:::

詳目顯示

回上一頁
題名:《個人資料保護法施行細則》第17條實作初論:根基於ISO/IEC 29100:2011-12-15標準系列
書刊名:前瞻科技與管理
作者:樊國楨黃健誠 引用關係林樹國
作者(外文):Farn, Kwo-jeanHuang, Chien-chengLin, Shu-kuo
出版日期:2015
卷期:5:1
頁次:頁43-83
主題關鍵詞:公開金鑰基礎建設政策個人資料管理系統虛擬假名隱私框架Public key infrastructurePolicyPersonally information management systemPseudonymizationPrivacy framework
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(5) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:5
  • 點閱點閱:35
我國在2012年10月1日施行之《個人資料保護法施行細則》第17條,明文規定:「本法(個人資料保護法)第九條第二項第四款、第十六條但書第五款、第十九條第一項第四款及第二十條第一項但書第五款所稱資料經過處理後或依其揭露方式無從識別特定當事人,指個人資料以代碼、匿名、隱藏部分資料或其他無從辨識該特定個人」,其實作攸關於兼及「個人資料保護」與「防微杜漸、發奸摘伏、依法取認」之國際標準(ISO/IEC 29191: 2012(E)Information Technology-Security Techniques-Requirements for Partially Anonymous, Partially Unlinkable Authentication:2012-12-15),亦即通稱「網路實名制」的「後檯實名,前檯匿名」之虛擬假名(Pseudonymization)要求事項的標準。 標準可以累積知識與經驗,標準化則是冀求以系統的、共同的、協調一致的方法來強化標準實作之知識以供傳承。「個人資料保護因標準而不同,資訊安全標準因實作而不同」。韓國已於2012年1月宣布在2014年12月前修正相關法規,階段性廢除自2007年7月實施的《網路實名制》;美國在2011年4月15日公布《數位空間之可信賴識別的國家策略(National Strategy for Trusted Identities in Cyberspace, NSTIC):增強線上選擇、有效性、安全與隱私(Enhancing Online Choice, Efficiency, Security and Privacy)》,期以10年之時間分成2階段推動「網路實名制」;中國大陸則於2012年12月28日立法要求實施《網路實名制》,已規範「微博」、「電話」等業務。惟於2012年8月,在歷經2年審理,韓國憲法法院認定前述規範因採取「全面性」之「網路實名」,過度限制人民言論自由與資訊隱私的基本權利,故屬違憲。本文綜覽及研析前述3個國家於「網路實名制」的應然與實然,根基於我國已建立之基礎,探討我國落實《個人資料保護法施行細則》第17條宜開展的供應脈絡以及功能應用之標準化作業。
According to Article 17 in Enforcement Rules of the Personal Information Protection Act amended on October 1st 2012 in our country, the information may not lead to the identification of a certain person after the treatment of the provider or the disclosure of the collector referred to in Item 4 of Paragraph 2 of Article 9, Item 5 of the exception of Article 16, Item 4 of Paragraph 1 of Article 19, and Item 5 of the exception of Paragraph 1 of Article 20 of the Act shall mean the personal information processed by ways of code, anonymity, hiding parts of information or other manners so as to fail to identify such a specific person. Its implementation is closely related to the requirements for “personal information protection” and “partially anonymous, partially unlinkable authentication (ISO/IEC 29191: 2012)” which is commonly known as the Pseudonymization in Real Name Registration System. Standards can be seen as the accumulation of knowledge and experience, while standardization aims at strengthening the knowledge and techniques of standard implementation by means of systematic and coherent methods. Personal information protection differs owing to the standards, while information security standards differ due to the implementation. The South Korean government announced in January 2012 that the relevant regulation should be modified by December 2014 and Real Name Registration System which has been implemented since July 2007 will be abolished step by step. The US government announced National Strategy for Trusted Identities in Cyberspace (NSTIC) on April 15, 2011 to enhance Online Choice, Efficiency, Security and Privacy so that they can promote Real Name Registration System at two stages in 10 years. The China government made laws on December 28, 2012 to implement Real Name Registration System.
期刊論文
1.張乃文(20090600)。Web2.0網站平臺管理之法制議題研析--以網路實名制與揭露使用者身份資料為中心。科技法律透析,21(6),42-60。  延伸查詢new window
2.李詩慧(2012)。中共網軍駭進法務部。壹週刊,591,46-50。  延伸查詢new window
3.許瀞文(2013)。花錢就能拿證書台灣資安玩假的?。今周刊,849,54-56。  延伸查詢new window
4.郭戎晉(20130700)。論個人資料保護法制中「技術設計」入法之趨勢--以歐盟為觀察對象。資訊安全通訊,19(3),65-79。  延伸查詢new window
5.彭心儀、周曉繁(2013)。網路實名制爭議問題初探:從韓國經驗談起。網路通訊國家型計畫簡訊,47,18-21。  延伸查詢new window
6.黃荷婷(20121100)。勞工資訊隱私權與雇主經營管理權--建構就業資料保護之衡量標準與權利救濟。前瞻科技與管理,2(2),71-86。new window  延伸查詢new window
7.樊國楨(2013)。「後檯實名, 前檯匿名」與標準化。網路通訊國家型科技計畫簡訊,47,22-23。  延伸查詢new window
8.樊國楨、季祥、韓宜蓁(20150100)。資訊安全管理系統稽核初論:根基於資安健診與標準化。資訊安全通訊,21(1),33-63。  延伸查詢new window
9.樊國楨、黃健誠(2013)。「後檯實名, 前檯匿名」實作要求事項初探:根基於ISO/IEC29191:2012-12-15。網路通訊國家型計畫簡訊,49,46-48。  延伸查詢new window
10.樊國楨、黃健誠(2013)。「後檯實名, 前檯匿名」與隱私架構初探:根基於ISO/IEC29100:2011-12-15標準系列。網路通訊國家型計畫簡訊,50,21-24。  延伸查詢new window
11.樊國楨、黃健誠(2013)。下一世代網路安全標準初探之一:根基於公開金鑰基礎建設(Public Key Infrastructure, PKI)技術的脆弱性議題)。網路通訊國家型計畫簡訊,51,33-39。  延伸查詢new window
12.戴志楊(2012)。海巡署3,000機密外洩。時報周刊,1794,34-37。  延伸查詢new window
13.Blakley, G. R.、Borosh, I.(1979)。RSA Public Key Cryptosystems do not always Conceal Messages。Computers and Mathematics with Applications,5(3),169-178。  new window
會議論文
1.內政部(2013)。內政部自然人憑證發展策略研討會會議資料。內政部自然人憑證發展策略研討會。  延伸查詢new window
2.樊國楨(2011)。探討資訊安全管理之信函。2011年第2季資訊安全管理系統標準化系列討論會。新竹:新竹市稅務局。  延伸查詢new window
3.Nardelli, E.、Talamo, M.(2005)。Certification and Security in Inter-organization E-services。CEES-2004。Toulouse。  new window
研究報告
1.中華民國資訊軟體協會(2012)。行政院「完備我國資訊安全管理法規之分析」委託研究計畫期中報告。  延伸查詢new window
2.中華電信股份有限公司數據通信分公司(1997)。建立電子化政府認證制度規劃研究報告書。  延伸查詢new window
圖書
1.行政院科技顧問組(201011)。2010資通安全政策白皮書。  延伸查詢new window
2.呂信瑩(201212)。個人資料保護法上目的拘束原則之探討。臺北:臺灣論證出版股份有限公司。new window  延伸查詢new window
3.來勝法學研究中心(2011)。公法及其相關法規(含法律倫理.釋字)。臺北:來勝文化事業有限公司。  延伸查詢new window
4.樊國楨(1997)。電子商務高階安全防護:公開金鑰密碼資訊系統安全原理。臺北:財團法人資訊工業策進會資訊與電腦出版社。  延伸查詢new window
5.樊國楨、林樹國(2013)。中國大陸資訊安全政策發展要情研析。  延伸查詢new window
6.Jamoussi, B.、Barbir, A.(2012)。ITU-T Identity Management Update。Geneva:Inentity Management and Identification Systems。  new window
7.Kai, R.、Denis, R.、Andre, D.(2009)。The Future of Identity in the Information Society-Challenges and Opportunities。London:Springer。  new window
8.Mondel, T.、Puddephatt, A.、Wagner, B.、Hawtin, D.、Torres, N.(2012)。Global Survey on Internet PrIVACY and Freedom of Expression。Paris:United Nations Educational, Scientific and Cultural Organization。  new window
9.行政院資訊發展推動小組(1998)。邁向二十一世紀的電子化政府。台北:行政院資訊發展推動小組。  延伸查詢new window
其他
1.中國大陸第十一屆人民代表大會常務委員會(20121228)。加強網路信息保護的決定,http://www.gov.cn/jrzg/2012-12/28/content_2301231.htm, 2012/05/07。  延伸查詢new window
2.行政院(2010)。行政院國家資通安全會報資安發字第0990100394號函(公布「資訊系統分類分級與鑑別機制」),行政院。  延伸查詢new window
3.Chen, L.(2010)。A DAA Scheme Requiring Less TPM Resources,http://eprint.iacr.org/2010/008.pdf, 2013/02/07。  new window
4.(20130122)。Recommendations for Implementing FICAM on U.S. Secret Networks,https://www.idmanagement.gov/sites/default/files/documents/FICAM-S%20Recommendations%2021JAN13%20%28v2%29_0.pdf, 2013/02/07。  new window
5.Euchner, M.(2012)。ITU-T Achievements in ICT Security Standardization (Presentation),http://docbox.etsi.org/Workshop/2012/201201_SECURITYWORKSHOP/l_ INTRODUCTION/ITU SG 17overview_EUCHNER.pdf, 2012/01/19。  new window
6.Executive Office of the President of the United States(2014)。Fiscal Year 2013 Report to Congress on the Implementation of the Federal Information Security Management Act of 2002,https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/ fyl2_fisma.pdf, 2014/09/30。  new window
7.Fumy, W.(2011)。SC 27 Business Plan for the Period Covered October 2011-September 2011,http://isotc.iso.org/livetink/livelink/open/jtc/SC27, 2011/10/17。  new window
8.Humplhreys, E.(2014)。ISO/IEC JTC 1/SC 27 Corporate Slides,http://www.jtclsc27.din.de/sixcms_upload/media/3031/ISO-IECJTCl-SC27_ N14270_SC27%20Corporate%20slides%20(verl5.3)_20140428.pdf, 2014/04/28。  new window
9.Humphreys, E.,Chikazawa, T.,Banon, M.,Kang, M. C.,Rannenberg, K.,WG-Convenors(2012)。Standing Document 11-Overview of the Work of SC27,http://isotc.iso.org/livelink/livelink/open/jtclsc27, 2011/04/11。  new window
10.International Organization for Standardization(2008)。Health Informatics-Pseudonymization(ISO/TS 25239: 2008)。,Geneve, Switerland:International Organization for Standardization。  new window
11.International Organization for Standardization(2011)。Information Technology-Security Techniques-A Framework for Identity Management-Part 1: Terminology and Concepts(ISO/IEC 24760-1: 201)。,Geneve, Switerland:International Organization for Standardization。  new window
12.International Organization for Standardization(2012)。Information Technology-Security Techniques-Requirements for Partially Anonymous, Partially Unlinkable Authentication(ISO/IEC 29191: 2012)。,Geneve, Switerland:International Organization for Standardization。  new window
13.International Organization for Standardization(2013)。Information Technology-Security Techniques-Entity Authentication Framework(ISO/IEC 29115: 2013)。,Geneve:International Organization for Standardization。  new window
14.Jonathan, K.(2005)。Subway Fracas Escalates into Test of the Internet's Power to Shame,http://www.washingtonpost.com/wp-dyn/content/article/2005/07/06/AR2005070601953.html, 2013/06/25。  new window
15.Leitner, J. M.(2014)。Korean Netizen Equality in the Shadow of Real Name Verification,http://ebooks.narotama.ac.id/files/The%20Law%20in%20the%20Information%20and%20Risk%20Society/3.1%20%20Korean%20Netizen%20Equality%20in%20 the%20Shadow%20of%20Real%20Name%20Verification.pdf, 2014/09/25。  new window
16.National Institute of Standards and Technology(2014)。Framework for Improving Critical Infrastructure Cybersecurity,http://www.nist.gov/cyberframework/upload/cybersecurity-framework_021214-fmal.pdf, 2014/09/15。  new window
17.Sakimura, N.,Bradley, J.,Jones, M. B.,de Medeiros, B.,Mortimore, C.,Jay, E.(2013)。OpenID Connect Messages 1.0-draft 15,http://openid.net/specs/openid-connect-messages_l_0.html, 2013/08/29。  new window
18.The U.S. Small Business Administration Office of Inspector General(2013)。Briefing Report for the FY 2012 Federal Information Security Management Act Review,http://www.epa.gov/oig/reports/2013/20130513-13-p-0257.pdf, 2013/05/13。  new window
19.The White House(2011)。National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy,http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf, 2014/09/15。  new window
20.The White House(2011)。Structural Reforms to Improve the Security of Classified Networks and Responsible Sharing and Safeguarding of Classified Information,https://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-13587-structural-reforms-improve-security-classified-net, 2014/09/15。  new window
21.The White House(2013)。Improving Critical Infrastructure Cybersecurity, Executive Order 136,http://www.nist.gov/itl/ipload/preliminary-cybersecurity-frameword.pdf, 2014/09/15。  new window
22.The White House(2013)。Critical Infrastructure Security and Resilience,http://www.whitehouse.gov/the-press-office/2013/10/31/presidential-proclamation-critical-infrastructure-security-and resilience, 2014/09/15。  new window
23.Trusted Computing Group(2014)。Where Trust Begins Infographic,http://www.trustedcomputinggroup.org, 2014/10/23。  new window
24.(2013)。The Act on Promote of Information and Communications Network Utilization and Information Protection,http://unpanl.un.org/intradoc/groups/public/documents/APCITY/UNPAN025694.pdf, 2013/06/25。  new window
25.(2014)。VERIZON資料外洩調查報告,http://www.verizonenterprise.com/tw/DBIR/, 2014/09/30。  new window
26.(2013)。PRISM (Surveillance Program),http://en.wikipedia.org/wiki/PRISM_ (surveillance_program), 2013/07/05。  new window
圖書論文
1.Smyth, B.、Ryan, M. D.、Chen, L.(2007)。Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators。ESASf07: 4th European Workshop on Security and Privacy in Adhoc and Sensor Networks。Paris:Springer。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE