RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재

      제3자 복호화명령의 도입에 관한 비교법적 고찰 = Comparative Legal Study on Introduction of Decryption Order to Third Parties

      한글로보기

      https://www.riss.kr/link?id=A108314301

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Even if the investigative agency knows that the crucial information necessary to investigate the crime is stored in the mobile phone, unless the password is released, there is no proper way to confirm or secure it. Although the number of cases requiring forensics that can find the substantive truth of a case using digital forensic technology is rapidly increasing every year, successful decryption of mobile phones is not so common that they are considered a major obstacle to digital forensics success. It is a social problem that the case is buried because the relevant information necessary for the discovery of the substantive truth of an important event is not secured in a timely manner.
      As a solution, the method of forcing the suspect to release the mobile phone password or requesting their cooperation through the decryption order system can be considered. However, this may excessively infringe on personal privacy and may violate the constitutionally guaranteed privilege to refuse self-incrimination. This is because the violation of the right to refuse to make a statement can be a problem depending on whether it is understood as personal information or a statement according to the characteristics of the mobile phone password.
      Therefore, it was investigated whether the introduction of the decryption order to unlock the password of the mobile phone infringes on the basic rights guaranteed by the Constitution. This is because the degree of protection will vary depending on whether the view of the password is personal information or personal information and whether it is a statement or not, that is, depending on the nature and status of the password. In this case, if it is impossible to force a decryption order on individuals such as criminal suspects due to the fundamental rights guaranteed in the Constitution, we examine whether it is possible to force a decryption order or request cooperation from a third party, a mobile phone manufacturer, to solve this problem. searched for. In particular, third parties and companies were divided into mobile phone manufacturers and information and communication service providers, and reviewed from the perspective of protection and exceptional use of personal information.
      In principle, personal information is subject to protection under the current law, and exceptional use other than the purpose of collection is specifically stipulated in the “Personal Information Protection Act”. However, since the specific interpretation and application are not necessarily clear, we looked at foreign legislative cases comparatively in relation to the provision of personal information to a third party. Although there are means to acquire, this method of cooperation takes a long time, so it was judged that it is not an appropriate means for securing evidence for digital crimes in the information society. In addition, the introduction of a decryption order to a third party is necessary as a means to secure criminal information not only to domestic companies under judicial jurisdiction but also to global companies abroad. It also struggled to find a harmonious way with an appropriate balance to raise the problem of discrimination.
      번역하기

      Even if the investigative agency knows that the crucial information necessary to investigate the crime is stored in the mobile phone, unless the password is released, there is no proper way to confirm or secure it. Although the number of cases requiri...

      Even if the investigative agency knows that the crucial information necessary to investigate the crime is stored in the mobile phone, unless the password is released, there is no proper way to confirm or secure it. Although the number of cases requiring forensics that can find the substantive truth of a case using digital forensic technology is rapidly increasing every year, successful decryption of mobile phones is not so common that they are considered a major obstacle to digital forensics success. It is a social problem that the case is buried because the relevant information necessary for the discovery of the substantive truth of an important event is not secured in a timely manner.
      As a solution, the method of forcing the suspect to release the mobile phone password or requesting their cooperation through the decryption order system can be considered. However, this may excessively infringe on personal privacy and may violate the constitutionally guaranteed privilege to refuse self-incrimination. This is because the violation of the right to refuse to make a statement can be a problem depending on whether it is understood as personal information or a statement according to the characteristics of the mobile phone password.
      Therefore, it was investigated whether the introduction of the decryption order to unlock the password of the mobile phone infringes on the basic rights guaranteed by the Constitution. This is because the degree of protection will vary depending on whether the view of the password is personal information or personal information and whether it is a statement or not, that is, depending on the nature and status of the password. In this case, if it is impossible to force a decryption order on individuals such as criminal suspects due to the fundamental rights guaranteed in the Constitution, we examine whether it is possible to force a decryption order or request cooperation from a third party, a mobile phone manufacturer, to solve this problem. searched for. In particular, third parties and companies were divided into mobile phone manufacturers and information and communication service providers, and reviewed from the perspective of protection and exceptional use of personal information.
      In principle, personal information is subject to protection under the current law, and exceptional use other than the purpose of collection is specifically stipulated in the “Personal Information Protection Act”. However, since the specific interpretation and application are not necessarily clear, we looked at foreign legislative cases comparatively in relation to the provision of personal information to a third party. Although there are means to acquire, this method of cooperation takes a long time, so it was judged that it is not an appropriate means for securing evidence for digital crimes in the information society. In addition, the introduction of a decryption order to a third party is necessary as a means to secure criminal information not only to domestic companies under judicial jurisdiction but also to global companies abroad. It also struggled to find a harmonious way with an appropriate balance to raise the problem of discrimination.

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