參考文獻 |
中文文獻(依作者姓氏筆畫排序)
王泰銓,歐洲聯盟法總論,臺灣智庫 (2008)。
王明禮,論資訊隱私:科技與商業發展脈絡下的觀察,中原財經法學,第32期,頁61-105 (2014)。
江庭瑀,歐洲議會認為歐美資料隱私屏障協議未達適當保護水平,經貿法訊,第238期,頁15-20 (2018)。
宋柏霆,試析歐盟資料保護規則中境外傳輸之要求與我國個人資料保護法之合致性,經貿法訊,第196期,頁12-22 (2016)。
林玫君, 簡介歐盟一般資料保護規則 (GDPR)之跨境傳輸例外條款,經貿法訊,第233期,頁43-52 (2018)。
財團法人資訊工業策進會科技法律研究所,個資法保護1.0,書泉 (2012)。
郭戎晉,個人資料跨境傳輸之法律研究,科技法律透析,第27卷第8期,頁28-55 (2015).
張紹斌、徐仕瑋,從雲端運算談個資保護,司法新聲,第99期,頁28-36 (2011)。
張乃文,雲端運算產業發展之策略與法制因應:科技法律料保護法與歐盟個人資料保護指令的比較為中心,東海大學法學研究,第43期,頁53-106 (2014)。
張陳弘,國家建置全民健康保險資料庫之資訊隱私保護爭議---評最高行政法院 106年度判字第54號判決,中原財經法學,第40期,頁185-257 (2018)。
經濟部,2018年中小企業白皮書(2019)。
葉奇鑫,國家發展委員會106年度「個人資料保護專責機關與資料在地化之法制研究」委託研究計畫結案報告 (計畫編號:ndc106020, 2018)。
葉奇鑫,國家發展委員會歐盟GDPR適足性相關文件與判決之對外說明資料結案報告 (2018)。
樓一琳,何之行,個人資料保護於雲端運算時代之法律爭議初探暨比較法分析:以健保資料為例,臺大法學論叢,第46卷第2期,頁339-422 (2017)。
廖文華、張志勇,雲端運算概論,五南書局 (2016)。
劉靜怡,網路社會的資訊隱私權保護,二十一世紀雙月刊,第63期,頁17-27 (2001)。
劉靜怡,網際網路時代的資訊使用與隱私權保護規範: 個人、政府與市場的拔河,資訊管理研究,第4卷第3期,頁137-161 (2002)。
劉佐國、李世德,個人資料保護法釋義與實務,碁峰資訊 (2012)。
劉定基, 雲端運算與個人資料保謢,以台灣個人資料保護法與歐盟個人資料保護指令的比較為中心,東海大學法學研究,第43期,頁53-106 (2014)。
寰瀛法律事務所,個資法百問,新學林 (2013)。
Matthias Herdegen, 歐洲法,張恩民譯,韋伯文化國際 (2006)。
網路資源
高敬原,說好的保障用戶資料呢?蘋果連iCloud 「密鑰」一併轉移中國,數位時代,2018年2月26日。https://www.bnext.com.tw/article/48286/apple-is-moving-icloud-encryption-keys-for-chinese-users-to-china.
何明諠, 獨立的個資專責機關哪裡找?臺灣人權促進會,2018年6月12日。https://www.tahr.org.tw/news/2268.
風傳媒,果粉資料會落入中國手中嗎?蘋果官方答覆:台灣香港用戶資料在美國,目前不受影響,2018年1月1日。https://www.storm.mg/article/384340
中央社,雲端資料庫設中國恐外洩,立委促部會正視個資法,2019年4月17日。https://www.taiwannews.com.tw/ch/news/3682192
個資與隱私保護專責機關DPA,2017年9月。https://talk.vtaiwan.tw/t/topic/1442
外國文獻
Books
KUNER, CHRISTOPHER, TRANSBORDER DATA FLOWS AND DATA PRIVACY LAW, 4 (Oxford Univ. Press ed., 2013).
KAVIS, MICHAEL J., ARCHITECTING THE CLOUD: DESIGN DECISIONS FOR CLOUD COMPUTING SERVICE MODELS 51 (Wiley. eds., 1st, 2014).
MARINESCU, DAN, CLOUD COMPUTING: THEORY AND PRACTICE 2 (Morgan Kaufmann eds., 2th ed. 2018).
Cases
Case C-362/14, Maximillian Schrems v Data Protection Commissioner, ECLI:EU:C:2015:650.
Case C-131/12 Google Spain SL and Google Inc v. AEPD and Mario Costeja González, ECLI:EU:C:2014:317.
Journal Articles, Book Chapters and Reports
Article 29 Working Party Document No. WP262, “Guidelines on Article 49 of Regulation 2016/679”, adopted on 6. Feb, 2018.
Article 29 Working Party Document No. WP254, “Adequacy Referential (Updated)”, adopted on 28. Nov, 2017.
Article 29 Working Party Document No. WP216, Opinion 05/2014 on Anonymisation Techniques, adopted on 10. April, 2014.
