북한의 핵·미사일 위협에 압도적 대응능력을 구축하고
4차 산업혁명 시대 미래전에 승리하는 AI 과학기술 강군을 건설해 가는 우리 군!
군수 분야 혁신을 통한 전승 보장! 민군상생 군사시설 조성은 물론,
혁신·개방·융합의 첨단 국방 R&D 구축과 방산 수출 확대까지!
이번 화 국방포커스에서는 국방부 전력자원관리실 업무를 중심으로
2023 대한민국 국방정책 추진 방향을 들여다보았다.
출처 – 국방TV
북한의 핵·미사일 위협에 압도적 대응능력을 구축하고
4차 산업혁명 시대 미래전에 승리하는 AI 과학기술 강군을 건설해 가는 우리 군!
군수 분야 혁신을 통한 전승 보장! 민군상생 군사시설 조성은 물론,
혁신·개방·융합의 첨단 국방 R&D 구축과 방산 수출 확대까지!
이번 화 국방포커스에서는 국방부 전력자원관리실 업무를 중심으로
2023 대한민국 국방정책 추진 방향을 들여다보았다.
출처 – 국방TV
Advanced Packaging Integration Center, APIC
Copyright 2023. Advanced Packaging Integration Center, APIC. All Rights Reserved.
Privacy Policy
Article 1 (Purpose of Processing Personal Information)
The
1. Provision of Goods or Services
Personal information is processed for the purposes of goods delivery, service provision, sending contracts and invoices, providing content, offering customized services, identity verification, payment and settlement of fees, and debt collection.
Article 2 (Categories of Personal Information Processed)
The
Article 3 (Procedures and Methods for Destroying Personal Information)
The
1. Destruction Procedure
2. Destruction Method
Information in electronic file format is destroyed using technical methods that make the records irreproducible.
Article 4 (Rights and Obligations of Data Subjects and Legal Representatives and How to Exercise Them)
1. Data subjects can exercise their rights to request access, correction, deletion, and suspension of processing of their personal information at any time to the
2. The exercise of rights under paragraph 1 can be made to the
3. The exercise of rights under paragraph 1 can also be made through a legal representative or a delegated person. In this case, a power of attorney must be submitted in accordance with the form of Notice No. 2020-7 of the Personal Information Processing Method.
4. Requests for access to personal information and suspension of processing may be restricted according to Articles 35(4) and 37(2) of the Personal Information Protection Act.
5. Requests for correction and deletion of personal information cannot be requested if the personal information is specified as a collection target in other laws.
6. The
Article 5 (Measures to Ensure the Safety of Personal Information)
The
1. Minimization and Training of Personal Information Handling Staff
The
2. Technical Measures against Hacking, etc.
The
3. Encryption of Personal Information
Users' personal information is encrypted and stored and managed so that only the user can know it, and important data uses separate security functions such as encrypting files and transmission data or using file lock functions.
4. Storage and Prevention of Forgery and Theft of Access Records
The
5. Restriction of Access to Personal Information
Necessary measures are taken to control access to personal information through granting, changing, and canceling access rights to the database system that processes personal information, and unauthorized access from outside is controlled using an intrusion prevention system.
Article 6 (Matters Concerning the Installation, Operation, and Rejection of Devices that Automatically Collect Personal Information)
1.The
Cookies are small pieces of information that the server (http) used to run the website sends to the user's computer browser and are sometimes stored on the user's PC hard disk.
Purpose of using cookies: Cookies are used to provide optimized information to users by identifying the visit and usage patterns of each service and website visited by the user, popular search terms, and security access status.
Installation, operation, and rejection of cookies: You can refuse to store cookies by setting options in the privacy menu of the tools > internet options at the top of the web browser.
If you refuse to store cookies, you may experience difficulties in using customized services.
Data subjects can contact the personal information protection officer and department in charge for all personal information protection related inquiries, complaints, and damage relief that occur while using the services (or business) of the