Dissertationen zum Thema „Zimbabwe Data Protection Act“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-39 Dissertationen für die Forschung zum Thema "Zimbabwe Data Protection Act" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Cheng, Sin Ying. „Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /“. View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.
Der volle Inhalt der QuelleCoulibaly, Ibrahim. „La protection des données à caractère personnel dans le domaine de la recherche scientifique“. Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00798112.
Der volle Inhalt der QuelleČernohorský, Jan. „Řízení provozu IT v modelu MBI se zaměřením na prostředí středních škol“. Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193928.
Der volle Inhalt der QuelleWells, William Ward. „Information security program development“. CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Der volle Inhalt der QuelleMaguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.
Der volle Inhalt der QuelleSchool of Computing
Ph. D. (Information Systems)
CHEN, CHIEN-YUN, und 陳倩韻. „The Theory and Practice of Data Protection after the Amendment of the New Data Protection Act“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/97560954807508456263.
Der volle Inhalt der QuelleMiau-chih, Chou, und 周妙枝. „A Study on Punishment in Personal Data Protection Act“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/96157410474783054489.
Der volle Inhalt der Quelle東吳大學
法律學系
102
"Personal Data Protection Act," revised from "Computer Processing of Personal Data Protection Act," amended and promulgated on May 26, 2010, was announced October 1, 2012. Its focus on amending the law on criminal responsibility, the main object is to extend the penalty-profit and non-violation of norms intent crime, and violations of intent for profit, increase criminal liability to five years imprisonment, and a NT $ 1 million fines will also intent on profit and public agencies committed the crime of obstruction of a lawsuit to recover assets correctness requirements to non-telling is on. The new law provides for a penalty of about funding, in addition to the violation of the criminal law seems clear Elements of the basic requirements, there is also the main crime problem is unknown and in criminal and non-exploitative degree of blame were treated in other countries. With regard to those points, in this paper asserts: (a) to avoiding implicated too broad, should be deleted non-exploitative criminal violation of Personal Data Protection this Act, instead of torts damages or administrative penalties; (b) to avoid to conflict with The Freedom of Government Information Law and contrary to the original intention of the legislation, public schools, public hospitals, social education institutions and other non-exercise of public authority of local or central authorities should be included in the scope of official authority specification; (c) for the avoidance of too general to expand the definition of personal data, should be added "can recognize the individual's data" after the exemplified regulations, and too difficult to distinguish the sensitivity of personal information, can be used the "health" instead of "medical", "health" and "health check"; (d) the statistical or scholarly study of the individual to whom the information collection, processing, use, or outside Objective , should have a higher public nature, and should then set certain provisions in the program party terribly.
Liang, Yi-Fang, und 梁憶芳. „A Personal Data Risk Management System Based on Personal Data Protection Act“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/8ttrz8.
Der volle Inhalt der Quelle國立中興大學
資訊科學與工程學系
103
In order to catch up with international trends on regulating privacy protection, Taiwan government revised the Personal Information Protection Act in 2010. Since then, the national universities and colleges started actively to implement the Personal Information Management System (PIMS) for complying with the law. In the universities of Taiwan, most of the personal information records are stored in the information systems that are developed and maintained by the computer centers. Therefore, the computer centers are usually assigned to take charge of developing the Personal Information Management System. Even though, the computer centers have the experience on deploying the Information Security Management System (ISMS), they still face the challenges on developing a good PIMS due to lack of life cycle management of personal information in ISMS. In this thesis, based on the lessons learned from developing PIMS systems by National Chung Hsing University and Feng Chia University, we design and develop a personal data risk management system based on Personal Data Protection Act by adding version control and risk management modules to the PIMS system. The developed PIMS has been installed in Chung Shan Medical University, and it can be used as a demo site for the PIMS system.
Nai-Kang, Huang, und 黃迺康. „A Study of Management Mechanism for Enterprise Privacy Protection Based on Personal Data Protection Act“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/97067221936394110771.
Der volle Inhalt der Quelle國立中正大學
會計與資訊科技研究所
99
The Legislative Yuan passed the Personal Data Protection Act on April 27th, 2010, and it let the personal data protection issues call the public's attention. In the future organization, regardless of their size or the amount of personal data, will be subject to the Personal Data Protection Act. It affect the data collection and processing way and the marketing practices, and it also increase criminal penalties and compensation that is up to $200 million when the enterprise is against the law. Therefore, the enterprise should engage in planning and implement information security protection of personal data at this stage in quickly. ISO 27001 is an international standard of information security management system. But this is not representative for the integrity of personal data protection in the enterprise when they follow ISO 27001. The enterprise’s information security is focus on the confidential information and less to the customer's personal data. As a result, it make inadequate on personal data protection and enhance the possibility of conflict with the law. In this situation, the enterprise must adjust and build the appropriate security structure to control personal data processes to meet compliance requirements. So they require a complete set of standards to follow to ensure the enterprise adjust properly, comply with regulations, and fulfill the obligation of protecting personal data. This study applies the Gowin's Vee research strategy. In the conceptual side, we sorted out 4 control domains, 15 control objectives, and 75 control measures which develop the Enterprise Privacy Protection Management Mechanism by literature review about Personal Information Management System and Personal Data Protection Act. Then we apply the Delphi Expert Questionnaires to fix this mechanism and add a new control measure. In the methodological side, we use the case study to verify and assessment the practicality and availability of this mechanism. This research shows that the research outcome, the Enterprise Privacy Protection Management Mechanism, provides organizations a reference and compliance purpose to help them obey the law, reduce the risk of litigation, and fulfill the responsibilities of protect personal data.
WEI-CHU, LUO, und 羅偉助. „A study of the information free act and the protection of personal data act in Japan“. Thesis, 2003. http://ndltd.ncl.edu.tw/handle/91241137043285248940.
Der volle Inhalt der QuelleLIAO, PEI-YUN, und 廖珮雲. „A Study on the Enterprise Big Data and Personal Data Protection Act- Focus on Financial Industry“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8u97pg.
Der volle Inhalt der Quelle東吳大學
法律學系
106
In the fierce competition of the market, the importance of The Big Data analysis will be rapidly increased in near future, and the finance holding company and their subsidiaries have holding the massive and integrity personal data base, which has inherent advantage in utilize of The Big Data. But due to the character of The Big Data was massively, emphasized the velocity and data diversity. It will be facing amounts of potential legal crises while combining, comparing and analyzing of personal data through the technology machines. Knowing how to achieve equilibrium between the development of technology and the protection of privacy right has becoming the biggest challenge and dilemma at the present era of The Big Data. Moreover, in terms of co-selling between subsidiaries, even though the Financial Holding Company Act. has the regulations that the personal data can be used for co-selling between the subsidiaries if its compliance with law. However, it still facing the multiple legal crises and the law can’t be completely implement while utilize the Big Data to collecting, processing and using the personal data in practice. In fact, the financial holding company and their customers should be focus on knowing how to obtain the best profit without infringe on privacy right, it shouldn’t be invalided the protection of Personal Data Protection Act. Furthermore, in this paper, it recommends that should be remain open-minded for co-selling act on the regulation of law. At last, in terms of cross-industry alliance of the financial holding company group, it is hard to implement the regulations despite of the authority of Personal Data Protection Act in Taiwan has been distributing by different competent authority of its undertaking purpose, furthermore, the over-strict investigate under the regulations of Personal Data Protection Act has hinder the free flow of data information. In order not to mutual check between the law and the development of Financial Technology(FinTech), for bringing the financial big data analysis value into fully performance under the perfect protecting regulations in the future, this paper will forward the suggestions of amending the law, hoping to solve the present dilemma.
CHIANG, CHE-YU, und 蔣哲宇. „Administrative Inspection on Electronic Business’s Proper Security Measures under Personal Data Protection Act“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/waw83q.
Der volle Inhalt der Quelle東吳大學
法律學系
107
The purpose of this thesis is mainly related to the issue of "Personal Information Protection". The author compares the experience of e-commerce in accepting personal information protection administrative inspections and compares them with the domestic and international personal information protection legal system. In order to discuss the standards for “Proper Security Measures” and "Administrative Inspections". With the development of the Internet and the Information and Communication Technology (ICT), although the convenience of data transmission is facilitated, there is also a great risk hidden. In the context of the booming global e-commerce, it is expected that e-commerce will continue to grow steadily in the next few years, and the analysis and use of personal information by the industry is the key to creating opportunities. However, in view of the fact that domestic and foreign incidents of infringement of the rights and interests of the parties due to the abuse of personal capital have occurred frequently, or even caused serious property losses to the parties, although the Personal Information Protection Law of Taiwan had been implemented in 2012, the trend of personal data loss or stolen has not yet slowed down. With the introduction of international cross-border privacy protection issues, if we want to strengthen exchanges and cooperation with the international community, to prove that the ability of domestic data protection is also an important issue. Therefore, how to make recommendations from the legal system, the supervisory side and the management side to ensure the security of the individual assets of the parties is an issue that needs to be discussed. This thesis first discusses the development of the international personal information protection legal system to understand the current trends in personal information protection and cross-border transmission issues. Secondly, it compares with the evolution of Taiwan's domestic Personal Information Protection Law and the Cyber Security Management Act. In this way, we can conclude the direction of Taiwan’s current legal system; in addition, through the comparison and research of Taiwan’s administrative inspections, as well as the author’s experience in the administrative inspection of the Personal Information Protection Law, it gives the suggestion to the supervision of the personal protection. In addition, comparing the proper security measures adopted by Taiwan and the international community, in order to understand what can the administrative should do in Taiwan. Over all, summon the conclusion of personal information protection in legal system, supervisory and management. Expect to help the future development of the personal information protection legal system in Taiwan and the cross border transmission of personal information.
Li, Cheng-Wei, und 李振瑋. „DATA SUBJECT RIGHTS IN THE U.K. DATA PROTECTION ACT 1998 – FOCUSING ON THE RIHGT OF ACCESS TO PERSONAL DATA“. Thesis, 2008. http://ndltd.ncl.edu.tw/handle/55491877330763775745.
Der volle Inhalt der Quelle元智大學
資訊社會學研究所
96
Data protection is an important issue in modern information society. “Computer Processing Personal Data Protection Act” in Taiwan has come into force since 1995. People usually focus on the issue of appropriation of other’s personal data. However, claims based on the rights of data subject are rare. Scholarly papers about data subject rights in the legal community are also few. This thesis studies the data subject rights in the U.K. “Data Protection Act 1998”. Right of access to personal data is the primary subject matter. By studying three U.K. court opinions on right of access, the author illustrates the right of access to personal data in action. Finally, the thesis addresses suggestions for amendments of the “Personal Data Protection Act” in Taiwan.
Chou, Ying-Chiu, und 周盈萩. „A Study on User's Experience of Privacy Protection Provided by Online Banking-Based on Personal Data Protection Act“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/75967971953695175048.
Der volle Inhalt der Quelle亞洲大學
資訊工程學系碩士在職專班
101
With rapid development of the Internet and growing popularity of online banking, the purpose of the study was to explore how users of online banking in Taiwan think about privacy protection and the enforcement of Personal Data Protection Act. A questionnaire was designed and sent out to investigate the following four dimensions-to what extent do clients use Online Banking, whether clients trust the privacy protection provided by their banks, the impact of Personal Data Protection Act on users of Online Banking, and to what extent, in terms of privacy protection, do clients satisfy their experience of using Online Banking. Three users of Online Banking were recruited for semi-structured depth interviews. Besides, the study also made forms comparing measures taken by different online banks in the face of the enforcement of Personal Data Protection Act. The results of the research indicate that: (1) The main reason for using Online Banking is to save time as well as obtain various services such as checking saving account, paying bills, foreign currency transaction, and fund investment. (2) Most users believe the transaction mechanism offered by Online Banking is secure, and their rights are protected. However, they just can’t fully understand what personal information is collected and who will use it. (3) The news of enforcing Personal Data Protection Act is widespread, but either bank doesn’t exactly proclaim what rights users should have, or user skips statements related to their personal information due to negligence. (4) Users of Online Banking pay more attention to the issues concerning privacy protection owing to the enforcement of Personal Data Protection Act, and they hold positive attitude towards endeavors made by banks regarding wisely dealing with personal information. Nonetheless, it doesn’t mean that clients will, therefore, be more willing to use Online Banking services. keywords : Online Banking, Personal Data Protection Act, User Experience
Naude, Adrian. „Data Protection in South Africa : the Impact of the Protection of Personal Information Act and Recent International Developments“. Diss., 2015. http://hdl.handle.net/2263/46094.
Der volle Inhalt der QuelleMini-dissertation (LLM)--University of Pretoria, 2015.
tm2015
Private Law
LLM
Unrestricted
LIN, CHI-TE, und 林奇德. „A Case Study Analysis on Practical Strategies for Businesses under Personal Data Protection Act“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/87387238519696167756.
Der volle Inhalt der Quelle國立中央大學
資訊管理學系在職專班
101
The Personal Data Protection Act (referred to as the “PDPA” hereafter) approved by the Ministry of Justice takes effect on October 1, 2012 and formally replaces the 1995 Computer-Processed Personal Data Protection Act. A milestone has indeed been reached in Taiwan with regards to personal data protection. But despite the enforcement of the PDPA, over 50% of businesses have not yet implemented any corresponding measure. One major reason is a lack of clear guidelines according to a survey (iThome, 2012). Most research conducted previously offer recommended corresponding guidelines from a theoretical perspective. Through a case study method, this research examines from a practical perspective problems and strategies encountered by the case company under the PDPA. By detailing strategy development processes and providing a practical model, this research aims to complement businesses with knowledge of the PDPA. The case company is proved to be effective in protecting personal data. Problems faced by the company and its important corresponding strategies are summarized. In the end of the research, practical suggestions are provided for both industry and the government. On one hand, the industry should not only avoid violating the law, but fulfill its responsibility in protection. On the other hand, the government should stipulate clear guidelines so that central and local governments have no way to shirk responsibility in case of disputes. The government should launch supporting measures, fulfill its responsibility in management, and provide the industry with guidelines.
CHENG, HUAI-CHUN, und 鄭懷君. „Legal Study on the Concurrent Conflicts of Personal Data Protection Act and Criminal Law“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/92146371421250786540.
Der volle Inhalt der Quelle東吳大學
法律學系
101
The research of the paper aims at the concurrent conflicts between the Personal Data Protection Act and the Criminal Law. In short, compared with its predecessor, the Computer-processed Personal Data Protection Act, the Personal Data Protection Act has been covering almost all personal data, not only limited to those computer-processed. In other words, a large number of cases which could only be handled with the Criminal Law in the past will be directly governed by the Personal Data Protection Act, and the criminal justice practitioners of our nation will surely face much more lawsuits than past. In this way, it is inevitable that how to select the applicable law when there are concurrent conflicts between the Criminal Law and the Personal Data Protection Act will be a brand new challenge for the criminal justice practitioners or in the academic circle. This paper in Chapter I Introduction will brief the background, motivation and purpose of the research, present the research scope and method, and introduce the framework of the paper. Since the purpose of the legislation of the act is to avoid the infringement of the right of personality, Chapter II starts from the concept, nature, and features of the right of personality, development background and protection subjects of the legal protection and information privacy and details by citing No. 603 Explanation of the Grand Justice Conference of the Judicial Yuan. Chapter III firstly studies in details the core prerequisite concept running through the Act, i.e., the concept of “personal data”, and analyzes as a case the unlawful acts described in Article 41 and 42 of this Act. Chapter IV, in addition to the brief introduction of the Criminal law concurrent conflicts theory, mainly centering on different cases discuss the concurrent conflicts in crimes between the Act and the Criminal Law. In the last chapter, Chapter V, the conclusion of the paper and the specific suggestions and references for our academic circle and justice practitioners are presented. Key words: Personal Data, Personal Data Protection, Criminal Law, Concurrent Conflicts, Right of Personality, Privacy Right, Information Privacy Right, Information self- determination Right.
Hou, Meng-Yu, und 侯孟妤. „In response to the implementation of the Personal Data Protection Act explore enterprise risk management“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/55696633460596046360.
Der volle Inhalt der Quelle淡江大學
保險學系保險經營碩士在職專班
101
No matter when you''re taking a bus or MRT, or even during a meeting, a chatting or a gathering, people holding an iPhone or various Android cell phone in their hands has become a consistent phenomenon across the world. Being a technology device that moves with its user, cell phone also incurs numerous emerging social problems because of its characteristics of web connection at any time as well as power functions. At a time when everyone enjoys its convenience and shares his/her life with each other, personal information has been collected and utilized by companies without anyone''s notice. With the speedy development of e-commerce and cloud technology, people''s living habits and types of business management have also been changed accordingly. This ensures speedy circulation of information as well as easier storing and retrieving of information. For businesses which utilized internet before, or the general public who left their personal information in writing, their information could face risks of unduly recording, unauthorized duplication, information leakage, accidental deletion or even third party''s inappropriate utilization. The core of personal information protection lies in the protection of information privacy. In the past, however, privacy protection from our government, businesses, schools or even individuals was still in the beginning phase. This had led to accidental utilization of personal privacy information by someone with specific intent and incurred relatively huge controversy accordingly. In recent years, we have witnesses the aggressiveness of defraud syndicates, unlawful personal information utilization by syndicates as well as increase on the number of defraud cases. Therefore, issues of personal information protection have received more and more emphasis and discussion. Through years of effort and modification of law, modification for "Personal Information Protection Act" (hereinafter referred to as "New Personal Information Act") finally completed on May 26th, 2010. Previous Act was modified in large scale. This modification not only expands original law application scope, it also stipulates process as well as obligations to be fulfilled during business or individual''s collection of personal information. In this article, we first introduced evolution of Personal Information Protection Act here in this country and offered an understanding on emphasis and meaning for the modification of the Personal Information Protection Act. We then raised the issue that personal information as well as business secrets for related parties of businesses including customers, upstream/downstream vendors, collaborating partners and employees are likely to be exposed to the state of unsafe information. We also illustrated how business could, under the circumstances of protecting their interests and compliance with requirements from Personal Information Protection Act, fully fulfill their duty on information protection to avoid violation of law, damage on goodwill, litigation as well as large amount of damage compensation from their unawareness of law. Furthermore, businesses should review their responsibility risks. In addition to aggressive prevention, businesses should learn how to ensure appropriate insurance in accordance with their own characteristics, develop cost efficiency and achieve business risk management goal.
Jhang-Jian, Hong-Ming, und 張簡宏名. „A Tool for Preventing Personal Financial Data from Leaking Based on Personal Information Protection Act“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/d8925b.
Der volle Inhalt der Quelle國立中興大學
資訊科學與工程學系所
101
In recent years, there are more and more personal information leakage cases in Taiwan. Therefore, in order to prevent the leakage of personal information from causing damage to the rights of people, the Taiwan government enacted the Personal Information Protection Act on October 1, 2012, which established relevant norms and penalties for leakage. In response to the Act, Taiwan Academic Network (TANet) deployed a system, which is based on regular expression checking, in regional centers to scan the web sites of its subordinates for possible basic personal information leakage and generate risk analysis report. In this thesis, we develop a browser plug-in for detecting both basic and financial personal information in to-be-published web contents or attachments. This tool can be used as proactive actions for preventing personal information from leakage by accident or negligence. The proposed method uses table and keyword extraction to extract personal financial data. The extracted data are transformed into a bit vector representing personal financial feature. The C4.5 classifier is then used to predict if the feature is indeed a financial data that should be protected. The proposed system also provides clear and concise charts to show the results of risk analysis.
CHIH-HSIEN, LEE, und 李志賢. „Study of Implementation of Enterprise Personal Data Protection Act Monitoring Projects - IT Companies as Example“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/3m4558.
Der volle Inhalt der Quelle正修科技大學
資訊管理研究所
103
In recent years, more and more personal information to be used as a fraud syndicate tools. In order to ensure that personal information will not be leaked by enterprises, "Personal Data Protection Act" was promulgated and implemented in Taiwan and its purpose is to allow companies to fulfill the obligation to protect customer’s data, and then achieve the goal "of compliance exemption". This study is response to data auditing mechanism, which combined with existing enterprise management mechanisms and personal risk assessment, and implement a data-owned law advocacy and information security education and training, making the business in line with the law and regulations. Database Activity Monitoring (DAM) tools have been implemented to capture the records from user and server connections of application server and then compared that to user and SQL execution record in the server side database. From these records, the companies can determine which violates the information security policy to executive warning or blocking invasions and track events. It can continuously monitor and analyze database activity in real time, once activity violating of the security policy of the database, warning message will be send immediately. All the tracks can be recorded for later analysis, identification of end-users and accountability, and can solve enterprise database security audit and other issues. This study also confirms DAM can be reached the goal all the time to protect enterprise’s data forming a layer of safety nets to protect critical assets owned by companies.
LI, WAN-CHI, und 李婉綺. „Study of issues law to Personal Information Protection Act under the Age Of Big Data“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/jyu5a8.
Der volle Inhalt der Quelle國立高雄大學
法律學系碩士班
107
The analysis and application of big data, although it can promote industrial development, improve government efficiency, activate the economy and improve medical quality, but also derives many data protection issues. In the application of the Personal Data Protection Law, important concepts and mechanisms under the existing personal data protection legal system such as purpose limitation principle, informed consent and de-identification have created major challenges in the era of big data.The analysis and application. Under the trend of big data analysis, the amount of data that has been circulated abroad has increased greatly. The possibility of discriminating data and being re-screened by comparison with other data is increasing. How to properly use the mechanism for discriminating will also become an individual. The data protection law needs to face the difficulties. By comparing the provisions of foreign legislation with China's Personal Data Protection Law, the definition of specific purposes, so that the parties are aware of and can choose whether to agree or not, whether the legislative interpretation of the current personal data is appropriate, and whether the definition of personal data in China is In the light of the era of big data, legislative amendments should be made, and the issue of the protection of personal data in the use of public affairs organs is the direction of discussion in this paper. This article uses the GDPR (General Data Protection Regulation) in the European Union in 2018 to study and provide for the handling of controversial issues in the country. Therefore, in addition to the need to implement personal data protection and information security work, the public information It is also necessary to review the relevant procedures and administrative inspections. This research adopts the literature analysis method and the comparative research method, collects the legal system of various personal data protection at home and abroad, takes the Taiwan Personal Data Protection Law as the main axis, refers to the personal data protection laws and regulations of international organizations and advanced countries, and organizes and summarizes the individual.The principles and characteristics of data protection, in light of China's national conditions, put forward relevant recommendations on the revision of the law.
LIN-JHIH-HAN und 林志翰. „The Relationship between Privacy Disclosures and Corporate Performance Focused on the Personal Data Protection Act“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/65940982400215003411.
Der volle Inhalt der Quelle國立臺北大學
會計學系
101
The Legislative Yuan passed the Personal Data Protection Act on April 27th, 2010, and it let the personal data protection issues call the public's attention. In the future organization, regardless of their size or the amount of personal data, will be subject to the Personal Data Protection Act. It affect the data collection and processing way and the marketing practices, and it also increase criminal penalties and compensation that is up to $200 million when the enterprise is against the law. Therefore, the enterprise should engage in planning and implement information security protection of personal data at this stage in quickly. BS 10012 is the international standard of information security management system. It is also accepted to take the security authentication by Taiwan enterprises. Follow PDCA management cycle, it standardizes Information security control flows. Finally, it needs to decide what the control standards and policies will be set up to conform BS 10012 standard. So as to achieve the information security goals of the Confidentiality, Integrity and Availability. This study apply the self-assessment of privacy disclosure form and sorted out 4 control domains, 13 control objectives which develop the Enterprise Privacy Protection Management Mechanism by literature review about BS 10012 and Personal Data Protection Act. This research shows that the research outcome, the Enterprise Privacy Protection Management Mechanism, provides organizations a reference and compliance purpose to help them obey the law, reduce the risk of litigation, and fulfill the responsibilities of protect personal data.
Jia, Shan-Ting, und 賈善婷. „A Study of the Management Mechanism of the Medical Information Security and Privacy Protection Based on the Personal Data Protection Act“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/84543761743161822069.
Der volle Inhalt der Quelle國立中正大學
會計與資訊科技研究所
101
Since the development of information technology and network increase many personal privacy data divulging and cause legal problems. For special personal medical information industry, the effect of a more even owned Great leak. If the medical institution fails to take timely protection mechanisms, resulting in leakage of privacy issues, will face civil damages up to 200 million NT dollars, more likely to produce serious medical institutions damaged the credibility of the consideration. Therefore, the medical institutions of privacy and information security measures also become more important. ISO 27001 is widely used in international information security management system standards. ISO 27799 is the extension of ISO 27001 for the medical institutions to develop medical information security management standards, while in Taiwan; there is less hospital use this standard for information security management. With response to the implementation of the new Personal Information Protection Act, medical institutions in information security management, they need to incorporate the concept of personal data protection, reducing leakage the privacy of medical information system risks. This research used the groung theory to construct the prototype of the mechanisms, including the four control areas, 21 control objectives and 70 controls, via 12 experts to check and modify it. Then used case study to interview with relevant person to understand two case hospitals how to take responses to the Personal Data Protection Act and what is the current situation and difficulties. After that, this research analyzed the role of division and responsibilities. Through case study can realized for this research institutional architecture of the applicability in practice. The protection mechanism constructed in this research, can be used to assist local SMEs expect comprehensive medical institutions in response to a funded under this Act to establish a sound legal compliance and medical information security protection framework.
