The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act

碩士 === 淡江大學 === 資訊管理學系碩士班 === 101 ===   With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In...

Full description

Bibliographic Details
Main Authors: Yuan-Fu Cheng, 鄭元輔
Other Authors: 梁德昭
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/47715595783738390826
Description
Summary:碩士 === 淡江大學 === 資訊管理學系碩士班 === 101 ===   With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In order to protect the privacy right of the public, the government also passed third reading of the "Personal Information Protection Act" in 2010.   With the "Personal Information Protection Act" in practice, when the leakage of personal information, it will be an important issue for the government and enterprises to burden of proof.   In this Research, particularly for digital forensics steps and procedures to explore, find the appropriate burden of proof. And deriving a suitable procedure for enterprise to reference.   Also use ISO 15408 (Common Criteria), to strengthen the company''s system security. Because only unilateral gathering evidence is not enough, enterprise must prove that the company has the protection and fulfill responsibilities.