:::

詳目顯示

回上一頁
題名:商業言論自由與個人資料保護之衝突:以美國電信業與我國金控業個人資料流通之管制為中心
書刊名:國立臺灣大學法學論叢
作者:翁清坤 引用關係
作者(外文):Ueng, Ching-kuen
出版日期:2017
卷期:46:3
頁次:頁703-799
主題關鍵詞:個人資料隱私違憲審查客戶專屬線路資訊商業言論選擇加入選擇退出同意電信業金控業Personal informationPrivacyConstitutionality reviewCustomer proprietary network informationCommercial speechOpt-inOpt-outConsentTelecommunications carriersFinancial industry
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:124
  • 點閱點閱:19
由於科技進步,產業界乃能運用大量個人資料,卻形成隱私保護的威脅。美國電信法乃規定,除依法律規定或經客戶同意外,電信業者不得為了與因而衍生「客戶專屬線路資訊」(Customer Proprietary Network Information, CPNI)之服務無關之目的而使用、揭露或允許接觸該CPNI。惟該法未明定,應以何種方式(「選擇加入」或「選擇退出」)取得客戶同意。對此,FCC數度公布CPNI相關命令及施行細則。然而,在U.S. West, Inc. v. FCC案,法院認為,FCC所制定之1998年CPNI施行細則要求CPNI之使用、揭露或允許接觸應取得客戶「選擇加入」之同意方式,乃違反美國聯邦憲法增修條文第1條所保護之商業言論自由,該施行細則遂被法院認定違憲。其後,對於取得客戶同意之方式,FCC遂放寬規定而部分改採「選擇退出」。至於我國金融業,因法令屢經修改,交互運用客戶資料之規範時寬時緊,得交互運用客戶個人資料之主體及客體範圍時大時小,應取得客戶同意方式游移於「選擇加入」與「選擇退出」之間,不利於金控業跨業營運,亦不利於個人資料運用新模式之開展。因此,得借鏡美國電信業經驗,以「商業言論自由」而檢討管制措施之合憲性。
Currently, industries can easily use personal information at a large scale due to technological progress. However, it leads to a threat to privacy of consumers. As a consequence, according to Article 222 of the U.S. Telecommunications Act of 1996, except as required by law or with the approval of the customer, a telecommunications carrier shall not use, disclose, or permit access to individually identifiable customer proprietary network information (CPNI) for purposes not relevant or necessary to its provision of the telecommunications service from which such information is derived. As the Telecommunications Act does not clearly enact how to obtain the approval of the customer, the Federal Communications Commission (FCC) issued the CPNI order to require the opt-in consent of the customer before using, disclosing, or permitting access to CPNI. However, in U.S. WEST, Inc. v. FCC, the court ruled the requirement of the opt-in consent violated the commercial speech protected by the First Amendment and, thus, was unconstitutional. As for the financial industry in Taiwan, with whom and to what extent customer personal information may be shared among the affiliates of the financial holding company alter due to the frequent amendments to the Financial Holding Company Act. Therefore, the method to obtain the consent of a data subject fluctuates between the "opt-in" and "opt-out" requirements before some categories of personal information, i.e. basic information of customer, may be shared. As the legal requirement is not consistently valid and reliable for a long term, its negative impact is tremendous for the cross-selling by the sharing of personal information and for the new potential uses of personal information in the age of big data. As a result, following the U.S. telecommunciations industry, the Taiwanese financial industry may also use the commercial speech doctrine as a weapon to challenge the constitutionality of the Financial Holding Company Act.
期刊論文
1.Shorr, Scott(1995)。Personal Information Contracts: How to Protect Privacy without Violating the First Amendment。Cornell Law Review,80(6),1756-1850。  new window
2.陳仲嶙(20111200)。商業性言論憲法解釋十年回顧與評析。中原財經法學,27,101-150。new window  延伸查詢new window
3.吳信華(20100800)。基本權利案例的精確判斷--大法官釋字第四一四號解釋評析。月旦裁判時報,4,5-13。  延伸查詢new window
4.廖元豪(20080300)。高深莫測,抑或亂中有序?--論現任大法官在基本權利案件中的「審查基準」。中研院法學期刊,2,211-274。new window  延伸查詢new window
5.Richards, N. M.(2005)。Reconciling data privacy and the first amendment。UCLA Law Review,52(4),1149-1222。  new window
6.Shaffer, Gregory(2000)。Globalization and Social Protection: The Impact of EU and International Rules in the Ratcheting Up of U.S. Privacy Standards。Yale Journal of International Law,25,1-88。  new window
7.Schiller, Julia C.(2003)。Informational Privacy v. The Commercial Speech Doctrine: Can the Gramm-Leach-Bliley Act Provide Adequate Privacy Protection?。CommLaw Conspectus: Journal of Communications Law and Technology Policy,11,349-367。  new window
8.Cate, F. H.(2000)。Principles of Internet Privacy。Connecticut Law Review,32,877-896。  new window
9.Kang, Jerry(1998)。Information Privacy in Cyberspace Transactions。Stanford Law Review,50(4),1193-1294。  new window
10.林子儀(1987)。商業性言論與言論自由。美國月刊,2(8),23-33。  延伸查詢new window
11.Dahlman, Carl J.(1979)。The Problem of Externality。Journal of Law and Economics,22(1),141-162。  new window
12.翁清坤(20130900)。告知後同意與消費者個人資料之保護。臺北大學法學論叢,87,217-322。new window  延伸查詢new window
13.Gilson, Ronald J.、Kraakman, Reinier H.(1984)。The mechanisms of market efficiency。Virginia Law Review,70(4),549-644。  new window
14.Fried, C.(1968)。Privacy。Yale Law Journal,77,475-493。  new window
15.翁清坤(20160300)。網路上隱私權政策之效力:以美國法為中心。國立臺灣大學法學論叢,45(1),151-248。new window  延伸查詢new window
16.翁清坤(20110900)。金融控股公司客戶個人資料之交互運用。月旦法學,196,221-235。new window  延伸查詢new window
17.葉閔宏(2016)。無聲的祕密:全都藏在內容裡。動腦雜誌,483,58-65。  延伸查詢new window
18.蕭文生(2014)。禁止想入非非之車體廣告。月旦法學教室,137,6-8。  延伸查詢new window
19.Allen, A. L.(2013)。Privacy Law: Positive Theory and Normative Practice。Harvard Law Review,126,241-251。  new window
20.Angwin, J.(2014)。Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance。Colorado Technology Law Journal,12(2),291-308。  new window
21.Baumer, D. L.、Earp, J. B.、Evers, P. S.(2003)。Tit for Tat in Cyberspace: Consumer and Website Responses to Anarchy in the Market for Personal Information。North Carolina Journal of Law & Technology,4(2),217-274。  new window
22.Basho, K.(2000)。The Licensing of Our Personal Information: Is It a Solution to Internet Privacy?。California Law Review,88(5),1507-1546。  new window
23.Bambauer, Jane(2014)。Is Data Speech?。The Stanford Law Review,66(1),57-120。  new window
24.Balaban, T. L.(2009)。Comprehensive Data Privacy Legislation: Why Now is the Time?。Case Western Reserve Journal of Law, Technology & the Internet,1(1),1-35。  new window
25.Bergelson, V.(2003)。It's Personal But Is It Mine? Toward Property Rights in Personal Information。UC Davis Law Review,37,379-451。  new window
26.Capritta, Leah E.(2000)。Communications law: US West, Inc. v. FCC interprets the First Amendment ramifications of "Customer Proprietary Network Information"。Denver University Law Review,77,441-455。  new window
27.Cate, F. H.(1998)。Privacy and Telecommunications。Wake Forest Law Review,33(1),1-49。  new window
28.Cate, Fred H.(1999)。The Changing Face of Privacy Protection in the European Union and the United States。Indiana Law Review,33,173-232。  new window
29.Dymek, A.(2000)。A Clash Between Commercial Speech and Individual Privacy: U.S. West v. FCC。Utah Law Review,2000(3),603-642。  new window
30.Colonna, L.(2013)。A Taxonomy and Classification of Data Mining。SMU Science and Technology Law Review,16,309-369。  new window
31.Chiapowski, Francis S.(1991)。The Constitutional Protection of Informational Privacy。Boston University Law Review,71(1),133-160。  new window
32.Jones, P.(2004)。Permission-Based Marketing Under Canada's New Privacy Laws。Franchise Law Journal,24(2),96-106。  new window
33.Posner, R. A.(1978)。An Economic Theory of Privacy。American Enterprise Institute Journal on Government and Society,19-26。  new window
