인공지능 시스템에서 개인정보 처리방침 수립을 위한 법적·기술적 요구사항 분석 연구

Vol. 34, No. 5, pp. 1115-1133, 10월. 2024
10.13089/JKIISC.2024.34.5.1115, Full Text:
Keywords: Privacy Policy, Artificial intelligence, Personal Information, Privacy law, AI Privacy Policy
Abstract

With the rapid development of AI technology, AI systems are increasingly collecting, processing, and utilizing personal information in large quantities. As a result, transparency and accountability of personal information processing by AI systems, ensuring the rights of information subjects, and minimizing the risk of personal information infringement are becoming important issues. However, the existing privacy policy only discloses the personal information processing in general, and there is no privacy policy for AI systems. In order to solve these problems, In response to the implementation of the privacy policy evaluation system in accordance with the revision of the Personal Information Protection Act, we propose a new AI system privacy policy establishment and disclosure for personal in the design, development and operation of AI system. This study is expected to play a complementary role to the regulations on the right of data subjects to request an explanation and exercise the right of refusal for automated decisions under the current Personal Information Protection Act.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
전주현 and 이경현, "A Legal and Technical Analysis for Establishing Privacy Policies on Artificial Intelligence Systems," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 5, pp. 1115-1133, 2024. DOI: 10.13089/JKIISC.2024.34.5.1115.

[ACM Style]
전주현 and 이경현. 2024. A Legal and Technical Analysis for Establishing Privacy Policies on Artificial Intelligence Systems. Journal of The Korea Institute of Information Security and Cryptology, 34, 5, (2024), 1115-1133. DOI: 10.13089/JKIISC.2024.34.5.1115.