Regulatory Framework for Information Security in Taiwan's New Personal Information Protection Act of 2012

被引:0
作者
Liao, Wei-min [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Law, Taichung, Taiwan
来源
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014) | 2015年 / 274卷
关键词
Privacy; PIPA; Information Security; Personal Information Management Mechanism;
D O I
10.3233/978-1-61499-484-8-858
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The New Personal Information Protection Act of 2012 of Taiwan (the PIPA) went into effect on October 1st, 2012. After almost 2 years it is still open to many questions and comments concerning the incorporation of information security in it. However, the regulatory framework for information security in the PIPA is in many aspects very promising for a solid development. This article purports to give a sketch of the legal basis, to make an introduction to the newest development, and to call for a rapider pace for the dialogue between jurists and information security engineers.
引用
收藏
页码:858 / 865
页数:8
相关论文
共 50 条
  • [1] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [2] Internet Security Protection in Personal Sensitive Information
    Wang, Yubin
    Li, Chao
    Cheng, Nan
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 628 - 632
  • [3] The Personal Information Privacy Protection Strategy in Social Security Information System
    Wang, Xuefang
    Xue, Hongrong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 718 - +
  • [4] Protection of Personal Information Security in the Age of Big Data
    Zou, Hui
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
  • [5] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
  • [6] Monetization of Personal Identity Information; Technological and Regulatory Framework
    Adjei, Joseph K.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 80 - 83
  • [7] Improving the information security of personal electronic health records to protect a patient's health information
    Els, Floyd
    Cilliers, Liezel
    2017 CONFERENCE ON INFORMATION COMMUNICATION TECHNOLOGY AND SOCIETY (ICTAS), 2017,
  • [8] The Personal Information Security Assistant
    Kegel, Roeland H. P.
    2015 IEEE 23RD INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2015, : 393 - 397
  • [9] Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa
    Botha, Johnny
    Eloff, M. M.
    Swart, Ignus
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 39 - 48
  • [10] Examining the applicability of the Protection of Personal Information Act in AI-driven environments
    Mbonye, Vicent
    Moodley, Marlini
    Nyika, Farai
    SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2024, 26 (01):