34.Schwartz, Paul M.(2000)。Internet Privacy and the State。Connecticut Law Review,32,815-859。  new window
35.Runac, Antonia(1999)。Control Over Personal Information: Who Has It, The Consumer or the Industry?。Loyola Consumer Law Review,12(1),68-86。  new window
36.Swedloff, Rick(2014)。Risk Classification's Big Data (R)evolution。Connecticut Insurance Law Journal,21(1),339-373。  new window
37.Singleton, S.(2000)。Privacy Versus the First Amendment: A Skeptical Approach。Fordham Intellectual Property, Media and Entertainment Law Journal,11(1),97-153。  new window
38.Swire, P. P.(2002)。Modern Studies in Privacy Law: Notice, Autonomy and Enforcement of Data Privacy Legislation: The Surprising Virtues of the New Financial Privacy Law。Minnesota Law Review,86,1263-1323。  new window
39.Teh, J.(2002)。Privacy Wars in Cyberspace: An Examination of the Legal and Business Tensions in Information Privacy。Yale Journal of Law and Technology,4(1),1-96。  new window
40.Volokh, E.(2000)。Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You。Stanford Law Review,52,1049-1124。  new window
41.Walker, K.(2001)。The Costs of Privacy。Harvard Journal of Law & Public Policy,25,87-128。  new window
42.Zhu, B.(2014)。A Traditional Tort for a Modem Threat: Applying Intrusion upon Seclusion to Dataveillance Observations。New York University Law Review,89,2381-2415。  new window
43.湯德宗(20000400)。論憲法上的正當程序保障。憲政時代,25(4),3-33。  延伸查詢new window
44.王澤鑑(20070800)。人格權保護的課題與展望(3)--人格權的具體化及保護範圍(6):隱私權。臺灣本土法學雜誌,97,27-50。  延伸查詢new window
45.翁清坤(20100700)。論個人資料保護標準之全球化。東吳法律學報,22(1),1-60。new window  延伸查詢new window
46.黃昭元(20040500)。憲法權利限制的司法審查標準:美國類型化多元標準模式的比較分析。國立臺灣大學法學論叢,33(3),45-148。new window  延伸查詢new window
47.賴祥蔚(20100600)。商業言論與憲法的言論自由保障。臺灣政治學刊,14(1),159-199。new window  延伸查詢new window
研究報告
1.Federal Trade Commission(1998)。Privacy Online: A Report to Congress。  new window
圖書
1.Mayer-Schönberger, Viktor、Cukier, Kenneth、林俊宏(2013)。大數據。遠見天下文化。  延伸查詢new window
2.Westby, J. R.(2004)。International Guide to Privacy。Chicago, IL:American Bar Association。  new window
3.許文義(2001)。個人資料保護法論。台北:三民書局。  延伸查詢new window
4.范姜真媺、高啟中、翁清坤、李寧修(2015)。我國電信業及電信加值網路業個人資料保護與監管機制之研究。臺北:國家發展委員會。new window  延伸查詢new window
5.Bernasek, Anna、Mongan, D. T.、吳慕書(2015)。失控的大數據:當企業比你更了解你,該如何保護自己和口袋裡的錢?。臺北:商周。  延伸查詢new window
6.Davenport, Thomas H.、江裕真(2014)。大數據@工作力:如何運用巨量資料,打造個人與企業競爭優勢。臺北:天下文化。  延伸查詢new window
7.Goodman, Marc、林俊宏(2016)。未來的犯罪:當萬物都可駭,我們該如何面對。木馬文化。  延伸查詢new window
8.葉秋南(1996)。美國消費者信用管理。臺北:財團法人金融聯合徵信中心。  延伸查詢new window
9.Benjamin, S. M.、Lichtman, D. G.、Shelanski, H. A.、Weiser, P. J.(2006)。Telecommunications Law and Policy。Durham, NC:Carolina Academic Press。  new window
10.Cate, F. H.(1997)。Privacy in the Information Age。New York, NY:Brookings Press。  new window
11.Hirshleifer, J.、Hirshleifer, D.(1997)。Price Theory and Applications。Upper Saddle River, NJ:Prentice Hall。  new window
12.McCarthy, J. T.(2004)。The Rights of Publicity and Privacy。St. Paul, MN:West Group。  new window
13.Soma, J. T.、Rynerson, S. D.(2008)。Privacy Law。St. Paul, MN:West Group。  new window
14.Solove, Daniel J.、Schwartz, Paul M.(2011)。Information Privacy Law。New York, NY:Aspen Publisher。  new window
15.Swire, P. P.、Litan, R. E.(1998)。None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive。Washington, DC:Brookings Institution Press。  new window
16.Alan, F. W.(1967)。Privacy and Freedom。New York:Atheneum。  new window
其他
1.Kovacevich, R. M.(2000)。Privacy and the Promise of Financial Modernization,https://www.miimeapolisfed.org/publications/the-region/privacy-and-the-promise-of-financial-modemization。  new window
2.President's Council of Advisors on Science and Technology, Executive Office of the President(2014)。Report to the President: Big Data and Privacy: A Technological Perspective,https://bigdatawg.nist.gov/pdf/pcast_big_data_and_privacy_-_may_2014.pdf。  new window
圖書論文
1.翁清坤(2013)。以同意為基礎之個人資料保護體制。陳猶龍教授六秩華誕祝壽論文集。臺北:承法數位文化公司。  延伸查詢new window
2.湯德宗(2009)。違憲審查基準體系建構初探:「階層式比例原則」構想。憲法解釋之理論與實務。中央研究院法律學研究所籌備處。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE