The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act

碩士 === 淡江大學 === 資訊管理學系碩士班 === 101 ===   With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In...

Full description

Bibliographic Details
Main Authors: Yuan-Fu Cheng, 鄭元輔
Other Authors: 梁德昭
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/47715595783738390826
id ndltd-TW-101TKU05396042
record_format oai_dc
spelling ndltd-TW-101TKU053960422015-10-13T22:35:35Z http://ndltd.ncl.edu.tw/handle/47715595783738390826 The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act 數位鑑識應用於個人資料保護法之舉證責任之研究 Yuan-Fu Cheng 鄭元輔 碩士 淡江大學 資訊管理學系碩士班 101   With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In order to protect the privacy right of the public, the government also passed third reading of the "Personal Information Protection Act" in 2010.   With the "Personal Information Protection Act" in practice, when the leakage of personal information, it will be an important issue for the government and enterprises to burden of proof.   In this Research, particularly for digital forensics steps and procedures to explore, find the appropriate burden of proof. And deriving a suitable procedure for enterprise to reference.   Also use ISO 15408 (Common Criteria), to strengthen the company''s system security. Because only unilateral gathering evidence is not enough, enterprise must prove that the company has the protection and fulfill responsibilities. 梁德昭 2013 學位論文 ; thesis 67 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 淡江大學 === 資訊管理學系碩士班 === 101 ===   With the progress of the times, people are depended on the information to bring convenience day by day. Whether government, schools or businesses, will use computer to create and save national, students or customer''s personal data files. In order to protect the privacy right of the public, the government also passed third reading of the "Personal Information Protection Act" in 2010.   With the "Personal Information Protection Act" in practice, when the leakage of personal information, it will be an important issue for the government and enterprises to burden of proof.   In this Research, particularly for digital forensics steps and procedures to explore, find the appropriate burden of proof. And deriving a suitable procedure for enterprise to reference.   Also use ISO 15408 (Common Criteria), to strengthen the company''s system security. Because only unilateral gathering evidence is not enough, enterprise must prove that the company has the protection and fulfill responsibilities.
author2 梁德昭
author_facet 梁德昭
Yuan-Fu Cheng
鄭元輔
author Yuan-Fu Cheng
鄭元輔
spellingShingle Yuan-Fu Cheng
鄭元輔
The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act
author_sort Yuan-Fu Cheng
title The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act
title_short The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act
title_full The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act
title_fullStr The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act
title_full_unstemmed The Research of Digital Forensics applied to the Burden of Proof in Personal Information Protection Act
title_sort research of digital forensics applied to the burden of proof in personal information protection act
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/47715595783738390826
work_keys_str_mv AT yuanfucheng theresearchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact
AT zhèngyuánfǔ theresearchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact
AT yuanfucheng shùwèijiànshíyīngyòngyúgèrénzīliàobǎohùfǎzhījǔzhèngzérènzhīyánjiū
AT zhèngyuánfǔ shùwèijiànshíyīngyòngyúgèrénzīliàobǎohùfǎzhījǔzhèngzérènzhīyánjiū
AT yuanfucheng researchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact
AT zhèngyuánfǔ researchofdigitalforensicsappliedtotheburdenofproofinpersonalinformationprotectionact
_version_ 1718078990989656064