Last review date: 1 January 2025
Yes
☒ general obligation to take appropriate / reasonable technical, physical and/or organizational security measures
☒ obligation to take specific security measures e.g., encryption
Last review date: 1 January 2025
Yes
☒ network information security requirements (broader than telecommunications)
Chapter VI of the Network Act imposes obligations on all network service providers to ensure network stability, conduct information protection pre-checks, designate a Chief Information Security Officer (CISO), and more.
☒ health regulatory requirements
Article 23 of the Medical Service Act and related provisions require medical personnel or medical institution founders to have the necessary facilities and equipment to safely manage and preserve electronic medical records.
☒ financial services requirements
Chapter III of the Electronic Financial Transactions Act requires financial companies or electronic financial businesses to ensure the safety of electronic financial transactions, designate a CISO, analyze and evaluate vulnerabilities in electronic financial infrastructure (information processing systems and networks used for electronic financial transactions), and more.
☒ telecommunication requirements
As telecommunications are included in the definition of network service providers under the Network Act, the network information security requirements mentioned earlier also apply to telecommunications (Network Act, Article 2(1)(iii)). Additionally, Article 32-10 of the Telecommunications Business Act imposes additional obligations on telecommunications operators meeting certain criteria, such as conducting vulnerability analysis and evaluation, managing and monitoring core facilities, and implementing traffic dispersion measures.
☒ providers of critical infrastructure
The Infrastructure Act requires critical infrastructure management agencies (across public and private sectors) to establish and implement protection measures for critical infrastructure (electronic control and management systems and information and communication networks relating to national security, administration, national defense, public security, finance, communications, transportation, energy, etc.), periodically analyze and evaluate vulnerabilities, and take prompt recovery measures in case of incidents.
☒ digital or connected (IoT) products
Article 45 of the Network Act imposes an obligation on manufacturers or importers of digital or connected (IoT) products to protect such systems from cyber attacks by complying with an information protection directive issued by the MSIT, which includes various technical, physical and administrative protection measures.
Last review date: 1 January 2025
☒ Data privacy
☒ Securities or public company
☒ network information security
☒ health
☒ financial services
☒ telecommunications
☒ critical infrastructure
Last review date: 1 January 2025
Yes
Under Korean law, personal data breach refers to the loss, theft, or leakage of personal information that occurs not by the free will of the personal information controller or legal requirements, resulting in personal information leaving the management and control of the personal information controller and becoming known to a third party (Standard Personal Information Protection Guidelines, Article 25). In such cases, the following information must be notified to the authorities or affected individuals:
Last review date: 1 January 2025
☒ data protection authorities
In case of a personal data breach, personal information controllers must, in principle, notify the PIPC within 72 hours of becoming aware of the breach in any of the following cases:
If the leaked personal information is personal credit information, credit information companies, etc. are obligated to notify the FSC only if personal credit information of 10,000 or more credit information subjects has been leaked. General credit information providers and users not supervised by the FSC must notify the PIPC (Credit Information Act, Articles 39-4(3) and (4)).
☒ affected individuals
In case of a personal data breach, personal information controllers must, in principle, notify the affected data subjects within 72 hours of becoming aware of the breach (PIPA Enforcement Decree, Article 39). If the leaked personal information is personal credit information, such credit information companies, etc. are obligated to notify the affected credit information subjects (Credit Information Act, Article 39-4). In either case, unlike the notification to the PIPC or the FSC mentioned earlier, notification to affected individuals is required even if personal information of only one data subject has been leaked.
Last review date: 1 January 2025
☒ data protection authorities
☒ affected individuals
As mentioned earlier, PIPA divides the processor concept into person entrusted and personal information handler. PIPA stipulates that the personal data breach notification obligations apply to the person entrusted in the same manner as they apply to personal information controllers (i.e., being applied mutatis mutandis) (PIPA, Articles 26(8) and 34). For personal information handlers, such notification obligations are not explicitly specified.
Last review date: 1 January 2025
YesNon-personal data security breach notification requirements
Under Korean law, electronic intrusion generally refers to an act of attacking a network or related information system by any of the following methods:
Network service providers must, in principle, report the following matters to the MSIT within 24 hours of an incident caused by the electronic intrusion, regardless of whether the leaked data is personal information (Network Act Enforcement Decree, Article 58-2):
Sector-specific data breach notification requirements
☒ health regulatory requirements (e.g., to notify incidents affecting safety of medical devices)
Medical personnel or medical institution founders must immediately notify the MOHW when medical information is leaked or medical institution operations are disrupted or paralyzed due to the electronic intrusion of electronic medical records (Medical Service Act, Article 23-3).
☒ telecommunication requirements
While there are no separate security breach notification requirements for telecommunications under the Telecommunications Business Act regulated by the KCC, as mentioned earlier, telecommunications are included in the definition of network service providers under the Network Act. Therefore, they follow the general cybersecurity authority notification requirements to the MSIT as described above.
☒ providers of critical infrastructure
Critical infrastructure management agencies (across public and private sectors) must notify the relevant administrative agencies (determined individually for each management agency at the time of designation as a management agency), investigative agencies, etc. when they become aware that their critical infrastructure has been disrupted, paralyzed, or destroyed due to electronic intrusion (Infrastructure Act, Article 13).
☒ other
Financial companies or electronic financial businesses must notify the FSC without delay when electronic financial infrastructure is disrupted or paralyzed due to electronic intrusion (Electronic Financial Transactions Act, Article 21-5).