service inventory patterns are identified including “customized,” “high-speed,” “flexibility,”
and “routine.” The relationship between each pattern and its operational performance is then
analyzed.
The paper by
Jin-Lung Peng
,
Yu-Pei Chen
, and
Aureola Sun
reviews the legal risk of
big data applications under the personal information protection act in Taiwan. Big data
applications (covering from data collection, processing, and utilization) impose a unique
challenge to the privacy and personal rights. This study carefully examines relevant articles
of Personal Information Protection Act 2010 (PIPA 2010) and identifies legal challenges that
big data applications face in Taiwan. Their findings indicate big data applications might be
beset with a number of potential practical problems within the context of the current PIPA
2010 as follows: 1) In terms of information disclosure, data collection and processing would
not meet the requirement of Article 8 and Article 9 of PIPA; 2) Data controllers are very
likely to breach the duty stipulated by Article 11 of PIPA, which is, deleting and
discontinuing to process or use when the specific purpose no longer exists or contract period
expires; 3) Some data collectors might fail to satisfy the specific purpose requirement set by
Article 19 of PIPA; 4) Data controllers might violate Article 20 of PIPA at the first marketing
action; and 5) They also might not meet Article 54 of PIPA that requires a notification be
given at the time where such personal information is first used. To seize the opportunities
and meet the challenges associated with big data, American legislators’ attitude which
harbors information free-flow could profitably be taken on board. As a result, a radical shift
is suggested towards the utilizer accountability approach, complemented with well-
performed right relief mechanisms rather than right-claiming on the part of information
owners.