Skip Navigation
Menu
法律简讯

Updated Guidelines on Standards for Measures to Ensure Security of Personal Information Released by PIPC

2024.11.01

On October 31, 2024, the Personal Information Protection Commission (“PIPC”) released the updated Guidelines on Standards for Measures to Ensure Security of Personal Information (the “Guidelines”) (available in Korean, Link). The PIPC updated the Guidelines for the first time since December 2020, by consolidating its former guidelines on security measures. The updated Guidelines incorporate changes in technical and security practices, as well as amendments to relevant laws and regulations. They outline the minimum standards that service providers must adhere to in order to safeguard personal information, in compliance with the Personal Information Protection Act (“PIPA”) and the Standards for Measures to Ensure the Security of Personal Information, and include examples and a Q&A section.

Below is a summary of key points in the updated Guidelines.
 

Relevant Provision

Key Details

Definitions
(Article 2)

  • FTP servers, backup servers and systems/services built in cloud environments are added as examples of personal information processing systems.

Internal business systems, like groupware that handle employee data, qualify as such systems if they process employees’ team, number, name and contact information.

  • Sharing settings include allowing access to resources through remote access, such as remote desktop connections.

  • Companies must implement standards to ensure the security of personal information when managing and operating a system for personnel management of employees.

Establishment, Implementation, and Inspection of Internal Management Plan
(Article 4)

  • Internal management plan must encompass all aspects of technical, managerial and physical security measures as outlined in the Standards for Measures to Ensure the Security of Personal Information. It must also address the qualifications and appointment of the Chief Privacy Officer.

  • Within the “matters related to risk analysis and management” required in an internal management plan, risk analysis involves “evaluating the degree of risk, such as the likelihood of data breaches, including loss, theft, leakage, forgery, alteration, or damage, and the resulting impact on the data subject, depending on the method of processing and type of personal information.” The methods and procedures for analyzing and managing personal information risk can be independently developed, taking into account the data controller’s unique characteristics and circumstances.

  • Training on personal information protection should be tailored to the position and role of the Chief Privacy Officer and personal information handlers, considering their specific duties and work proficiency. In addition to technical training relevant to their tasks, the training must cover essential topics such as privacy laws and internal management plan.

Management of Access Rights
(Article 5)

  • In cases where issuing individual accounts is not feasible, such as with root accounts, alternative administrative or technical controls must be implemented. These may include account management logs and access control systems to identify individuals who accessed the personal information processing system.

  • Various authentication methods can be used for personal information handlers and data subjects, including SMS authentication, telephone authentication, and social login, alongside traditional methods, like password authentication, One-Time Password (“OTP”) authentication and biometric authentication.

  • If a user fails to authenticate after a set number of attempts, measures such as temporarily locking the account or delaying further authentication attempts may be applied to restrict access to the personal information processing system. Additionally, CAPTCHA can be used as a supplemental tool to prevent automated bot access.

Access Control
(Article 6)

  • The use of fixed IP addresses or MAC addresses on personal information handlers’ devices is not considered a secure method of authentication.

  • Credential stuffing attacks and similar incidents are identified as a type of personal information leakage or exposure that occurs through websites and internet portals.

  • Examples of measures to prevent the leakage or exposure of personal information include implementing CAPTCHA when there is an increase in login attempts, setting and monitoring thresholds for login failure rates, and using methods, such as SMS or email, to verify the legitimacy of users when they log in to a page with personal information.

  • Vulnerability inspections must address issues like identification and authentication failures, as well as vulnerabilities, such as server-side request forgery.

  • The “idle session timeout” for systems should generally be limited to between ten to 60 minutes.

  • When personal information is processed for business purposes using a company’s business app on a personal smartphone or tablet, or when accessing the company’s email server, such devices fall under mobile devices requiring appropriate security measures.

Encryption of Personal Information
(Article 7)

  • The Guidelines suggest adding a salt value to passwords during one-way encryption to defend against random attacks and rainbow table attacks.

Security Measures for Printing and Copying
(Article 12)

  • The following precautions should be taken when printing or copying personal information:

Prevent a “like” search for personal information, unless it is necessary for business.

Ensure searches are conducted with specific criteria or require two or more search terms to avoid unnecessary or excessive searches for personal information.

Restrict the display of information based on consistent standards as personal information handlers could compile complete sets of data if personal information is masked differently across various systems.

  • Security solutions can be implanted to protect printed and copied personal information, especially when using external storage devices. Solutions may include document rights management (“DRM”), secure USB drives, data loss prevention (“DLP”) tools and media control systems.

 

The Guidelines are intended to serve as a standard for interpreting and implementing security measures under the PIPA. Data controllers who handle personal data for business purposes are advised to refer to these Guidelines to ensure the secure management of personal information.

 

[Korean Version]

分享

Close

专业人员

CLose

专业人员

CLose