:::

詳目顯示

回上一頁
題名:臺灣與美國金融機構分享客戶個人資料之法律界限
書刊名:輔仁法學
作者:翁清坤 引用關係
作者(外文):Ueng, Ching-kuen
出版日期:2008
卷期:35
頁次:頁69-162
主題關鍵詞:個人資料金融機構市場失靈資訊不對稱金融服務現代化法電腦處理個人資料保護法金融控股公司法選擇加入選擇退出隱私通知Personal informationFinancial institutionMarket failureInformation asymmetriesGramm-Leach-Bliley actComputer-processed personal data protection lawFinancial holding company actOpt-inOpt-outPrivacy notice
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(1) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:29
  • 點閱點閱:40
個人資料係可供增進營運效率與利潤的一種有價值資產,尤其,金融業的贏家多半屬於那些擅長管理客戶資料且能適時適地提供客戶所需的經營者。據此,金融機構實有蒐集、利用與分享消費者個人資料的強烈動機。 此外,個人資料被視為可供交易的商品,其價格及消費數量將取決於市場的供需法則。不過,因嚴重的資訊不對稱等問題的存在,導致個人資料交易市場的失靈,乃有政府立法管制的必要。 針對金融隱私,美國金融服務現代化法規定,於揭露個人資料予非關係企業第三人前,金融機構應提供客戶/消費者隱私通知與選擇退出的權利。類似地,我國金融控股公司法等法規要求金融機構應提供保密措施通知予消費者,且於交互運用個人資料前,應先得客戶之書面同意(即選擇加入)。 事實上,因資訊不對稱存於金融機構與消費者間,消費者對其個人資料將如何被使用,並未完全了解;相反地,金融機構則握有較完整資訊。由於美國金融服務現代化法欠缺懲罰條款,所以,金融機構隱私通知的內容通常冗長又不易理解,導致罕有選擇退出者。從資訊強制分享的角度言,選擇加入的模式看似較好的選擇,金融機構應想方設法以吸引消費者同意分享其個人資料。然而,因金融機構多半擅於使用定型化契約,而能輕易地依其所定條件取得消費者同意。再者,我國金融控股公司法並未要求隱私通知內容必須清楚,因此金融機構所提供者多半很簡短又易於閱讀,導致消費者未能充分瞭解其實際保密措施,反而輕易允許個人資料被蒐集、使用或分享。是故,為克服存在於個人資料交易市場的資訊不對稱與降低隱私通知之提供成本,建議可採「二階段隱私通知模式」為基礎而建立的體制或可減緩上開流弊。
期刊論文
1.Bergelson, Vera(2003)。It’s Personal But Is It Mine? Toward Property Rights in Personal Information。U.C. Davis L. Rev.,37,382+384-385。  new window
2.Cuaresma, Jolina C.(2002)。V. Business Law: 1. Financial Services: The Gramm- Leach-Bliley Act。Berkeley Technology Law Journal,17(1),497-518。  new window
3.Janger, Edward J.(2003)。Enforcing Privacy Rights: Agency Enforcement and Private Rights of Action: Privacy Property, Information Costs, and the Anticommons。Hastings L. J.,54,899-916。  new window
4.Janger, Edward J.(2003)。Muddy Property: Generating and Protecting Information Privacy Norms in Bankruptcy。William and Mary Law Review,44(4),1801-1882。  new window
5.McClurg, Andrew J.(2003)。A Thousand Words are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling。Northwestern University Law Review,98,63-144。  new window
6.Samuelson, Pamela(2000)。Cyberspace and Privacy: A New Legal Paradigm ? Privacy As Intellectual?。STAN. L. Rev.,52,1125-1126。  new window
7.Shorr, Scott(1995)。Personal Information Contracts: How to Protect Privacy without Violating the First Amendment。Cornell Law Review,80(6),1756-1850。  new window
8.Teh, Jeanette(2001)。Note, Privacy Wars in Cyberspace: An Examination of the Legal and Business Tensions in Information Privacy。Yale Symp. ON L. and Tech.,4,1-7。  new window
9.Tindall, Craig D.(2003)。Argus Rules: The Commercialization of Personal Information。Illinois Journal of Law, Technology and Policy,2003(1),181-195。  new window
10.Horn, Charles M.(2001)。Financial Services Privacy at the Start of the 21st Century: A Conceptual Perspective。N.C. BANKING INST.,5,89-105。  new window
11.Nehf, James P.(2005)。Shopping for Privacy Online: Consumer Decision-making Strategies and the Emerging Market for Information Privacy。Journal of Law, Technology & Policy。  new window
12.李婉萍、鄭菀瓊(20031000)。金融服務百貨化與消費者個人資料之保護--法律與經濟分析的觀點。法令月刊,54(10),60-76。new window  延伸查詢new window
13.David, L.、Baumer, ET AL(2003)。Tit for Tat in Cyberspace: Consumer and Website Responses to Anarchy in the Market for Personal Information。N.C. J.L, & Tech,4。  new window
14.Belgum, Karl D.(1999)。Who Leads at Half-time?: Three Conflicting Visions of Internet Privacy Policy。Richmond Journal of Law & Technology,6(1)。  new window
15.Craswell, Richard(1993)。Property Rules and Liability Rules in Unconscionability and Related Doctrines。U. Chi. L. Rev.,60,1-65。  new window
16.Gladstone, Julia Alpert(2001)。Data Mines and Battlefields:Looking at Financial Aggregators to Understand the Legal Boundaries and Ownership Rights in the Use of Personal Data。J. Marshall J. Computer & Info. L.,19。  new window
17.Kramer, Lynn Chuang(2002)。Private Eyes Are Watching You; Consumer Online Privacy Protection - Lessons from Home and Abroad。Tex. Int'l L.J.,37。  new window
18.Loring, Trade B.(2002)。An Analysis of the Information of the Informational Privacy Protection Afforded by the European Union and the United States。Tex. Int’l LJ.,37。  new window
19.McMahon, R. Bradley(2004)。After Billions Spent to Comply with HIPAA and GLBA Privacy Provisions, Why IS Identity Theft the Most Prevalent Crime in America?。VilL L, Rev,49。  new window
20.Monahan, P. Amy(1998)。Deconstructing Information Walls: the Impact of the European Data Directive on U.S. Businesses。Law & Pol’y Int’l Bus.,29。  new window
21.Moshell, Ryan(2005)。Comment:And Then There Was One: The Outlook For A Self-Regulatory United States Amidst A Global Trend Toward Comprehensive Data Protection。Tex. Tech L. Rev,37。  new window
22.Pandozzi, Neal R.(2001)。Beware of Banks Bearing Gifts:Gram-Leach-Bliley and the Constitutionality of Federal Financial Privacy Legislation。U. Miami L. Rev.,55。  new window
23.Posner, Richard(1992)。A Tort For Prying E-eyes。J.L. Tech & Pol'y,111。  new window
24.Sammin, Kyle Thomas(2004)。Any Port In A Storm: The Safe Harbor, The Gramm-Leach-Bliley Act, And The Problem Of Privacy In Financail Services。Geo. Wash. Int'l L. Rev.,36。  new window
25.Schwartz, Paul M.(2000)。Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices。Wisc. L. Rev.。  new window
26.Schwartz, Paul M.(2000)。Internet Privacy and the State。Conn. L Rev.,32。  new window
27.Staten, Michael E.、Cate, Fred H.(200302)。The Impact of Opt-in Privacy Rules on Retail Credit Markets; a Case Study of MBNA。Duke,52。  new window
28.Swire, Peter P.(2002)。Modem Studies in Privacy Law: Notice, Autonomy and Enforcement of Data Privacy Legislation: The Surprising Virtues of the New Financial Privacy Law。Minn. L. Rev,86。  new window
29.Tallman, David A.(2003)。Financial Institutions and the Safe Harbor Agreement: Securing Cross-Border Financial Data Flows。Law & Pol'y Int'Bus,34。  new window
30.Wolf, Christopher(2005)。Overview of the Gramm-Leach Bliley Act。PLI. Pat,828。  new window
31.Zarskym, Tal Z.(2004)。Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society。Me, L. Rev.,56。  new window
32.Kang, Jerry(1998)。Information Privacy in Cyberspace Transactions。Stanford Law Review,50(4),1193-1294。  new window
33.Schwartz, P. M.(2004)。Property, Privacy, and Personal Data。Harvard Law Review,117(7),2056-2128。  new window
34.Schwartz, Paul M.(1999)。Privacy and Democracy in Cyberspace。Vanderbilt Law Review,52(6),1607-1702。  new window
35.Rothchild, John(1999)。Protecting the Digital Consumer: The Limits of Cyberspace Utopianism。Indiana Law Journal,74,893-989。  new window
36.Jange, Edward J.、Schwartz, Paul M.(2002)。Modern Studies in Privacy Law: Notice, Autonomy and Enforcement of Data Privacy Legislation: The Gramm- Leach-Bliley Act, Information Privacy, and the Limits of Default Rules。Minnesota Law Review,86,1219-1232。  new window
37.Nehf, James P.(2005)。Incomparability and the Passive Virtues of Ad Hoc Privacy Policy。University of Colorado Law Review,76,1-56。  new window
38.Brill, Elizabeth K.(2002)。Privacy and Financial Institutions: Current Development Concerning the Gramm-Leach-Bliley Act of 1999。ANN. REV. BANKING L.,21,167。  new window
39.Cohen, J. E.(2000)。Examined lives: Informational privacy and the subject as object。Stanford Law Review,52,1273-1396。  new window
圖書
1.Hirshleifer, Jack、Hirshleifer, David(1997)。Price Theory And Applications。Justin Kent Emp, L.。  new window
2.Westby, Jody R.(2004)。International Guide To Privacy。American Bar Association。  new window
3.張清溪、許家棟、劉鶯釗、吳聰敏(1990)。經濟學:理論與實際。臺北:新陸書局。  延伸查詢new window
4.王文宇(200310)。控股公司與金融控股公司法。元照。new window  延伸查詢new window
5.吳簡逸欣(2000)。美國信用管理相關專業團體。財團法人金融聯合徵信中心。  延伸查詢new window
6.財團法人金融聯合徵信中心編輯委員會(1995)。美國Equifax公司--信用資訊產品暨專題報告。財團法人金融聯合徵信中心。  延伸查詢new window
7.陳重任(2000)。瑞士徵信機構營運概況。財團法人金融聯合徵信中心。  延伸查詢new window
8.陳重任(2005)。奥地利徵信機構營運概況。財團法人金融聯合徵信中心。  延伸查詢new window
9.陳福雄(1999)。德國消費者信用報告機構聯邦夏華營運概論。財團法人金融聯合徵信中心。  延伸查詢new window
10.Annecharico, David(2002)。Notes & Comments: V. Privacy After GLBA: Online Transactions: Squaring the Gramm-Leach-Bliley Act Privacy Provisions With the FTC Fair Information Practice principles。N.C. Banking Inst.。  new window
11.Hooftiagle, Chris(2002)。Consumer Privacy in the E-Commerce Marketplace。  new window
12.Solove, Daniel J.、Marc, Roteuberg(2004)。Information Privacy Law。  new window
13.Solove, Daniel J.(2004)。The Digital Person: Technology and Privacy in the Information Age。New York University Press。  new window
14.Cooter, Robert、Ulen, Thomas(2004)。Law and Economics。Pearson:Addison Wesley Longman。  new window
15.許文義(2001)。個人資料保護法論。台北:三民書局。  延伸查詢new window
16.葉秋南(1996)。美國消費者信用管理。台北:財團法人金融聯合徵信中心編印。  延伸查詢new window
其他
1.行政院金融監督管理委員會(2011)。證券統計資料,http://www.sfb.gov.tw/ch/home.jsp?id=622&parentpath=0,4,109&mcustomize=important_view.jsp&serno=201212060006, 2011/06/30。  new window
2.行政院金融監督管理委員會(2008)。緣起之簡介,http://www.fscey.gov.tw/ct.asp?xItem=196&ctNode=6&mp=2, 2008/04/08。  延伸查詢new window
3.行政院(2008)。電腦處理個人資料保護法修正草案總說明及條文對照表,http://www.moj.gov_tw/lp_asp?CtNode=13710&CtUnit=805&BaseDSD=7&mp=001, 2008/03/05。  延伸查詢new window
4.(2008)。Bank of America Privacy Policy for Consumers,https://www,bankofamerica.com/privacy/ControLdo?body=privacysecur_cnsmr, 2008/04/28。  new window
5.Elkin-Koren, Niva,Eli, M.(2004)。Salzberger, Law, Economics and Cyberspace: The Effects of Cyberspace on the Economic Analysis of Law Federal Trade Commission,http://www.ftc.gov/reports/privacy3/priv-23a.pdf, 2008/03/05。  new window
6.Richard, A.(2005)。Economics For Lawyers Information Infrastructure Task Force, National Information Infrastructure Agenda for Action,http://www.ibiblio.org/nii/NII-Agenda-for-Action.html, 2008/03/06。  new window
7.Kovacevich, Richard M.(2000)。Privacy and the Promise of Financial Modernization,http://woodrow.mpls,frb.fed,us/pubs/region/00-03/kovacevich.cfm?js=0, 2008/04/03。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE