DOI QR코드

DOI QR Code

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology

인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구

  • Received : 2015.09.24
  • Accepted : 2015.11.11
  • Published : 2016.04.30

Abstract

Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

Keywords

Internet cookie technology;Personal information security;Privacy;Right to be forgotten

References

  1. Kristol, David M., and Lou Montulli. "HTTP state m anagement mechanism.", 2000. http://tools.ietf.org/html/rfc2965
  2. Mi-Hyang Yang, Donghoon Lee and Dongho Won " Risk Analysis for the Web Cookies used in Collecting Internet User's Behavior Information", 2014 Korean Society for Internet Information Conference, pp.117-118, 2014. http://www.dbpia.co.kr/Article/NODE0 6140774
  3. Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2008. https://w2.eff.org/Privacy/AOL/ exhibit_d.pdf
  4. Joobong Jang, "The Meanging and Protection Scope of Personal information", Law Review, pp.34-64, 2012. http://www.dbpia.co.kr/Article/NODE02110932
  5. Turkington, Richard C. "Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Cons titutional Right to Informational Privacy." N. Ill. UL Rev. 10, pp.479, 1989. http://heinonline.org/HOL/Lan dingPage?handle=hein.journals/niulr10&div=25&id= &page=
  6. Wankyu Park, "Some Thoughts on the Advancement of Science Technology and the Changes of Privacy protection criteria", Kyungpook Natl. Univ. Law Journal Vol.49, pp.33-62, 2015. http://www.dbpia.co.kr/ Article/NODE06218383
  7. Prosser, William L. Law of torts. 1971. http://www.jstor.org/stable/42890338
  8. Junwoo Park, "A Comparative Study on the protecti on of privacy" Law Review on Industrial Property Right, 37, pp.301-335, 2012. http://www.dbpia.co.kr/ Article/NODE01843104
  9. Microsoft, "Maintaining session state with cookies". Microsoft Developer Network. Retrieved 2012.10.22.
  10. Filings, Regulatory. "Tracking the trackers: Microsoft advertising.", cyberlaw.stanford.edu, 2011. https://cyb erlaw.stanford.edu/comment/613
  11. Debussere Frederic, "The EU E-Privacy Directive: A Monstrous Attempt to Starve the Cookie Monster?" International Journal of Law and Information Technology, 13(1), pp. 73-76, 2005. http://www.law.kuleuve n.be/citip/en/docs/publications/657fredericdebussereco okies2f90.pdf
  12. Haksoo Ko, Sangmin Lee, "Analysis on the state ha d collected private information of local Internet sites ", Law and economics research, Society on Law and Economic, 10(2), pp.181-216, 2013. http://scholar.dk yobobook.co.kr/searchDetail.laf?barcode=4010023665 302
  13. Ashkan Soltani, Shannon Canty, Quentin Mayo, Laur en Thomas, and Chris Jay Hoofnagle, "Flash Cooki es and Privacy." AAAI Spring Symposium: Intellige nt Information Privacy Management", 2010. http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/downloa d/1070/1505/
  14. Ayenson, Mika, Mika D Ayenson, Dietrich James W ambach, Ashkan Soltani, Nathan Good, Chris Jay Ho ofnagle , "Flash cookies and privacy II: Now with H TML5 and ETag respawning." Available at SSRN 18 98390, 2011. http://papers.ssrn.com/sol3/papers.cfm?a bstract_id=1898390
  15. Minjung Kim, Jonggeun An, Heesook Yoon, "The legal issues on Infringement of Personal Information through Cookies used in the Internet", Legal research, 24, pp. 79-103, 2006. http://www.dbpia.co.kr/Artic le/NODE01964576
  16. Google privacy policy(Cookie and other similar tech nology, https://www.google.com/policies/privacy/
  17. Soltani, Ashkan, Andrea Peterson, and Barton Gellman. "NSA uses Google cookies to pinpoint targets for hacking." The Switch. The Washington Post 10, 2013. https://www.washingtonpost.com/news/the-switch/ wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-ta rgets-for-hacking/
  18. Sung Jai Choi, A Study on the Two Sided Markets Theory and its Role in the Korean Antitrust Law inc lusive of Google's acquisition of Double Click, Korean competition law association 17. pp.225-265, 2008. http://www.competitionlaw.or.kr/board.php?kind=vie w&uid=184&page=1&tname=1225985138&s_per=100
  19. Fomitchev, Max I. "How google analytics and conve ntional cookie tracking techniques overestimate uniq ue visitors." Proceedings of the 19th internat ional conference on World wide web. ACM, 2010. http://dl.acm.org/citation.cfm?id=1772820
  20. Rosen, Jeffrey. "The right to be forgotten." Stanford law review online 64, 2012. http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotte n?em_x=22
  21. Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Age, Princeton, New Jersey: Princeton University Press, 2009. ISBN: 9780691150369
  22. Eunbyul Ko et al., Comparison of 'right to be forgotten' implemented in Korea and eu, Communication of the Korea Information Science Society 30(10), pp. 34-41, 2012. http://www.dbpia.co.kr/Article/NODE01984087
  23. Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2006. http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&
  24. Hillyard, Daniel, and Mark Gauen. "Issues around th e protection or revelation of personal information." Knowledge, Technology & Policy 20.2 pp.121-124, 2007. http://link.springer.com/article/10.1007/s12130- 007-9013-9#page-1

Acknowledgement

Grant : 클라우드 보안을 위한 위험기반 인증.접근제어 프레임워크 및 보안상태 점검기술 개발

Supported by : 정보통신기술진흥센터