透過您的圖書館登入
IP:3.140.199.3
  • 期刊

個人資料之去識別化與再識別化風險:法律之觀點

The Deidentification of Personal Data and its Risk of Reidentification: A Legal Perspective

摘要


當前盛行以大數據技術進行資料研究分析,導出各種創新性推論或發現,以造福社會。惟資料廣泛運用時,亦漸形成隱私風險。面對隱私保護與資料效用的衝突,倘將個資去識別化、匿名化,則不受個人資料保護法拘束,可移作原始蒐集目的外之利用或與第三人分享,以供各種運用。惟大數據時代,有眾多資料來源可供交叉比對,不論去識別化或匿名化資料均難以維持不可逆、不可還原的狀態,而不可避免均有被再識別化風險,乃形成隱私等人格與經濟損害、表意自由的寒蟬效應。一些知名的再識別化事件,使得去識別化的有效性漸受質疑。但有反駁,被再識別出來的比例實屬微小,去識別化仍屬有效機制。對此,美國法院見解亦相當分歧。對於去識別化與再識別化的衝突,建議可採下列因應措施:(一)去識別化資料仍可能與其他資料相結合而再識別化,故較務實解決之道,應非在於完全排除再識別化風險,而應著重於減緩風險至極低程度。類似此風險忍受概念,歐美許多立法例普遍採用之「合理」識別化、去識別化標準,亦未要求「完全排除被再識別化之風險」。(二)去識別化的進行,應按再識別化風險評估而兼採符合比例之合理技術、行政與法律措施,以降低再識別化風險。(三)課予民刑事責任而禁止不當再識別化。

並列摘要


The concept of "personal data" as the cornerstone for information privacy laws seems workable. Any data relating to an identified or identifiable natural person will trigger the mechanism of personal data protection. The operation of big data is to derive or infer hidden value from the structured and unstructured raw data through novel reuse. However, the reuse of personal data will be likely beyond the scope of original collection purpose, in violation of the principle of purpose limitation. Furthermore, the ubiquitous use of personal data will lead to privacy risk. As a consequence, one of the solutions is to deidentify personal data in order to use for further purposes or share with third parties. However, in the age of big data, as the deidentified or anonymized data may be combined with other datasets from various sources, it is not likely to absolutely ensure "a person cannot be identified from a dataset." The reidentification will cause damages to privacy, personality or property, and the chilling effect on freedom of expression. As there were several famous reidentification cases in the past two decades, the effectiveness of deidentification or anonymization is gradually criticized. However, some scholars insist that the deidentification or anonymization is still effective in protecting privacy because the rate of reidentification is very small. Similarly, the U.S. courts are also divided in their effectiveness. In facing the conflict between deidentification and reidentification, there could be some solutions. Firstly, the key point is to adopt a reasonable deidentification standard, thus reducing the risk of reidentification to a not important degree, rather absolutely ruling out its risk. Secondly, data controllers shall evaluate the risk of reidentification and thus adopt the technical, legal, and organizational safeguards subject to the principle of proportionality. Finally, statutes shall include civil and criminal liabilities in order to prohibit improper reidentification.

參考文獻


李寧修(2020),〈個人資料合理利用模式之探析:以健康資料之學術研究為例 〉 , 《 臺大 法學 論叢 》 , 49 卷 1 期 , 頁 1-50 。https://doi.org/10.6199/NTULJ.202003_49(1).0001
翁清坤(2018),〈賦予當事人個人資料財產權地位之優勢與侷限:以美國法為中心〉,《臺大法學論叢》,47 卷 3 期,頁 941-1051。https://doi.org/10.6199/NTULJ.201809_47(3).0001
樓一琳、何之行(2017),〈個人資料保護於雲端運算時代之法律爭議初探暨比較法分析:以健保資料為例〉,《臺大法學論叢》,46 卷 2 期,頁339-422。https://doi.org/10.6199/NTULJ.2017.46.02.01
Narayanan, A., & Shmatikov, V. (2010). Privacy and Security: Myths and Fallacies of “Personally Identifiable Information”. Communications of the ACM, 53(6), 24-26. https://doi.org/10.1145/1743546.1743558
Phillips, M., Dove, E. S., & Knoppers, B. M. (2017). Criminal Prohibition of Wrongful Re-identification: Legal Solution or Minefield for Big Data?. Bioethical Inquiry, 14, 527-539. https://doi.org/10.1007/s11673-017-9806-9

延伸閱讀