Luan, Chia-Hsiang, und 欒家祥. „Free Methods for PDF Documents Data Masking - A Way to Abide by Personal Information Protection Act“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/yd5988.
Der volle Inhalt der Quelle中國文化大學
資訊管理學系碩士在職專班
102
A research paper by Institute for Information Industry(2012) pointed out that the implementing of Personal Information Protection Act shall be a shock to public department and numbers of Individual enterprises. Without discrimination to all vocations, the new law makes everyone need to give the evidence voluntarily to prove them innocence. Setting up administrative systems of personal information is no more only in public department or few vocations. There is no idea if anybody has no access but to read the document (especially official document) in the process of copy clerk's work due to documental forwarding or trans-departmental business. In order to follow rules of Personal Information Protection Act and keep official documents confidential, data masking is one of the radical methods to solve the anxieties. Because of a high price, several software with data masking function haven't been popularized so far. In this search, we will focus on PDF documents. Trying to find out Freeware or Trialware which you can get it easily from the internet and combines them to mask data perfectly. We expect this research may protect plenty of people from offense suffering; moreover, these data masking software' sets also need to be user-friendly, efficient as well as safe during business.
Wang, Ting-Ya, und 王亭雅. „The Influence of New Personal Data Protection Act on Users’ Behavior Intention in Social Networking Websites“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29526550480202633514.
Der volle Inhalt der Quelle世新大學
資訊管理學研究所(含碩專班)
101
The development of Internet technology, the emergence of social networking sites has changed the way of communication between people, through the Internet, people's relationship to a closer, more and more users choose a Social Website Platform to share with friends and build relationships, making the inextricable relationship between the people and the Social Website Platform. Social networking sites also changes along with time. The trend to set the personal data to transparency, openness, therefore brings a lot of privacy issues, such as the leakage of personal information. Social networking websites in order to balance openness and privacy issues updates privacy settings, and policy, many times to reduce privacy issues as well. On October 1, 2012 implementation of the New Personal Data Protection Act is more rigorous to protect of users' personal data. After the implementation of the Act, users make use of social networking sites, we want to know whether they one more concerned about the protection of personal data, the change of the users behavior. The case of Facebook, to explore after the implementation of the New Personal Data Protection Act, whether the intention of the behavior using the social networking sites is influenced by perceived privacy risk, privacy mechanism and privacy information concerns. The study surveyed 426 valid samples. According to the results of statistic analyze: information privacy concerns significantly affect attitudes. Perceived privacy risks affect attitude as expected. Structural guarantee and privacy empowerment significantly affect trust. Trust, subjective norms and attitude significantly affect behavioral intentions.
KUO, CHUN-I., und 郭淳頤. „Study of indirect identify referred to Personal Information Protection Act under the Age Of Big Data“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/25910283430465763068.
Der volle Inhalt der Quelle東吳大學
法律學系
104
Internet has led to the development of E-Commerce, changed our life. It also makes many individuals to leave lots of messages on the Internet. Under the age of Big Data, these personal messages might be combinated, be analyzed, and to identify a specific person. Whether the information is applicable for Personal Data Protection Act only if it could be identify a specific person .It is a big issue about how to recognize “Personal Data” under the age of Big Data. Our recognization and thinking have changed under the age of Big Data. Is it appropriate of definition of personal data under the age of Big Data? Is it necessarily amended of the definition of personal data? The main aim of this thesis is to discuss about identification. Chapter 1 is an introduction, presenting an overview of the research included the motivation, methods, scope and structure. Chapter 2 is firstly going to discuss on legislation overview in UK, Japan, Hong-Kong and Taiwan, then to analyze on what Legislative Purpose we care. Last, we intend to discuss the protection of core of Legislative Purpose. Chapter 3: we introduces what is the meaning of big data, and the impact of the age of Big Data generated on our recognization and thinking system. Chapter 4: we discusses the big data how to become a part of human understanding and awareness under the age of Big Data. Further it would be a issue of identification and de-identification referred to Personal Information Protection Act. Chapter 5: Finally, we reviewed, concluded, and made recommendations.
Chang, Pen-Li, und 張本立. „A Study on the Legal Interests of Personal Data Protection in the Information Age─A Focus on the Personal Information Protection Act“. Thesis, 2012. http://ndltd.ncl.edu.tw/handle/vh45e6.
Der volle Inhalt der Quelle國立臺灣大學
科際整合法律學研究所
100
The purpose of this thesis is mainly related to the issue of "personal data protection", including finding out the meaning of why on earth protecting personal information.Besides,is that a suitable thing to use criminal laws to punish those people who illegally used personal data? That''s the point this essay want to investigate about. As a result of the technology getting advanced, the discuss of personal data protection is more and more important now. The progress of technology is not only bringing the benefits to the whole society, but also becoming the threats to the personality rights. The rights behind the personal data is never been discussed before. Therefore it''s a new kind of personality right. In different countries, there are different names of this new type of personality right. In the United States, it''s called" information privacy". In Germany, it''s called " informationelle selbstbestimmung"(right of information self-determination). In Taiwan, the legal explanation She Tze Number 603 of the Judicial Yuan has declared that the mandatory finger printing regulation of Section 8 of the Household Act is unconstitutional, because of the "information privacy ". Indeed, it is necessary to protect such rights due to the growing cyber society. However, sometimes there is no need to use criminal law to punish those people who offend other people''s information privacy. If the civil law is enough to deal with those situation, the criminal penalties will become some kind of "evil law". After the analysis of this essay," the Personal Information Protection Act " at year 2010 does have this question, and it needs urgently the modification by legislators. Last but not least, if it is inappropriate to use "the right of information self-determination" to be the legal interests of criminal punishment, we can consider about the possibility of paradigm shifting: switching from personal legal interests to social legal interests. Using criminal punishments to keep people''s trust to information security. In that case, it can more fit the interests of whole society really need under information ages.
Hsu, Shu-Ping, und 許淑萍. „The Impact of Personal Data Protection Act upon Freedom of Information-A Study derived from Government Practices“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/41625430552759376315.
Der volle Inhalt der Quelle東吳大學
法律學系
99
In a democratic society, there should be efficient and appropriate two-way communication channels between the government and the people. Government should respect the rights of the people, and satisfy the people’s right to knowledge by providing sufficient and complete information to the people. By freely dispersing knowledge, government allows the public to form credible opinions on important issues, which can facilitate the process of compromise and the reaching of agreement. In addition, free access to knowledge allows the people to get, gather, and analyze the information they need to monitor the efficiency and the effects of government policies. Therefore,establishing procedures that allow barrier free public access to government information is a key issue that all citizens of a democratic society should pay attention to. On the other hand, government can use its authority to gather sensitive and personal data easier than non-governmental organizations and individuals. But if this personal data gathered by the government is not used properly, it will negatively impact our right to privacy.“The Computer-Processed Personal Data Protection Law”was announced by the ROC Government in August 1995 to deal with the issue of protecting personal data privacy. In May 2010,the act was amended and renamed as the“Personal Data Protection Act,” enlarging the data protection range. While one key purpose of the “Personal Data Protection Act”is to protect the individual’s right to privacy by ensuring that personal data will not be released and used improperly without permission. The other purpose is to allow people to involve in the whole procedure of government gathering, processing, and using the personal information. In addition, to facilitate our right to knowledge and thus solidify the ROC’s foundation as a democracy, the Government also announced“The Freedom of Government Information Law” in Dec 2005. This thesis is based on an analysis of personal data to discuss the relationship between the freedom of government information and the personal data privacy. This research checks to see if the “Personal Data Protection Act”follows the principles of personal data privacy,identifies the range of personal data that should be protected, and evaluates the impact of the “Personal Data Protection Act” upon the freedom of government information. The thesis comprises nine chapters as follows: Chapter 1:News coverage in recent years illustrates the types of incidents where the government could invade personal data privacy. This, in turn, underscores the importance of the government’s protection of personal data privacy, and highlights the dilemma between the publication of government information and the protection of personal data privacy. Chapter 2:This Chapter explains the concepts of the right of privacy,the right to knowledge, as well as consolidates relevant laws and regulations in ROC. Chapter 3:This Chapter reviews foreign and international systems protecting personal data. Chapter 4:This Chapter illustrates the procedures of the enactment of ROC’s “Personal Data Protection Act” and “The Freedom of Government Information Law”,and examines whether the relevant principles protecting personal data privacy have already been incorporated therein. Chapter 5:This Chapter compares the freedom government information system and the personal data protection system to find out the consistence and difference. Talk over the relationship between the freedom government information system and the personal data protection system. Chapter 6:This Chapter is to identify the range of personal data that should be protected. Chapter 7:This Chapter analyzes the criteria to distinguish what personal data needs to be protected. Chapter 8:This Chapter discusses potential problems and controversies that may arise in practice, and proposes some solutions. Chapter 9:Finally, this Chapter summarizes all the foregoing and provides some suggestions to protect personal privacy.
Hung, Hui-Ju, und 洪慧如. „The study of established management mechanism for the new Personal Data Protection Act – The case of E Company“. Thesis, 2012. http://ndltd.ncl.edu.tw/handle/56181524675310910603.
Der volle Inhalt der Quelle世新大學
企業管理研究所(含碩專班)
100
Promulgation of the Personal Information Protect Act on 2010/5/26 in Taiwan. Informant Rules of Personal Information Protect Act are expected to be implemented in the third quarter of 2012 after the announcement. In the future, the organization which violates Personal Information Protect Act will be fined up to maximum of 200 million NTD, and the responsible persons may even be facing major penalty of five years of imprisonment. This study is mainly focusing on the SMEs, through the case interviews, in-depth talking about how to face the tremendous impact of the new personal Information Protect Act and also providing the ideas and references to help companies to complete law compliance purposes. After the case studies and analysis, this study found the following steps are recommended to help the enterprise establish a complete capital protection and management references: 1.Analyzing the status of the corporate internally and externally and educating all employees to have the consensus of Personal Information Protect Act. 2.Researching Personal information inventory to ensure the process of the personal data handling and collecting in the company comply with the act. 3.Building a standing committee on Personal Information Management and establishing a new department in a company which responsible for the implementing Personal Information Management. 4.Tracking the operation of the internal personal information management through the corporate internal auditing, and providing timely adjustments and improvements.
CHANG, YU-TAN, und 張又丹. „A Comparative Legal Study on the Proposed Amendment of Taiwan Personal Data Protection Act – Using Hong Kong Personal Data (Privacy) Ordinance as Example“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/7ej672.
Der volle Inhalt der Quelle東吳大學
法律學系
105
With the exploration and popularization of the internet and communications technology, our life became convenient and efficient. On the other hand, it also brings lots of problems of privacy protection, and leaks of personal data are frequently reported. Because of the change of the times, the transfer of personal data is not only in a country or a specific area; it can be extended to the whole world. Therefore, the exploration of the law for personal data protection is getting particularly important. And it also raises people's concerns and disputes for this issue. From the Personal Data Protection Act in Taiwan of view, the Computer-Processed Personal Data Protection Law was formulated in 1995 but is not completed and becomes outdated. Until 2012, it’s changed to Personal Data Protection Act. However, the laws have to be modified and updated with the changes of society. The legislature in Taiwan always takes reference of the practice in other developed countries or neighboring countries to formulate laws. In order to foster the development of personal data protection laws in Taiwan, I took Hong Kong as a comparison and provide my humble opinion for amendments of Personal Data Protection Laws in the future in this research report. First of all, the first chapter is to explain the research motivation and purpose; and the next part is a brief describe of the historical development of personal data protection laws in Taiwan. The third chapter is concluding the introduction of the development of Privacy Commissioner for Personal Data (PCPD) in Hong Kong, explanation of the function of Office of the Privacy Commissioner for Personal Data, and the way that PCPD protect personal data. In chapter four, I had listed several differences of personal data protection laws between Taiwan and Hong Kong. Through the differences in former chapter, I would like to review the weak parts of Taiwan’s personal data protection laws that need to be improved, and put some of my own views in the last chapter. Key words: Personal Data Protection Act, Personal Data Ordinance, cross-border data flow, direct marketing
Huang, Han-yi, und 黃漢議. „Government Agency’s Obligation on Collecting, Processing and Using Personal Data under Personal Data Protection Act ~ The Civil Servant’s Future Normative Obligation as the Research Core“. Thesis, 2012. http://ndltd.ncl.edu.tw/handle/36613772212619209848.
Der volle Inhalt der Quelle國立雲林科技大學
科技法律研究所碩士班
100
Information privacy is one of people’s fundamental rights given by the Constitution. It is a nation’s obligation and duty to protect people’s personal data. For carrying out a nation’s mission, a government agency always uses “public interests” as an excuse to collect, process, or access people’s personal data without inhibition. The government agency has the largest data bank for personal data. Because of advanced technological information, it becomes more and more convenient and diversified to access personal data. Meanwhile, we often hear that personal data is leaked out. Therefore, Taiwan refers to the nine major principles of privacy protection enacted by APEC, and legislates “personal data protection act” to regulate the protection of personal data. It has been two yeas to legislate the personal data protection act since April 2010, but it is so slow and unable to get the law implemented. After law modification, the objective protection, the subjective application and the behavior’s standards are largely changed. Meanwhile, the administrative supervision can be reinforced, and group litigation can be adopted to encourage people to participate in the action. The main cause which the modified law cannot be proclaimed and implemented is the increased liabilities. For preventing the leaking-out of personal data, a legal method for collection, process and access can be adopted as a work standard. The core issue is the specific purpose. This specific purpose must agree with the specific colleting purpose, then he can reasonably access the personal data. Beyond the range of the specific purpose, it is principally not allowed to collect, process or access the personal data. When a government agency collects, processes or accesses personal data, it must conform to the legal duties. Therefore, it must agree with the proportional principle in the Constitution, Article 23. A deliberation on the proper proportion between Purpose and Measure is necessary. The measure must be proper and necessary, and has a proper and reasonable connection with the collecting purposes. If a civil servant violates the law when he carries out the public power, he should be responsible for civil, criminal and administration liabilities as well as the state compensation. Therefore, a government agency and its civil servants must realize their obligations and duties when they collect, process or access personal data. In order to protect the party concerned on his information independence, the collection, processing and access of the data must be agreed by the concerned party in writing. The party may claim his fundamental rights to the government agency who keeps his personal data, such as inquiry, reading, asking for a reproduction, supplementation, correction, stopping the collection, processing or access, or deleting his personal data. The rights are not allowed to waive beforehand, or limit by a special agreement. When the party’s interests or rights are violated, he may ask for damage compensation, administration relief and participating in group litigation. The party concerned has the power of information independence. If the disclosure of government information overlaps his own information in part, can he claim its applicability? This article will discuss how to judge and determine the applicability.
PO-YANG, LEE, und 李柏洋. „The Conflict Resolution between Freedom of The Press and The Right to Information Privacy—Focus on the Personal Data Protection Act“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/x97nzh.
Der volle Inhalt der QuelleHuang, Tzu-Chieh, und 黃子潔. „The Right to Explanation in the Artificial Intelligence’s Algorithmic Era: A Comparative Study of EU’s GDPR and Taiwan’s Data Protection Act“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/sx869f.
Der volle Inhalt der Quelle國立臺灣大學
科際整合法律學研究所
107
The future development of artificial intelligence seems prosperous, however, the request of transparency and algorithmic accountability of automated decision-making on personal data attracts attention at the same time. EU’s general data protection regulation (GDPR) implemented in 2018 legislates rules concerning above-mentioned situations, and entails an important idea: right to explanation, which central arguments circumscribing on whether a data subject has a right to ask the data controller to provide explanations to the automated processing system itself, or to the decisions made by the mechanism. To build the right to explanation will be a great help to data subject to invoke other relevant rights, such as requesting human intervention, express opinions, contesting the decision, or to ask for remedies or to file a lawsuit when an unfair decision is made. Nevertheless, the right to explanation is not legislated in GDPR, and it occurs wildly discussions and criticism. The definition, range, disputes and practical predicaments about the right are explored in this article, and sequentially discussed if its core concepts could be applied to Taiwan’s current data protection laws. The article discovered, Taiwan’s current data protection laws emphasis on the legality on obtaining the personal data, but ignore the accuracy and fairness after the date is obtained and analyzed with an automated processing system. In the meantime, the notification duty of data controller and right to be informed of data subject lack of providing related algorithmic information as well. Accordingly, this article discusses separately on 5 possible approaches which can be applied to Taiwan’s data protection law, including the right not to be a subject to automated decision-making system, notification duty and right to access to data, explanation on specific decisions, algorithm-centered safety protection measures in design, enhancing the third parties’ capacities to support, and suggests some adjustments, to strengthen the protection of personal data when facing the upcoming artificial intelligent era.
Chen, Ya-Ting, und 陳雅婷. „The Study of Inconsistent Use of Personal Information in the Taiwan Personal Data Act - A Supplementary Comment on The Development Trend of EU Personal Data Protection Regulation“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/edrpsd.
Der volle Inhalt der Quelle中原大學
財經法律研究所
104
Along with the development of medical science, it become one of the experimental sciences. The personal medical data stand as the important issue. For promoting the individual research , it is far more important to protect the personal privacy of the medical treatment of the subject. Therefore , this theses shall start from the protection of the private data to discuss the protection of the genetic and medical data. In the year of 2012, Taiwan had continued the personal data protection legislation process after delaying for two years and five months. It covers the court cases involving the release of personal data of medical insurance. It also covers the right of using and withdrawal of personal data for out of the proposed purpose. The researcher has to obtain consent from the subject prior to starting collection , using and receiving the medical data of the subject.The researcher also , has to inform the subject regarding the use of the medical data and the way to protect the source of the data. The law passed on December 15 ,2015 did not mentioned this subject.Therefore , all the cases have to apply the current rules. The said issue shall be discussed in this theses. In the year of 2012, Taiwan had continued the personal data protection legislation process after delaying for two years and five months. It covers the court cases involving the release of personal data of medical insurance. It also covers the right of using and withdrawal of personal data for out of the proposed purpose. The researcher has to obtain consent from the subject prior to starting collection , using and receiving the medical data of the subject.The researcher also , has to inform the subject regarding the use of the medical data and the way to protect the source of the data. The law passed on December 15 ,2015 did not mentioned this subject.Therefore , all the cases have to apply the current rules. The said issue shall be discussed in this theses. This theses shall also discuss controlling of gathering personal data in EU’s personal data protection regulation which include the duty of providing data regarding the managing of research purpose , medical data and the managing of vital interest of medical data , the availability of identity of the subject , the unobtainable of consent from the subject , the abolishing of data and the necessity of protecting the unknown person’s data. The rapid development of the science technology bring out the advanced development of personal data protection. The new technology also increase the size and the co-use of data. It makes the private corporation and the public organization using the personal data. More and more persons publish their private globally. Technology, also, change the economy and social life. The cross border transferring of personal data has increased in high rate. The EU has provided proposed rules for personal data protection in 2012 with involved the use and withdrawal of medical data. It provided suggestion to the out of purposes research protection in our country.
HO, TSUNG-HSUN, und 何宗勳. „Research on Personal Data Protection Act affect The operation of The junior high school - A Case Study for The Chiayi’s junior high school“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/qaf5d5.
Der volle Inhalt der Quelle國立雲林科技大學
資訊管理系
104
Personal Data Protection Act was originally promulgated in 1995 years "Computer Processed Personal Data Protection Law," was because of the age of computers and network information and rapid development has just started, and the government to protect people to establish a computer processing of personal data protection law to regulate the collection of personal data, the processing and use, in order to avoid infringement of personality rights, and to promote the rational use of personal information, but was mostly confined to the norms dealing with the use of computers above, the use of paper records will not be appropriate for specification. The new Personal Data Protection Act was officially introduced 2012 years from October 1, adapted from the original public sector agencies and credit, health care, schools, telecommunications, finance, securities, insurance, mass media and other eight major industries do not, do not apply to all industries to upgrade, but also from the scope of protection through computer processing of personal data, referred to all personal data (in any form), the amount of compensation is high reached 200 million yuan, 10 times the original old law many. Back to school, the school is so busy and work hard, and had been in operation for many years, are now due to the new Personal Data Protection Act officially introduced, is bound to affect the original mode of operation, and then set off a ripple, caused by many individuals problems of information constantly emerging. Hoping to study can be carried out in-depth interviews and first-hand the Senate administrative staff to learn the new Personal Data Protection Act after entering the campus, school administration on the degree of influence that? As if expecting the protection of the life and teaching of students profile. Or are merely increases the administrative burden?
Lin, Che-Min, und 林哲民. „Case Study on the Integration of ISO 27001 & 27011 and the New Personal Data Protection Act for Customer Personal Data Management of the Telecom Industry–example of Chunghwa Telecom“. Thesis, 2013. http://ndltd.ncl.edu.tw/handle/67978463916666098387.
Der volle Inhalt der Quelle國立宜蘭大學
多媒體網路通訊數位學習碩士在職專班
101
Due to the flourishing development of mobile communications , Internet businesses , and mobile broadband , handheld mobile communications equipment is commonplace and the number of mobile phone users and fixed-line broadband users is growing rapidly every day. As the telecom industry stores massive amounts of users’ personal data , operators need to uphold users’ trust in them , so users can enjoy the telecommunication services worry-free! Personal information security is of major concern in society today and also a social responsibility of enterprises. Each link in the industry deals with users’ personal data , so the users and consumers require a professional system and all employees to provide the strictest protection. Carriers need to set a standard for all employees to follow that emphasizes personal data protection , in order to avoid causing damage , missing data , leaks , and other irreparable losses to the personal data of customers due to personnel negligence. The telecommunications businesses include fixed broadband businesses , data services , mobile businesses , international businesses , inquiry numbers and inquiry number value-added services , domestic/international manual call transfers , as well as acceptance of fault declarations , customer complaints handling , and information businesses of the above mentioned businesses. The personal data protection measures of internal processes should be re-examined to enhance all personnel’s awareness of personal data protection. In addition to the scope of business , there are still accounts processing , fraud prevention , customer service and other key operating processes , as well as the development , operation , and maintenance of mobile communication support system , monitoring center management for mobile communications network activity and anti-hacker , other various processes , and information systems. Process management and operational levels need to establish a more complete personal data protection mechanism with high specifications , in order to implement the security matters of the new Personal Data Protection Act Enforcement Rules. In response to the new Personal Data Protection Act , how carriers with imported information security management system can integrate the new Personal Data Protection Act to achieve their custodial responsibility must be discussed. Through the key management elements of ISO 27001 & ISO 27011 that correspond to the norms set to the appropriate security maintenance measures in Article 12 of the new Personal Data Protection Act Enforcement Rules , how carriers can strengthen management and educational training in compliance with the Act also requires discussion. In order to achieve the appropriate security measures in the collection , processing and use of personal data as specified by the new Personal Data Protection Act are also focuses of discussion in this study.
Horrocks, Christine, und James A. Goddard. „Adults who grew up in care: constructing the self and accessing care files“. 2006. http://hdl.handle.net/10454/3540.
Der volle Inhalt der QuellePast research on care leavers has, understandably, tended to focus on those who are in their mid- to late-teens or early 20s. This reflects the profound impact of central and local government policy on those young people. It also reflects their prominence in contemporary analyses of most of the indicators of social exclusion among young people in the UK - unemployment, homelessness and lack of educational qualifications among them. However, some issues affecting adults who grew up in care apply across the life course. One such issue is the access that former care adults have to their child care files. Indeed, as we shall see, this issue has particular importance for many older adults (in their 30s and upwards). Policy and practice in this field has changed significantly during the past 20¿years and there is a growing awareness of the needs of former care adults in this area. Access to such files can be a significant element in the process of seeking to address identity concerns centring around family and childhood experiences. This paper explores some of these identity concerns and analyses how access to care files both reflects such concerns and attempts to address them.
Jankrlová, Šárka. „Porovnání úpravy ochrany osobních údajů dle zákona č.101/2000 Sb. a GDPR“. Master's thesis, 2019. http://www.nusl.cz/ntk/nusl-404660.
Der volle Inhalt der QuelleSwartz, Paulus. „A validated information privacy governance questionnaire to measure the perception of how effective privacy is governed in a financial institution in the South African context“. Diss., 2019. http://hdl.handle.net/10500/26154.
Der volle Inhalt der QuelleComputing
M. Sc. (Information Systems)