:::

詳目顯示

回上一頁
題名:通訊監察與民主監督:歐美爭議發展趨勢之反思
書刊名:歐美研究
作者:劉靜怡
作者(外文):Liu, Ching-yi
出版日期:2017
卷期:47:1
頁次:頁43-106
主題關鍵詞:通訊監察資訊隱私歐洲人權法院後設資料巨量資料SurveillanceInformational privacyEuropean court of human rightsMetadataBig data
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(7) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:7
  • 共同引用共同引用:248
  • 點閱點閱:16
本文從民主社會應如何監督政府通訊監察行為出發,檢視歐洲人權法院的相關判決,並與美國相關爭議比較,以探究歐美通訊監察法制爭議之發展趨勢,對我國有何啟示,藉此探討通訊監察法制應有的民主監督形貌。本文認為:歐洲人權法院在資訊隱私權領域已累積豐富的判決,往往決定締約國通訊監察或監控法制的改革。值得注意的是,歐洲人權法院在適用歐洲人權公約第8條規定時,經常把重點放在「依法」的解釋與分析上,而非「民主社會所必需」要件。此一趨勢可能導致締約國僅以內國立法表面回應,民主社會所需的資訊隱私保護架構仍有改進空間。
Pursuing an inquiry into how a democratic society is supposed to monitor government surveillance, this essay examines the attitude of the European Court of Human Rights (ECtHR) towards litigation de-rived from laws on surveillance in European nations, and juxtaposes the findings with relevant disputes in the United States; the purpose of this inquiry is to explore how these traditions might shed light on the situation in Taiwan and how the landscape of democratic supervision is to be shaped under modern surveillance law. This essay argues that the European judiciary is well-experienced in the realm of informa-tional privacy, and that reforms to surveillance law in European na-tions is generally determined by ECtHR case-law. Of particular sig-nificance is the emphasis that the ECtHR lays on the interpretation and analysis of Article 8 of the European Convention on Human Rights (ECHR), specifically the focus on the notion “in accordance with the law” rather than “necessary in a democratic society.” Such tendency might lead to the fact that the State Parties to the ECHR are merely willing to introduce domestic legislation. Accordingly, there is still plenty of room for improvement in the protective framework of informational privacy essential for a democratic society.
期刊論文
1.王玉葉(20070900)。歐洲人權法院審理原則--國家裁量餘地原則。歐美研究,37(3),485-511。new window  延伸查詢new window
2.林鈺雄(20131200)。通訊監察之修法芻議--通訊保障及監察法之部份修正條文。萬國法律,192,25-39。  延伸查詢new window
3.Cohen, Julie E.(2013)。What Privacy is For。Harvard Law Review,126(7),1904-1933。  new window
4.Richards, Neil M.(2013)。The Dangers of Surveillance。Harvard Law Review,126(7),1934-1965。  new window
5.張麗卿(20140600)。通訊保障及監察法之修正與評析。月旦法學,229,25-45。new window  延伸查詢new window
6.李榮耕(20140400)。簡評二○一四年新修正的通訊保障及監察法--一次不知所為何來的修法。月旦法學,227,148-175。new window  延伸查詢new window
7.許炳華(20150700)。被遺忘的權利:比較法之觀察。東吳法律學報,27(1),125-163。new window  延伸查詢new window
8.Tsesis, Alexander(2014)。The Right to Erasure: Privacy, Data Brokers, and the Indefinite Retention of Data。Wake Forest Law Review,49(2),433-484。  new window
9.林鈺雄(20140200)。法官保留原則與干預處分專庭--以通訊監察之修法芻議為例。月旦法學教室,136,55-65。  延伸查詢new window
10.Bignami, Francesca(2007)。Privacy and Law Enforcement in the European Union: The Data Retention Directive。Chicago Journal of International Law,8(1),233-255。  new window
11.范姜真媺(20160500)。網路時代個人資料保護之強化--被遺忘權利之主張。興大法學,19,61-106。new window  延伸查詢new window
12.王勁力(20090400)。淺論刑事DNA資料庫之擴建與人權保障--以我國去氧核醣核酸採樣條例修正方向探究。月旦法學,167,65-81。new window  延伸查詢new window
13.劉靜怡(20160100)。監視科技設備與交通違規執法。月旦法學,248,73-84。new window  延伸查詢new window
14.Cole, D.(2014)。Can privacy be saved。The New York Review of Books。  new window
15.Desai, D. R.(2014)。Constitutional limits on surveillance: Associational freedom in the age of data hoarding。Notre Dame Law Review,90(2),579-633。  new window
16.Davis, R. N.(2003)。Striking the balance: National security vs. civil liberties。Brooklyn Journal of International Law,29(1),175-238。  new window
17.De Hert, P. J. A.(2005)。Balancing security and liberty within the European human rights framework: A critical reading of the court's case law in the light of surveillance and criminal law enforcement strategies after 9/11。Utrecht Law Review,1(1),68-96。  new window
18.Donohue, L. K.(2014)。Bulk metadata collection: Statutory and constitutional consideration。Harvard Journal of Law & Public Policy,37(3),757-900。  new window
19.Gerards, J.(2012)。The prism of fundamental rights。European Constitutional Law Review,8(2),173-202。  new window
20.Lemmens, K.(2003)。The protection of privacy between a rights-based and a freedom-based approach: What the Swiss example can teach us。Maastricht Journal of European and Comparative Law,10(4),381-404。  new window
21.Hoppin, M. B.(2012)。Overly intimate surveillance: Why emergent public health surveillance programs deserve strict scrutiny under the Fourteenth Amendment。New York University Law Review,87(6),1950-1995。  new window
22.Murphy, M. H.(2013)。The relationship between the European Court of Human Rights and national legislative bodies: Considering the merits and the risks of the approach of the court in surveillance cases。Irish Journal of Legal Studies,3(2),65-91。  new window
23.Newell, B. C.(2014)。The massive metadata machine: Liberty, power, and mass surveillance in the U. S. and Europe。I/S: A Journal of Law and Policy for the Information Society,10(2),481-522。  new window
24.Reidenberg, Joel R.(2014)。The data surveillance state in the United States and Europe。Wake Forest Law Review,49(2),583-608。  new window
25.Ress, G.(2005)。The effect of decisions and judgments of the European Court of Human Rights in the domestic legal order。Texas International Law Journal,40(3),359-382。  new window
26.Swire, P. P.(2006)。Privacy and information sharing in the war on terrorism。Villanova Law Review,51(4),951-980。  new window
27.Zöller, Mark A.、王士帆(20160500)。處在德國法與歐洲法緊張氛圍下的通信紀錄調取。月旦法學,252,223-235。new window  延伸查詢new window
28.許家源(20140600)。論通訊保障及監察法「調取票」之創設。靜宜法學,3,95-113。new window  延伸查詢new window
29.李寧修(20150500)。預防性通信資料存取之憲法界限--以歐盟儲備性資料存取指令(2006/24/EG)之發展為借鏡。興大法學,17,87-140。new window  延伸查詢new window
30.林鈺雄(20080400)。論通訊之監察--評析歐洲人權法院相關裁判之發展與影響。東吳法律學報,19(4),109-152。new window  延伸查詢new window
31.Kerr, Orin S.(2012)。The Mosaic Theory of the Fourth Amendment。Michigan Law Review,111(3),311-354。  new window
32.李惠宗(20130100)。個人資料保護法上的帝王條款--目的拘束原則。法令月刊,64(1),37-61。new window  延伸查詢new window
33.劉定基(20130700)。析論個人資料保護法上「當事人同意」的概念。月旦法學,218,146-167。new window  延伸查詢new window
學位論文
1.朱敏信(2003)。論我國監聽制度設計之源起、演化及未來--以電話監聽為中心(碩士論文)。國立臺灣大學法教分處。  延伸查詢new window
2.陳妍婷(2014)。通訊監察「相關性原則」之探討(碩士論文)。東海大學。  延伸查詢new window
圖書
1.Dutertre, Gilles(2003)。Key Case-law Extracts: European Court of Human Rights。Strasbourg:Council of Europe Publishing。  new window
2.Sottiaux, S.(2008)。Terrorism and the limitation of rights: The ECHR and the US constitution。Hart Publishing。  new window
3.Lyon, David(2007)。Surveillance Studies: An Overview。Cambridge:Polity Press。  new window
4.翁逸泓、廖福特(2014)。私生活之權利--探索歐洲,反思臺灣。臺北:新學林。  延伸查詢new window
5.Angwin, J.(2014)。Dragnet nation: A quest for privacy, security, and freedom in a world of relentless surveillance。New York:Times Books。  new window
6.Bentham, J.、Božovič, M.(2010)。The panopticon writings。London:Verso Books。  new window