Article 29 Working Party Document No. WP179, “Opinion 8/2010 on Applicable Law”, adopted on 16. Dec, 2010.
Article 29 Working Party Document No. WP169, “Opinion 1/2010 on the Concepts of “Controller” and “Processor””, adopted on 16. Feb, 2010.
Article 29 Working Party Document No. WP136: “Opinion 4/2007 on the Concept of Personal Data”, adopted on 20. June, 2007.
Article 29 Working Party Document No. WP56, “Working Document on Determining the International Application of EU Data Protection Law to Personal Data Processing on the Internet by Non-EU Based Web Sites”, adopted on 30. May, 2002.
Article 29 Working Party Document No. WP29, “Opinion 4/2007 on the Concept of Personal Data”, adopted on 20. June, 2007.
Article 29 Working Party Document No. WP12, “Transfers of Personal Data to Third Countries : Applying Articles 25 and 26 of the EU Data Protection Directive”, adopted on 24. July, 1998.
A Commentary by the UK Data Protection Registrar, in Ninth Annual Report of the Data Protection Registrar 66-75 (1993).
Box, Sarah, Internet Openness and Fragmentation: Toward Measuring the Economic Effects, (Centr. for Int. Gov. Innov., Paper Series No. 36, 2016).
Bauer, Matthias, Hosuk Lee-Makiyama, Erik van der Marel, & Bert Verschelde, The Costs of Data Localisation: Friendly Fire on Economic Recovery, (ECIPE Occasional Paper, No. 3, 2014)
Commission Decision 2010/87/EU, of 5 February 2010 on Standard Contractual Clauses for the Transfer of Personal Data to Processors Established in Third Countries Under Directive 95/46/EC of the European Parliament and of the Council, O. J. (L 39) 5.
Commission Decision 2004/915/EC, of 27 December 2004 Amending Decision 2001/497/EC as Regards the Introduction of an Alternative Set of Standard Contractual Clauses for the Transfer of Personal Data to Third Countries, O. J. (L 385) 74.
Council Directive 95/46/EC, of the European Parliament and of the Council of 24 Oct 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, 1995 O.J. (L 281) 31.
Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data 28 January 1981.
Cunningham, McKay, Complying with International Data Protection Law, 84 UNIV. CINCINNATI LAW REV. 421-450 (2016).
Drake, William J., Vinton G. Cerf & Wolfgang Kleinwächter, Internet Fragmentation: An Overview, (WEF, White Paper, 2016).
Ferracane, Martina, Restrictions on Cross-Border Data Flows (ECIPE, Working Paper No. 1, 2017)
Graham Greenleaf, Global Tables of Data Privacy Laws and Bills, 157 PRIV. LAWS & BUS. INT′L REP. 16-31 (2019)
Hon, W. Kuan & Christopher Millard, Data Export in Cloud Computing – How can Personal Data be Transferred Outside the EEA? The Cloud of Unknowing, Part 4, 9 SCRIPT-ed. 25-63 (2012).
Hon, W. Kuan, Julia Hörnle & Christopher Millard, Data Protection Jurisdiction and Cloud Computing – When are Cloud Users and Providers Subject to EU Data Protection Law? The Cloud of Unknowing, Part 3, 25 INT REV LAW COMPUT TECHAT. 129-164 (2012).
Hon, W. Kuan, Christopher Millard & Ian Walden, Who is Responsible for “Personal Data” in Cloud Computing?--The Cloud of Unknowing, Part 2, 2 INT. DATA PRIV. LAW. 3-18 (2011).
Hon, W. Kuan, & Christopher Millard, The Problem of ′Personal Data′ in Cloud Computing- What Information is Regulated? The Cloud of Unknowing, Part 1, 4 INT. DATA PRIV. LAW. 211-228 (2011).
Hughes, J. Trevor & Sagi Leizerov, IAPP-EY: Annual Privacy Governance Report 2016, https://iapp.org/media/pdf/resource_center/IAPP%202016%20GOVERNANCE%20SURVEY-FINAL3.pdf.
ICO, The Eighth Data Protection Principle and International Data Transfers v4.0 (2017).
Jourová, Věra, EU Japan Adequacy Decision, Fact Sheet (Jan. 2019), https://ec.europa.eu/info/sites/info/files/research_and_innovation/law_and_regulations/documents/adequacy-japan-factsheet_en_2019_1.pdf
Linn, Emily, A Look Into the Data Privacy Crystal Ball: A Survey of Possible Outcomes for the EU-U.S. Privacy Shield Agreement, 50 Vand. J. Transnat′l L. 1311-1358 (2017).
MANYIKA JAMES, SUSAN LUND, JACQUES BUGHIN, JONATHAN WOETZEL, KALIN STAMENOV & DHRUV DHINGRA, DIGITAL GLOBALIZATION: THE NEW ERA OF GLOBAL FLOWS 1-156 (2016).
Moerel, L., The Long Arm of EU Data Protection Law: Does the Data Protection Directive Apply to Processing of Personal Data of EU Citizens by Websites Worldwide?, 1 INT. DATA PRIV. LAW 28-46 (2010).
Mell, Peter & Timothy Grance, The NIST Definition of Cloud Computing (Sep. 28, 2011), http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909616.
OECD Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, OECD (2013)
Regulation (EU) 2016/679, of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, 2016 O.J. (L 119) 1.
Schwartz, Paul M. & Karl Nikolaus Peifer, Transatlantic Data Privacy Law, 106 GEORGETOWN LAW J. 115-179 (2017).
Sveinbjarnardóttir & Þorgerður Jóhanna, The Concept of ′Transfer′ of Data under European Data Protection Law: In the Context of Transborder Data Flows (Dec. 1, 2015) (B.A. thesis, University of Oslo)
Svantesson, Dan Jerker B., Extraterritoriality and Targeting in EU Data Privacy Law: The Weak Spot Undermining the Regulation, 5 INT. DATA PRIV. LAW 226-234 (2015).
Schwartz, Paul M, European Data Protection Law and Restrictions on International Data Flows, 80 IOWA LAW REV. 471-496 (1995).
Theodorakis, Nikolaos I., Cross Border Data Transfers Under the GDPR: The Example of Transferring Data from the EU to the US (Stanford-Vienna TTLF, Working Papers No. 39, 2018).
Tan, Shawn W. & Alberto Osnago, Disaggregating the Impact of the Internet on International Trade (World Bank Grp., Working Papers No. 7785, 2016).
Wagner, Julian, The Transfer of Personal Data to Third Countries under the GDPR: When does a Recipient Country Provide an Adequate Level of Protection?, 8 INT. DATA PRIV. LAW 318-337 (2018).
Whitman, James Q., The Two Western Cultures of Privacy: Dignity Versus Liberty, 113 YALE L.J. 1151-1221 (2004).
WICKHAM HEATH CONSULTING, CROSS-BORDER DATA FLOWS REALISING BENEFITS AND REMOVING BARRIERS, 1-28 (2018).
Web Resources
Bischoff, Paul, The World’s Most Surveilled Cities, COMPARITECH (2019), https://www.comparitech.com/vpn-privacy/the-worlds-most-surveilled-cities/
BEUC, Privacy Shield: Strong and Shiny or Porous and Rusty?, BEUC (Feb. 5, 2016), https://www.beuc.eu/press-media/news-events/privacy-shield-strong-and-shiny-or-porous-and-rusty.
Cadwalladr, Carole & Emma Graham-Harrison, Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach, THE GUARDIAN (2018), https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
Collier, Kevin, Does the NSA’s PRISM Spying Program Violate EU Law?, DAILY DOT (Dec. 11, 2015), https://www.dailydot.com/news/prism-nsa-government-surveillance-europe-law/.
Evans, Bob, Top 5 Cloud Vendors in the World, CLOUD NEWS (Jan. 14, 2019), https://cloudwars.co/worlds-top-5-cloud-vendors-cloud-wars/.
European Comm’n, Adequacy Decisions-How the EU Determines if a Non-EU Country has an Adequate Level of Data Protection, EUROPEAN COMM’N (2019), https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/adequacy-decisions_en.
Gartner Inc., Gartner Forecasts Worldwide Public Cloud Revenue to Grow 17.5 Percent in 2019, GARTNER.COM (April. 2, 2019), https://www.gartner.com/en/newsroom/press-releases/2019-04-02-gartner-forecasts-worldwide-public-cloud-revenue-to-g
Gartner Inc., Cloud Computing, GARTNER.COM http://www.gartner.com/it-glossary/cloud-computing/
Greenfield, Marlene, Distribution of Twitter Users Worldwide from 2012 to 2018, by Region, STATISTA (May. 27, 2014), https://www.statista.com/statistics/303684/regional-twitter-user-distribution/
In Your Face: China’s All Seeing State, BBC NEWS. (Dec. 10, 2017), https://www.bbc.com/news/av/world-asia-china-42248056/in-your-face-china-s-all-seeing-state
ICO, Guide to the General Data Protection Regulation (GDPR), https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/international-transfers/
Mass, Framingham, Cloud it Infrastructure Revenues Surpassed Traditional it Infrastructure Revenues for the First Time in the Third Quarter of 2018, According to IDC, IDC (Jan. 1, 2019), https://www.idc.com/getdoc.jsp?containerId=prUS44670519
Moerel, Lokke, Binding Corporate Rules, GDPR.BE.BLOG, https://gdpr.be/english/binding-corporate-rules/.
Perlroth, Nicole, Yahoo Says Hackers Stole Data on 500 Million Users in 2014, N.Y. Times, Sept. 22, 2016, https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html
Proust, Olivier, Why BCR are the Future of Global Data Flows - Privacy, Security and Information Law, FIELDFISHER, https://privacylawblog.fieldfisher.com/2017/why-bcr-are-the-future-of-global-data-flows.
Samuels, David, Is Big Tech Merging with Big Brother? Kinda Looks Like It, WIRED (2019), https://www.wired.com/story/is-big-tech-merging-with-big-brother-kinda-looks-like-it/
|