SlideShare uma empresa Scribd logo
1 de 14
在網絡環境下保障個人私隱:
如何平衡用戶和資料使用者的
需要和利益
莫乃光
香港互聯網協會
2010.11.13
平衡需要和利益

資訊科技和互聯網的影響

社會對私隱的重視

市民對私隱和個人資料概念不清悉

對法例的期望

立法十年的經驗

國際執政經驗
平衡需要和利益

「需要在保障個人資料私隱與便利資訊及通訊科
技持續發展之間,取得平衡」

「條文應盡可能不受科技發展的影響」

技術中立
敏感個人資料

現行《私隱條例》適用於「直接或間接與在世的
個人有關」而「可切實地用以確定個人的身分」
的個人資料,而無再區分「敏感」和「非敏感」

近年歐盟的指令,以及英國和澳洲的私隱法例,
已有特定條文更嚴格地監管處理「敏感個人資
料」,如涉及「種族或民族本源、政治意見、宗
教或哲學信仰、工會會籍、健康狀況及性生
活」,英、澳把刑事紀錄列為敏感,澳洲的定義
更包括了基因資料。
敏感個人資料

不應針對生物辨識資料及資訊科技應用

針對資訊科技業?

大部分系統不能憑這些資料重組個人特徵

使用得宜,運用生物辨識資料反而比運用其他個
人資料來得「安全」

運用適當指引

研究應否擴大規管敏感個人資料
泄漏資料事件通報

強制機構泄漏資料需通知受害人

三個層次

對私隱專員

對受害人

對公眾

若每次事故均通知所有受影響人士,便「會對機
構造成沉重的負擔」,甚至令人「對通知變得麻
木」?
泄漏資料事件通報

冰山一角

重要程度考慮

指引是什麼?

「沉重負擔」正是促使這些使用個人資料的機構
訂定有效的措施防止個人資料外洩的動力

諮詢文件也指美國已有三十多個州的資料使用者
已有法定責任通知受影響人士,而澳洲和英國等
地也正修改法例與美國看齊
泄漏資料事件通報

先向收取大量個人資料或受監管行業機構作強制
性通報要求
引入刑事成份

建議加強侵犯個人資料的刑罰,包括引入刑事罪
行,例如「披露在未經同意下取得的個人資料以
從中取利或作惡意用途」

誤墮法網?

甚麼是惡意、對感情的傷害?

難為「惡意」定分界

對互聯網言論影響的關注

平衡對個人和中小企相對大型機構的影響
規管資料處理者和分判活動

《私隱條例》漏洞,只監管資料使用者,卻沒有
監管獲外判處理資料的「處理者」,而其它地方
已直接或間接監管這些處理者

直接監管即在法例內規限處理者的行為及責任

間接監管則透過規定資料使用者「以合約方式或
其他方法,確保資料處理者履行資料使用者這些
責任」
規管資料處理者和分判活動

資料處理者可能涵蓋的範圍很廣,包括應用系統
開發商、互聯網服務供應商、網頁寄存商,甚至
新一代的社交網站或服務式軟件商等,也可涉及
境外公司

資料處理者可能不知其處理的資料是否個人資料

擔心窒礙互聯網上資訊的自由流通

先間接監管,吸取經驗,再考慮直接監管的需要
私隱專員的執法權力未獲改善

「無牙老虎」

沒搜查、檢控等權力

議讓私隱專員資助受委屈人士追討賠償

贊成把嚴重違反保障資料原則行為訂為刑事罪
行、重複違反原則或執行通知等行為加强刑罰的
建議

如何為公署增撥資源?
應檢討 IP 地址是否個人資料

歸入不予跟進的建議

師濤案

IP 地址「本身並不符合個人資料的定義,因為 IP 地
址涉及的是一個死物的裝置,並非一位人士」

客觀事實是 IP 地址只要配合時間等資料,顯然「可
切實地用以確定個人的身分」

資料全是「死物」

其他新技術的檢討,如 cookies
莫乃光 Charles Mok
mok@hknet.com
http://www.charlesmok.hk
http://www.isoc.hk

Mais conteúdo relacionado

Destaque

Hkim innovation 2011
Hkim innovation 2011Hkim innovation 2011
Hkim innovation 2011Charles Mok
 
Cybercrime in hk
Cybercrime in hkCybercrime in hk
Cybercrime in hkCharles Mok
 
Green Dam Analysis Valkyrie-X by Alnthony Lai
Green Dam Analysis Valkyrie-X by Alnthony LaiGreen Dam Analysis Valkyrie-X by Alnthony Lai
Green Dam Analysis Valkyrie-X by Alnthony LaiCharles Mok
 
網絡暴力和性別平等
網絡暴力和性別平等網絡暴力和性別平等
網絡暴力和性別平等Charles Mok
 
Pan-Democrat CE Primary E-voting System
Pan-Democrat CE Primary E-voting SystemPan-Democrat CE Primary E-voting System
Pan-Democrat CE Primary E-voting SystemCharles Mok
 
Great CIO Debate 2011
Great CIO Debate 2011Great CIO Debate 2011
Great CIO Debate 2011Charles Mok
 
Future Challenges for Media Literacy
Future Challenges for Media LiteracyFuture Challenges for Media Literacy
Future Challenges for Media LiteracyCharles Mok
 

Destaque (8)

流動保安
流動保安流動保安
流動保安
 
Hkim innovation 2011
Hkim innovation 2011Hkim innovation 2011
Hkim innovation 2011
 
Cybercrime in hk
Cybercrime in hkCybercrime in hk
Cybercrime in hk
 
Green Dam Analysis Valkyrie-X by Alnthony Lai
Green Dam Analysis Valkyrie-X by Alnthony LaiGreen Dam Analysis Valkyrie-X by Alnthony Lai
Green Dam Analysis Valkyrie-X by Alnthony Lai
 
網絡暴力和性別平等
網絡暴力和性別平等網絡暴力和性別平等
網絡暴力和性別平等
 
Pan-Democrat CE Primary E-voting System
Pan-Democrat CE Primary E-voting SystemPan-Democrat CE Primary E-voting System
Pan-Democrat CE Primary E-voting System
 
Great CIO Debate 2011
Great CIO Debate 2011Great CIO Debate 2011
Great CIO Debate 2011
 
Future Challenges for Media Literacy
Future Challenges for Media LiteracyFuture Challenges for Media Literacy
Future Challenges for Media Literacy
 

Semelhante a PDPO legislation

Cyber security management act openfind 20201203
Cyber security management act openfind 20201203Cyber security management act openfind 20201203
Cyber security management act openfind 20201203openfind
 
解读信息设计[郭俊]Final
解读信息设计[郭俊]Final解读信息设计[郭俊]Final
解读信息设计[郭俊]Finaldasiyjun
 
人際關係與網路成癮之研究
人際關係與網路成癮之研究人際關係與網路成癮之研究
人際關係與網路成癮之研究hanming0824
 
2.从案件看国内 d do s 的最新方式
2.从案件看国内 d do s 的最新方式2.从案件看国内 d do s 的最新方式
2.从案件看国内 d do s 的最新方式Hsiao Tim
 
【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境R.O.C.Executive Yuan
 
Right Internet for Right People
Right Internet for Right PeopleRight Internet for Right People
Right Internet for Right PeopleOliver Ding
 
在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南Steven Cheng
 
淺談Fintech(6)
淺談Fintech(6)淺談Fintech(6)
淺談Fintech(6)Chris Chang
 
Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...英傑 賴
 
防杜網路霸凌事件因應措施
防杜網路霸凌事件因應措施防杜網路霸凌事件因應措施
防杜網路霸凌事件因應措施vTaiwan.tw
 
基礎環境 資通訊環境整備
基礎環境 資通訊環境整備基礎環境 資通訊環境整備
基礎環境 資通訊環境整備rrc5954
 
1060830 v taiwan平台經濟預擬議題
1060830 v taiwan平台經濟預擬議題1060830 v taiwan平台經濟預擬議題
1060830 v taiwan平台經濟預擬議題vTaiwan.tw
 

Semelhante a PDPO legislation (15)

Cyber security management act openfind 20201203
Cyber security management act openfind 20201203Cyber security management act openfind 20201203
Cyber security management act openfind 20201203
 
解读信息设计[郭俊]Final
解读信息设计[郭俊]Final解读信息设计[郭俊]Final
解读信息设计[郭俊]Final
 
人際關係與網路成癮之研究
人際關係與網路成癮之研究人際關係與網路成癮之研究
人際關係與網路成癮之研究
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
2.从案件看国内 d do s 的最新方式
2.从案件看国内 d do s 的最新方式2.从案件看国内 d do s 的最新方式
2.从案件看国内 d do s 的最新方式
 
【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境
 
Right Internet for Right People
Right Internet for Right PeopleRight Internet for Right People
Right Internet for Right People
 
在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南
 
淺談Fintech(6)
淺談Fintech(6)淺談Fintech(6)
淺談Fintech(6)
 
Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...
 
防杜網路霸凌事件因應措施
防杜網路霸凌事件因應措施防杜網路霸凌事件因應措施
防杜網路霸凌事件因應措施
 
基礎環境 資通訊環境整備
基礎環境 資通訊環境整備基礎環境 資通訊環境整備
基礎環境 資通訊環境整備
 
1060830 v taiwan平台經濟預擬議題
1060830 v taiwan平台經濟預擬議題1060830 v taiwan平台經濟預擬議題
1060830 v taiwan平台經濟預擬議題
 

Mais de Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 

Mais de Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

PDPO legislation