簡易檢索 / 詳目顯示

研究生: 辜任廷
Jen-Ting Ku
論文名稱: 一個兼顧資訊透明與落實之 RFID 應用隱私權政策撰寫指引
A Guideline to Establish RFID Applications Privacy Policies Considering Openness and Enforcement
指導教授: 查士朝
Shi-Cho Cha
口試委員: 羅乃維
Nai-Wei Lo
周子銓
Tzu-Chuan Chou
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2010
畢業學年度: 98
語文別: 中文
論文頁數: 72
中文關鍵詞: 個人資料保護隱私權無線射頻識別
外文關鍵詞: RFID, Personal Data Protection, Privacy
相關次數: 點閱:266下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,RFID 應用技術日益成熟,使用領域也愈來愈多元,連帶引發各國對個人資料隱私保護議題的重視。為了因應 RFID 應用系統所帶來的個人資料隱私與安全威脅,目前許多消費者保護團體與各國官方組織,針對 RFID 隱私提出相關的實施原則與規範,要求 RFID 應用系統提供者必須揭露其 RFID 隱私權政策。然而,這些原則與規範多在說明 RFID 隱私權政策所應涵蓋的內容,少有針對如何建立 RFID 隱私權政策。
    因此,本研究將提出一個系統化的架構,來協助 RFID 應用系統提供者建立 RFID 隱私權政策。根據此架構,RFID 應用系統提供者可在 RFID 隱私權政策中,明確地說明所採取的相關措施,並據此向使用者進行說明對於個人資料收集與使用之目的,以及相關的安全保護措施;此外,RFID 應用系統提供者可以據此向第三公正單位證明確實有依照政策內容來執行。
    當未來愈來愈多的國家開始要求 RFID 應用系統提供者必須揭露隱私權政策,本研究將可幫助這些國家建立相關的指引與原則,來協助 RFID 應用系統提供者來建立 RFID 應用系統的隱私權政策。


    As advances of RFID technologies, privacy and personal data security of RFID applications is brought to the spotlight in recent years. In response to the threats of personal data and security due to RFID application systems, many customer protection groups and authorities of different countries have proposed guidelines and regulations considering for RFID privacy. The guidelines usually ask RFID application providers to disclose their privacy policies. Although several guidelines discuss the major components of privacy policies, there are few guidelines addressed that how RFID application providers establish their privacy policies.
    This article proposed a systematic scheme to support RFID application providers to establish RFID privacy policies. Based on the scheme, RFID application providers are able to clarify their privacy practices about the implemented applications in their RFID privacy policies step by step. RFID application providers can also use these policies to communicate with users of the applications about the purpose of personal data collected and used in the application, and related security safeguard. Moreover, RFID application providers can provide evidences to third parties trusted by both the providers and users to make sure the enforcement of the policies.
    While more and more countries are about to ask RFID application providers to disclose their privacy policies in the future, the study can hopefully contribute to help these countries to develop guidelines and regulations for RFID application providers to establish privacy policies about their applications.

    摘 要 I Abstract II 誌 謝 III 目 錄 IV 圖目錄 VI 表目錄 VII 第一章 緒論 - 1 - 1.1 研究背景與動機 - 1 - 1.2 研究目的與貢獻 - 2 - 1.3 章節介紹 - 3 - 第二章 文獻探討 - 5 - 2.1 資訊隱私權 - 5 - 2.2 個人資料保護原則與規範 - 7 - 2.2.1 個人隱私與跨境個人資料流通保護綱領 - 7 - 2.2.2 個人資料保護指令 - 8 - 2.2.3 國際安全港隱私保護原則 - 9 - 2.3 RFID 隱私權保護原則與規範 - 10 - 2.3.1 RFID 技術的公平資訊實施原則 - 11 - 2.3.2 2003年RFID受告知權法案 - 12 - 2.3.3 消費者與私人企業使用RFID綱領 - 13 - 2.3.4 RFID 標籤隱私保護準則 - 15 - 2.3.5 RFID 技術佈署之隱私最佳實務 - 17 - 2.3.6 RFID 系統安全綱領 - 18 - 2.3.7 使用 RFID 應用系統之隱私權與資料保護實作原則建議 - 20 - 2.4 Cookies 應用與網站隱私權政策 - 21 - 2.4.1 Cookies 應用 - 21 - 2.4.2 網站隱私權政策 - 22 - 第三章 研究方法 - 25 - 3.1 研究流程 - 25 - 3.2 研究架構 - 25 - 第四章 RFID 隱私權政策撰寫流程 - 27 - 4.1 名詞定義 - 27 - 4.2 RFID 應用隱私權政策應涵蓋之內容 - 27 - 4.3 撰寫步驟概述 - 30 - 4.4 RFID 隱私權政策撰寫流程 - 32 - 4.4.1 RFID 應用範圍 - 32 - 4.4.2 RFID 技術類型 - 35 - 4.4.3 個人資料的收集與用途說明 - 38 - 4.4.4 安全聲明 - 43 - 4.4.5 資訊分享 - 44 - 4.4.6 風險評估 - 46 - 4.4.7 資料存取與取消授權 - 51 - 4.4.8 申訴與紛爭處理流程 - 53 - 4.4.9 RFID 隱私權政策彙整 - 54 - 第五章 研究結果與討論 - 58 - 5.1 RFID 隱私權政策撰寫指引修正與說明 - 58 - 5.2 RFID 隱私權政策揭露之對象與內容 - 63 - 5.3 應用 RFID 加強校園安全統整及評估計畫 - 65 - 第六章 結論與建議 - 67 - 參考文獻 - 69 - 附錄 A:專家訪談摘要 - 72 -

    [1] S. L. Garfinkel, et al., "RFID privacy: an overview of problems and proposed solutions," Security & Privacy, IEEE, vol. 3, pp. 34-43, 2005.
    [2] A. Juels, "RFID security and privacy: a research survey," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 381-394, 2006.
    [3] F. Thiesse, "RFID, privacy and the perception of risk: A strategic framework," The Journal of Strategic Information Systems, vol. 16, pp. 214-232, 2007.
    [4] Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN), American Civil Liberties Union (ACLU), Electronic Frontier Foundation (EFF), Electronic Privacy Information Center (EPIC), Junkbusters, Meyda Online, PrivacyActivism, "Position Statement on the Use of RFID on Consumer Products," November 14 2003.
    [5] A. Cavoukian, "Privacy Guildeline for RFID Information Systems," Information and Privacy Commissioner/Ontario, 2006.
    [6] US Center for Democary and Technology, "Privacy Best Practices for Deployment of RFID Technology, Interim Draft," 2006.
    [7] The State of Washington of USA, "Engrossed Substitute House Bill 1031," 2008.
    [8] Commission of the European Communities, "EU Commission Recommendation on the Implementation of Privacy and Data Protection Principles in Applications Supported by RFID," EU Commission Recommendation, 2009.
    [9] 廖緯民, "論資訊時代的隱私權保護-「以資訊隱私權」為中心," 資訊法務透析, pp. 20-27, 1996.
    [10] 徐新隆, "數位時代下資訊隱私權問題之研究-以個人資料保護為中心," 碩士論文,國立臺北大學法律學院法學系研究所, 2005.
    [11] T. J. Smedinghoff, "Online Law: The SPA's Legal Guide to Doing Business on the Internet " 1996.
    [12] 中華民國, "個人資料保護法," 2010.
    [13] Organization for Economic Cooperation and Development, "Guidelines on the Protection and Privacy of Transborder Flows of Personal Data," Organization for Economic Cooperation and Development, 1980.
    [14] European Union, "Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data," Official Journal of the European Communities, 1995.
    [15] D. Isenberg, The GigaLaw Guide to Internet Law: Random House Trade Paperbacks, 2002
    [16] U.S. Department of Commerce, "International Safe Harbor Privacy Principles," 1998.
    [17] Federal Trade Commission, "Privacy Online: A Report to Congress," 1998.
    [18] Consumers Against Supermarket Privacy Invasion and Numbering (CASPIN), "RFID Right to Know Act of 2003," 2003.
    [19] Electronic Privacy Information Center (EPIC), "Proposed Guidelines For Use of RFID Technology : Enumerating the Rights and Duties of Consumers and Private Enterprises," 2004.
    [20] MIC and METI, "Guidelines for Privacy Protection with Regard to RFID Tags," Government of Japan, July 2004.
    [21] T. Karygiannis, et al., "Guidelines for Securing RadioFrequency Identification (RFID) Systems," National Institute of Standards and Technology, Special Publication 800-98, April 2007.
    [22] D. Kristol and L. Montulli, "Http state management mechanism," 2000.
    [23] D. M. Kristol, "HTTP Cookies: Standards, privacy, and politics," ACM Trans. Internet Technol., vol. 1, pp. 151-198, 2001.
    [24] V. Mayer-Schönberger, "The internet and privacy legislation: Cookies for a treat?," Computer Law & Security Report, vol. 14, pp. 166-174.
    [25] D. Lin and M. C. Loui, "Taking the byte out of cookies: privacy, consent, and the Web," presented at the Proceedings of the ethics and social impact component on Shaping policy in the information age, Washington, D.C., United States, 1998.
    [26] TRUSTe, "TRUSTe Guidance on Model Web Site Disclosures," 2005.
    [27] Electronic Privacy Information Center, "Guidelines on Commercial Use of RFID Technology," EPIC Guidelines, 2004.
    [28] M. Howard and D. LeBlanc, "Writing Secure Code," Microsoft Press, 2002.
    [29] ISO/IEC, "Information technology – security techniques – management of information and communications technology security – part 1: Concepts and models for IT security," ISO/IEC TR 13335-1 Tecnhnical Report, 1996.
    [30] Google, "Google 隱私權政策," March 11 2009.
    [31] J. H. P. Eloff, et al., "A comparative framework for risk analysis methods," Comput. Secur., vol. 12, pp. 597-603, 1993.
    [32] The Committee of Sponsoring Organizations of the Treadway Commission (COSO), "Enterprise risk management – integrated framework," COSO Publications, 2004.
    [33] M. E. Whitman and H. J. Mattord, "Management of Information Security, 2nd ed," Course Technology, 2007.
    [34] ISO/IEC, "Information technology – security techniques – information security risk management," ISO/IEC 27005:2008 International Standard, 2008.
    [35] G. Stoneburner, et al., "Risk management guide for information technology systems," Recommendations of the NIST Special Publication 800-30, 2002.
    [36] C. J. Alberts and A. Dorofee, Managing Information Security Risks: The OCTAVE Approach. Boston, MA: USA: Addison-Wesley Longman Publishing Co, 2002.
    [37] C. Shi Cho, et al., "An Efficient and Flexible Way to Protect Privacy in RFID Environment with Licenses," in RFID, 2008 IEEE International Conference on, 2008, pp. 35-42.
    [38] U.S. Dept. of Commerce, "Guidelines for automatic data processing risk analysis," FIPS Publications 65, 1979.
    [39] B. Karabacak and I. Sogukpinar, "ISRAM: information security risk analysis method," Computers & Security, vol. 24, pp. 147-159, 2005.
    [40] Z. Yazar, "A qualitative risk analysis and management tool – CRAMM," SANS InfoSec Reading Room White Paper, 2002.
    [41] 李俊磊, "網站隱私權政策分析-以台灣網站為例," 碩士論文,國立政治大學資訊管理研究所, 2003.
    [42] 林秀宜, "網站經營對於顧客資訊隱私保護觀之研究," 碩士論文,國立高雄第一科技大學資訊管理系, 2002.
    [43] 馬興平, "論資訊隱私權的保護-從釋字第603號解釋出發," 碩士論文,國立中正大學法律所, 2007.

    無法下載圖示 全文公開日期 2012/07/21 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE