Please use this identifier to cite or link to this item:
|Other Titles: ||In response to the implementation of the personal data protection act explore enterprise risk management|
|Authors: ||侯孟妤;Hou, Meng-Yu|
|Keywords: ||電子商務;雲端科技;個人資料保護法;團體訴訟;e-commerce;cloud technology;the Personal Data Protection Act;group litigation|
|Issue Date: ||2014-01-23 13:39:12 (UTC+8)|
|Abstract: ||人手一隻iPhone或各家Andriod智慧型手機，不論在搭乘公車、捷運，甚至開會、聊天聚會時，已成為全球各國一致的社會現象，而手機作為一種隨著使用者移動的科技設備，因其隨時連網、功能強大的特性，也產生許多新興的社會問題。當大家在享受便利、分享生活的同時，個人資料在不經意間被業者所蒐集及利用; 隨著電子商務以及雲端科技的快速發展，也改變了人們生活習慣與商業經營型態，使得資訊得以快速流通，存取資料也更加容易。不論是企業只要曾經用過網際網路，或是一般大眾以書面方式留下個人資料，都可能會面臨資料被不當紀錄、盜拷、資訊外洩、或意外刪除，甚至被第三方不當利用等風險。|
No matter when you''re taking a bus or MRT, or even during a meeting, a chatting or a gathering, people holding an iPhone or various Android cell phone in their hands has become a consistent phenomenon across the world. Being a technology device that moves with its user, cell phone also incurs numerous emerging social problems because of its characteristics of web connection at any time as well as power functions. At a time when everyone enjoys its convenience and shares his/her life with each other, personal information has been collected and utilized by companies without anyone''s notice. With the speedy development of e-commerce and cloud technology, people''s living habits and types of business management have also been changed accordingly. This ensures speedy circulation of information as well as easier storing and retrieving of information. For businesses which utilized internet before, or the general public who left their personal information in writing, their information could face risks of unduly recording, unauthorized duplication, information leakage, accidental deletion or even third party''s inappropriate utilization.
The core of personal information protection lies in the protection of information privacy. In the past, however, privacy protection from our government, businesses, schools or even individuals was still in the beginning phase. This had led to accidental utilization of personal privacy information by someone with specific intent and incurred relatively huge controversy accordingly. In recent years, we have witnesses the aggressiveness of defraud syndicates, unlawful personal information utilization by syndicates as well as increase on the number of defraud cases. Therefore, issues of personal information protection have received more and more emphasis and discussion. Through years of effort and modification of law, modification for "Personal Information Protection Act" (hereinafter referred to as "New Personal Information Act") finally completed on May 26th, 2010. Previous Act was modified in large scale. This modification not only expands original law application scope, it also stipulates process as well as obligations to be fulfilled during business or individual''s collection of personal information.
In this article, we first introduced evolution of Personal Information Protection Act here in this country and offered an understanding on emphasis and meaning for the modification of the Personal Information Protection Act. We then raised the issue that personal information as well as business secrets for related parties of businesses including customers, upstream/downstream vendors, collaborating partners and employees are likely to be exposed to the state of unsafe information. We also illustrated how business could, under the circumstances of protecting their interests and compliance with requirements from Personal Information Protection Act, fully fulfill their duty on information protection to avoid violation of law, damage on goodwill, litigation as well as large amount of damage compensation from their unawareness of law. Furthermore, businesses should review their responsibility risks. In addition to aggressive prevention, businesses should learn how to ensure appropriate insurance in accordance with their own characteristics, develop cost efficiency and achieve business risk management goal.
|Appears in Collections:||[保險學系暨研究所] 學位論文|
Files in This Item:
All items in 機構典藏 are protected by copyright, with all rights reserved.