English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52047/87178 (60%)
Visitors : 8683338      Online Users : 98
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/94273

    Title: 數位鑑識應用於個人資料保護法之舉證責任之研究
    Other Titles: Research of digital forensics applied to the burden of proof in personal information protection act
    Authors: 鄭元輔;Cheng, Yuan-Fu
    Contributors: 淡江大學資訊管理學系碩士班
    Keywords: 數位鑑識;共同準則;個人資料保護法;Common Criteria;Digital forensics;PInformation Protection Act
    Date: 2013
    Issue Date: 2014-01-23 14:14:42 (UTC+8)
    Abstract:   隨著時代的進步,人們越來越倚賴資訊帶來的便利,不論是政府、學校或是企業,都會用電腦輔助建立國民、學生或是客戶的個人資料檔。為了保護大眾的隱私權益,政府也於2010年三讀通過了「個人資料保護法」(或稱個資法)。
      本研究特別針對數位鑑識之步驟和程序進行探討,找出適合應用於舉證責任的部分,並推導出一套適合的步驟供企業進行參考。也會利用ISO 15408(共同準則),來加強公司系統安全性的探討。因為只有單方面的蒐證是不足夠的,還必須證明公司有盡到應盡之防護責任。
      With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In order to protect the privacy right of the public, the government also passed third reading of the "Personal Information Protection Act" in 2010.
      With the "Personal Information Protection Act" in practice, when the leakage of personal information, it will be an important issue for the government and enterprises to burden of proof.
      In this Research, particularly for digital forensics steps and procedures to explore, find the appropriate burden of proof. And deriving a suitable procedure for enterprise to reference.
      Also use ISO 15408 (Common Criteria), to strengthen the company''s system security. Because only unilateral gathering evidence is not enough, enterprise must prove that the company has the protection and fulfill responsibilities.
    Appears in Collections:[資訊管理學系暨研究所] 學位論文

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback