)
    ① 는 개인정보 처리에 관한 업무를 총괄해서 책임지고, 개인정보 처리와 관련한 정보주체의 불만처리 및 피해구제 등을 위하여 아래와 같이 개인정보 보호책임자를 지정하고 있습니다.
    ▶ 개인정보보호 책임자
    성명 : 김범수
    직책 : 연구소장
    연락처 : 02-2123-6694 / barunict@barunict.kr
    ② 정보주체께서는 에 참여하시면서 발생한 모든 개인정보 보호 관련 문의, 불만처리, 피해구제 등에 관한 사항을 개인정보 보호책임자 및 담당부서로 문의하실 수 있습니다. 은 정보주체의 문의에 대해 지체 없이 답변 및 처리해드릴 것입니다.
    제10조(개인정보 열람청구)
    정보주체는 개인정보 보호법 제35조에 따른 개인정보의 열람 청구를 아래의 사무국에 할 수 있습니다. 는 정보주체의 개인정보 열람청구가 신속하게 처리되도록 노력하겠습니다.
    ▶ 개인정보 열람청구 접수ㆍ처리 사무국
    부서명 : 바른ICT연구소
    연락처 : 02-2123-6694 / barunict@barunict.kr
    제11조(권익침해 구제방법)
    정보주체는 아래의 기관에 대해 개인정보 침해에 대한 피해구제, 상담 등을 문의하실 수 있습니다.
    - 아래의 기관은 과는 별개의 기관으로서, 의 자체적인 개인정보 불만처리, 피해구제 결과에 만족하지 못하시거나 보다 자세한 도움이 필요하시면 문의하여 주시기 바랍니다.
    ▶ 개인정보보호 종합지원 포털 (행정자치부 운영)
    - 소관업무 : 개인정보 침해사실 신고, 상담 신청, 자료제공
    - 홈페이지 : www.privacy.go.kr
    - 전화 : 02-2100-3394
    ▶ 개인정보 침해신고센터 (한국인터넷진흥원 운영)
    - 소관업무 : 개인정보 침해사실 신고, 상담 신청
    - 홈페이지 : privacy.kisa.or.kr
    - 전화 : (국번없이) 118
    - 주소 : (58324) 전남 나주시 진흥길 9(빛가람동 301-2) 3층 개인정보침해 신고센터
    ▶ 개인정보 분쟁조정위원회
    - 소관업무 : 개인정보 분쟁조정신청, 집단분쟁조정 (민사적 해결)
    - 홈페이지 : www.kopico.go.kr
    - 전화 : 1833-6972
    - 주소 : (03171) 서울특별시 종로구 세종대로 209 정부서울청사 4층
    ▶ 경찰청 사이버안전국
    - 소관업무 : 개인정보 침해 관련 형사사건 문의 및 신고
    - 홈페이지 : cyberbureau.police.go.kr
    - 전화 : (사이버범죄) 02-393-9112
    (경찰청 대표) 1566-0112
    제12조(개인정보 처리방침 신설)
    이 개인정보처리방침은 시행일로부터 적용되며, 법령 및 방침에 따른 변경내용의 추가, 삭제 및 정정이 있는 경우에는 가능한 변경사항의 시행 7일 전부터 공지사항을 통하여 고지할 것입니다.
    - 공고일자 : 2018년 4월 19일
    - 시행일자 : 2018년 4월 19일