7.Cameron, I.(2000)。National security and the European Convention on Human Rights。The Hague:Kluwer Law International。  new window
8.Cohen, Julie E.(2012)。Configuring the networked self: Law, code, and the play of everyday practice。New Haven, Connecticut:Yale University Press。  new window
9.Donohue, Laura K.(2016)。The future of foreign intelligence: Privacy and surveillance in a digital age。New York:Oxford University Press。  new window
10.Greenwald, G.(2014)。No place to hide: Edward Snowden, the NSA, and the U. S. surveillance state。New York:Picador。  new window
11.Hardin, L.(2014)。The Snowden files: The inside story of the world's most wanted man。London:Vintage。  new window
12.Harris, D. J.、O'Boyle, M.、Warwick, E.(1995)。Law of the European Convention on Human Rights。Oxford:Oxford University Press。  new window
13.Heymann, P. B.(2003)。Terrorism, freedom, and security: Winning without war。Cambridge, MA:The MIT Press。  new window
14.Waldo, James、Lin, H. S.、Millett, L. I.(2007)。Engaging privacy and information technology in a digital age。Washington, DC:The National Academies Press。  new window
15.Orwell, G.(1949)。Nineteen eighty-four。London:Secker & Warburg。  new window
16.Ruiz, B. R.(1997)。Privacy in telecommunications: A European and an American approach。The Hague:Kluwer Law International。  new window
17.李震山(2000)。人性尊嚴與人權保障。元照出版有限公司。new window  延伸查詢new window
18.Pasquale, Frank(2015)。The Black Box Society: The Secret Algorithms That Control Money and Information。Harvard University Press。  new window
其他
1.Cox, J.(2012)。Canada and the Five Eyes intelligence community,http://cdfai.org.previewmysite.com/PDF/Canada%20and%20the%20Five%20Eyes%20Intelligence%20Community.pdf。  new window
2.Executive Office of the President (USA)(2014)。Big data: Seizing opportunities, preserving values,http://www.statedu.ntu.edu.tw/bigdata/big_data_privacy_report_may_1_2014.pdf。  new window
3.Greenwald, G.,Poitras, L.,MacAskill, E.(20130911)。NSA shares raw intelligence including Americans’ data with Israel,http://www.theguardian.com。  new window
4.Keller, J.,Parlapiano, A.,Sanger, D.,Savage, C.(20140117)。Obama's changes to government surveillance,http://www.nytimes.com。  new window
5.Lyall, S.(20081204)。European Court Rules against Britain's policy of deeping DNA databases of suspects,http://www.nytimes.com。  new window
6.Office of Science and Technology, Executive Office of the President(20120329)。Obama administration unveils "big data" initiative: Announces 0 million in New R&D Investment,https://obamawhitehouse.archives.gov/the-press-office/2015/11/19/release-obama-administration-unveils-big-data- initiative-announces-200。  new window
7.President's Council of Advisors on Science and Technology, Executive Office of the President(2014)。Big data and privacy: A technological perspective,https://obamawhitehouse.archives.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_ data_and_privacy_-_may_2014.pdf, 。  new window
圖書論文
1.De Hert, P. J. A.、Gutwirth, S.(2005)。Privacy, data protection and law enforcement. Opacity of the individual and transparency of power。Privacy and the criminal law。Mortsel:Intersentia。  new window
2.Lyon, D.(2009)。Surveillance, power, and everyday life。The Oxford handbook of information and communication technologies。Oxford:Oxford University Press。  new window
3.Nardell, G.(2010)。Levelling up: Data privacy and the European Court of Human Rights。Data protection in a profiled world。Dordrecht:Springer。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE