:::

詳目顯示

回上一頁
題名:個人資料外洩及個資外洩通知條款的立法芻議
書刊名:東吳法律學報
作者:李榮耕 引用關係
作者(外文):Li, Rong-geng
出版日期:2009
卷期:20:4
頁次:頁251-291
主題關鍵詞:釋字六○三號解釋資訊隱私資訊隱私權電腦處理個人資料保護法個人資料個人資料外洩外洩通知個資外洩通知Judicial Yuan interpretation no.603Information privacyInformation privacy rightComputer-processed personal data protection lawPersonal dataBreach of personal dataPersonal data breach notification
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(10) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:5
  • 共同引用共同引用:184
  • 點閱點閱:117
資訊隱私權屬於人民憲法上的基本權利之一,是故,國家對於人民的個人資料負有憲法上的保護義務,其中的具體作法,包括了制定有效的法律,避免第三人所持有的個人資料外洩,而遭到盜用。 個人資料外洩指的是,他人未經授權取得公或私部門持有的個人資料,並足以影響其安全性、私密性及完整性。本文也歸納其發生原因。在發生個資外洩後,往往會造成企業信用或商譽上無形的損失,是故要求其外洩通知,可以促使其更加重視其內部的資訊安全機制。參酌美國的立法例後,我們建議,我國也應該有個資外洩通知的規定。在本文裡,我們也具體地針對外洩通知規範所應適用的範圍、個人資料的定義、外洩通知的時間點、對象、期間、方式及違背通知義務者的責任等議題,提出討論及建議,以供作日後立法或修法時的參考。
Information privacy right is guaranteed by our constitution. Therefore, the government has a constitutional obligation to protect people's personal data. A method to fulfill the obligation is to enact efficient law to prevent people's data from being breached and illegally used. Breaches of personal data mean that unauthorized acquisition of personal data that compromise the security, confidentiality and integrity of personal data maintained by public or private sectors. This article details the reason of breaches of personal data. Breaches of personal data also damage credit and reputation of corporations. Thus, personal data breach notification law is able to force them to emphasize their internal information security system. Referring to American related statutes, we suggest that we should have breach notification law. In this article, we provide advice about the scope, trigger, targets, timelines, methods of breach notification, the definition of personal data, and the liability for violation. The provided advice could be taken when enacting or amending related statutes.
期刊論文
1.陳起行(20001200)。資訊隱私權法理探討--以美國法為中心。政大法學評論,64,297-341。new window  延伸查詢new window
2.李震山(20050400)。資訊時代下「資訊權」入憲之芻議。律師雜誌,307,15-25。  延伸查詢new window
3.Prosser, William L.(1960)。Privacy。California Law Review,48(3),383-423。  new window
4.Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。  new window
5.劉佐國(20050400)。我國個人資料隱私權益之保護--論「電腦處理個人資料保護法」之立法與修法過程。律師雜誌,307,42-51。  延伸查詢new window
6.王郁琦(2004)。資訊時代隱私權理論基礎初探。世新法學,1。new window  延伸查詢new window
7.馮震宇(2007)。從司法院法院資料庫隱私權問題看政府資訊委外的發展與問題。月旦法學雜誌,154。  延伸查詢new window
8.李惠宗(2007)。裁判書上網公開與個人資訊字決權的衝突。月旦法學雜誌,154。  延伸查詢new window
9.Parent, Williams A.(1984)。A New Definition of Privacy for the Law。Law and Philosophy,2,305-305。  new window
10.Solove, Daniel J.(2002)。Digital Dossiers and the Dissipation of Fourth Amendment Privacy。Southern California Law Review,75,1083。  new window
11.Solove, Daniel J.(2003)。Identity Theft, Privacy, and the Architecture of Vulnerability。Hastings Law Journal,54,1227-1227。  new window
12.Losey, Ralph C.(2007)。Hash: The New Bates Stamp。Journal of Technology Law & Policy,12(1),(1)1-(1)44。  new window
13.White, Anthony E.(2005)。The Recognition of a Negligence Cause of Action for Victims of Identity Theft: Someone Stole My Identity, Now Who is Going to Pay for It?。Marquette Law Review,88,847-847。  new window
14.Sovern, Jeff(2003)。The Jewel of Their Souls: Preventing Identity Theft Through Loss Allocation Rules。University of Pittsburgh Law Review,64,343-343。  new window
15.Hoar, Sean H.(2001)。Identity Theft: The Crime of the New Millennium。Oregon Law Review,80,1423-1423。  new window
16.Genetski(2007)。Liability from Security Breach and Other Disclosures of Personal Information: A Growing Trend。PLI/ PAT,894,223-223。  new window
17.Frye, Emily(2002)。The Tragedy of the Cybercommons: Overcoming Fundamental Vulnerabilities to Critical Infrastructures in a Networked World。Business Lawyer,58,349-349。  new window
18.Nehf, James P.(2005)。Shopping for Privacy Online: Consumer Decision-Making Strategies and the Merging Market for Information Privacy。University of Illinois Journal of Law, Technology & Policy,2005,1-1。  new window
19.Budnitz, Mark E.(1998)。Privacy Protection for Consumer Transaction in Electronic Commerce: Why Self-Regulations Is Inadequate。Scottish Construction Law Review,49,847-847。  new window
20.Preston, Ethan、Tunner, Paul(2004)。The Global Rise of a Duty to Disclose Information Security Breaches。The John Marshall Journal of Computer & Information Law,22,457-457。  new window
21.Skinner, Timothy H.。California's Database Breach Notification Security Act: The First State Breach Notification Law is Not Yet a Suitable Template for National Identity Theft Legislation。Richmond Journal of Law & Technology,10,1-1。  new window
22.Schwartz, Paul M.、Janger, Edward J.(2007)。Notification of Data Security Breaches。Michigan Law Review,105,913-913。  new window
圖書
1.Lessig, Lawrence(1999)。Code and Other Laws of Cyberspace。Basic Books。  new window
2.許宗力(19990000)。憲法與法治國行政。臺北:元照出版社。new window  延伸查詢new window
其他
1.National Phonemon Inst., LLC.(2005)。National Survey on Data Security Breach Notification。  new window
圖書論文
1.李建良(2000)。基本權利與國家保護義務。憲法解釋之理論與實務。中央研究院中山人文社會科學研究所。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE