Table of Contents Table of Contents
Previous Page  VII /342 Next Page
Information
Show Menu
Previous Page VII /342 Next Page
Page Background

service inventory patterns are identified including “customized,” “high-speed,” “flexibility,”

and “routine.” The relationship between each pattern and its operational performance is then

analyzed.

The paper by

Jin-Lung Peng

,

Yu-Pei Chen

, and

Aureola Sun

reviews the legal risk of

big data applications under the personal information protection act in Taiwan. Big data

applications (covering from data collection, processing, and utilization) impose a unique

challenge to the privacy and personal rights. This study carefully examines relevant articles

of Personal Information Protection Act 2010 (PIPA 2010) and identifies legal challenges that

big data applications face in Taiwan. Their findings indicate big data applications might be

beset with a number of potential practical problems within the context of the current PIPA

2010 as follows: 1) In terms of information disclosure, data collection and processing would

not meet the requirement of Article 8 and Article 9 of PIPA; 2) Data controllers are very

likely to breach the duty stipulated by Article 11 of PIPA, which is, deleting and

discontinuing to process or use when the specific purpose no longer exists or contract period

expires; 3) Some data collectors might fail to satisfy the specific purpose requirement set by

Article 19 of PIPA; 4) Data controllers might violate Article 20 of PIPA at the first marketing

action; and 5) They also might not meet Article 54 of PIPA that requires a notification be

given at the time where such personal information is first used. To seize the opportunities

and meet the challenges associated with big data, American legislators’ attitude which

harbors information free-flow could profitably be taken on board. As a result, a radical shift

is suggested towards the utilizer accountability approach, complemented with well-

performed right relief mechanisms rather than right-claiming on the part of information

owners.