Ubiquitous computing, or 'ubicomp' environment presents significant challenges for information privacy law; The emergence of ubiquitous sensor networks based on RFID technology and IPv6, together with robust data mining techniques, for example, will a...
Ubiquitous computing, or 'ubicomp' environment presents significant challenges for information privacy law; The emergence of ubiquitous sensor networks based on RFID technology and IPv6, together with robust data mining techniques, for example, will amplify the tracking and profiling capabilities of personal information collectors. There exists, therefore, a well justified public perception and fear that personal information including information privacy might be threatened on unprecedentedly pervasive scale in the ubiquitous computing environment. This is indeed a common concern almost all the information societies share, and it is an urgent one. The problem we face now is not, whether we should accept the ubicomp environment with the risk of being thrown in a informational panopticon, but how, where and to what extent we should tackle the risks and threats from the emergence of the ubicomp environment for the sake of personal information and privacy. This paper reviews the staus quo of legal system for protection of personal information and privacy now in an emerging ubicomp environment in Korea and tries to present a reasonable and workable solutions. Recognizing the interrelatedness between the level of protection and the technologies including the privacy enhancing technology (PET), this article calls for a balanced timing of legislative measure to protect personal information and privacy in the ubicomp environment. At one extreme, we might paralyze the development of ubicomp based technologies, if we set out to prematurely intervene and regulate the technologies. At the other, we might lose for good effective timing of legislative policy making to protect personal information and privacy by merely idling away time waiting for the technology development including PET. The article also emphasizes the critical importance of reforming and reinforcing the existing infrastructure for protection of personal information and privacy in real space as well as in cyberspace.