The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act
碩士 === 淡江大學 === 資訊管理學系碩士班 === 101 === With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/47715595783738390826 |
id |
ndltd-TW-101TKU05396042 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101TKU053960422015-10-13T22:35:35Z http://ndltd.ncl.edu.tw/handle/47715595783738390826 The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act 數位鑑識應用於個人資料保護法之舉證責任之研究 Yuan-Fu Cheng 鄭元輔 碩士 淡江大學 資訊管理學系碩士班 101 With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In order to protect the privacy right of the public, the government also passed third reading of the "Personal Information Protection Act" in 2010. With the "Personal Information Protection Act" in practice, when the leakage of personal information, it will be an important issue for the government and enterprises to burden of proof. In this Research, particularly for digital forensics steps and procedures to explore, find the appropriate burden of proof. And deriving a suitable procedure for enterprise to reference. Also use ISO 15408 (Common Criteria), to strengthen the company''s system security. Because only unilateral gathering evidence is not enough, enterprise must prove that the company has the protection and fulfill responsibilities. 梁德昭 2013 學位論文 ; thesis 67 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 淡江大學 === 資訊管理學系碩士班 === 101 === With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In order to protect the privacy right of the public, the government also passed third reading of the "Personal Information Protection Act" in 2010.
With the "Personal Information Protection Act" in practice, when the leakage of personal information, it will be an important issue for the government and enterprises to burden of proof.
In this Research, particularly for digital forensics steps and procedures to explore, find the appropriate burden of proof. And deriving a suitable procedure for enterprise to reference.
Also use ISO 15408 (Common Criteria), to strengthen the company''s system security. Because only unilateral gathering evidence is not enough, enterprise must prove that the company has the protection and fulfill responsibilities.
|
author2 |
梁德昭 |
author_facet |
梁德昭 Yuan-Fu Cheng 鄭元輔 |
author |
Yuan-Fu Cheng 鄭元輔 |
spellingShingle |
Yuan-Fu Cheng 鄭元輔 The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act |
author_sort |
Yuan-Fu Cheng |
title |
The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act |
title_short |
The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act |
title_full |
The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act |
title_fullStr |
The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act |
title_full_unstemmed |
The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act |
title_sort |
research of digital forensics applied to the burden of proof in personal information protection act |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/47715595783738390826 |
work_keys_str_mv |
AT yuanfucheng theresearchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact AT zhèngyuánfǔ theresearchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact AT yuanfucheng shùwèijiànshíyīngyòngyúgèrénzīliàobǎohùfǎzhījǔzhèngzérènzhīyánjiū AT zhèngyuánfǔ shùwèijiànshíyīngyòngyúgèrénzīliàobǎohùfǎzhījǔzhèngzérènzhīyánjiū AT yuanfucheng researchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact AT zhèngyuánfǔ researchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact |
_version_ |
1718078990989656064 |