Inflearn brand logo image
Inflearn brand logo image
NEW
Security & Network

/

Computer Security

Personal (Credit) Information Processing System Inspection Training

Training on assessing the current status and inspecting personal (credit) information processing systems, pursuant to the Notification on Personal Information Security Measures and Appendix 3 of the Supervisory Regulations on Credit Information Act.

1 students are taking this course

ISMS-P
CPPG
Engineer information security
security training
Industrial Security Exper

What you will learn!

  • Understanding Laws Related to Personal Information

  • Personal (Credit) Information Processing System Inspection Method

🔐 Personal (credit) information processing system inspection training

– Provides checklists and inspection points that practitioners must know

These days, as personal information leaks become increasingly sophisticated, threats targeting loopholes in system security and management and supervision systems continue to occur. In particular , systems that process personal (credit) information require thorough management and inspection within companies and organizations in accordance with the Personal Information Protection Act and related laws.

This lecture was prepared in this era of change.
**"Personal (Credit) Information Processing System Inspection Training"** is a specialized lecture centered on technical and management inspection items and response methods that practitioners must be familiar with.

🎯 Educational target

  • Chief Privacy Officers (CPOs) and practitioners of organizations and companies

  • Information security team, IT department system operation and management practitioner

  • Security consultants and external experts performing consulting/auditing work

Features of Education

  • Introduction to the general procedure for checking personal information processing systems that must be performed regularly in accordance with Article 29 of the Personal Information Protection Act and related notices

  • Provides an inspection checklist that can be used immediately in practice

  • Complete summary of the on-site inspection method for each essential item , including authority management, authentication, access logs, encryption, masking, destruction, and physical security

  • Practical lectures including actual inspection documents, screen captures, and guides for submitting supporting documents

📦 Lecture Content Structure

  • Establishment of a personal (credit) information processing system identification and inspection system

  • Written Inspection Checklist Item-by-Item Explanation

  • Management of authorization, revocation, and change history and error prevention measures

  • Description of technical measures such as session timeout, encryption method, and DMZ section inspection

  • Access log storage and backup, public account approval process, external transmission encryption management

  • System masking processing, security solution application status, destruction and separate storage methods

  • Provides real improvement cases for risk points that practitioners often miss

🎓 Course Information

  • Lecture format : Online (recorded lectures and inspection checklist files provided)

  • Instructor : Security consulting specialist

  • How to apply : Refer to the institution's internal guidance or separate course application page

💡 After listening to the lecture…

  • You can respond in advance without panicking when inspected by an auditor or supervisory agency.

  • You can check and improve the status of system management within your department.

  • Systematically understand the entire process of establishing an internal management plan → inspection → proof → improvement report


Apply for training today and take your organization's privacy protection to the next level.
Practical training that can address technical protection measures and on-site inspections at the same time .
You can find the answer in the ‘Personal (Credit) Information Processing System Inspection Training’.

Recommended for
these people!

Who is this course right for?

  • Privacy Officer and IT Officer

  • Consulting

Need to know before starting?

  • Experience with personal information

Hello
This is

보안컨설팅

Curriculum

All

4 lectures ∙ (46min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Become the author of a review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!