¡iThe Proof - 202001´Á¡j±q²£«~³]p¤§Áô¨p«OÅ@¬Ý¨t²Î¥Í©R¶g´Á¬yµ{¤§Áô¨p¤uµ{
±M®a§@ªÌ : §f±Ó¸Û Louis Lu / SGS CBE ²£«~¸g²z
¡iThe Proof - 202001´Á¡j
±q²£«~³]p¤§Áô¨p«OÅ@¬Ý¨t²Î¥Í©R¶g´Á¬yµ{¤§Áô¨p¤uµ{
¦¦b2009¦~ Spiekermann ©M Cranor ¦b¤@½g±´°QÁô¨p¤uµ{ªº½×¤å¤¤¡A±N¡u±q¬[ºc«OÅ@Áô¨p¡v(privacy-by- architecture) »P¡u±q¬Fµ¦«OÅ@Áô¨p¡v(privacy-by-policy) ¶i¦æ¤F¹ï¤ñ¡C«eªÌ±Mª`©óÓ¸ê³Ì¤p¤Æ (data minimization)¡B°Î¦W¤Æ (anonymization) ¥H¤Î«È¤áºÝ¸ê®Æ³B²z©M¦sÀx¡A¦Ó«áªÌ«h°¼«©ó¦bÓ¸ê³B²z¤¤ªº°õ¦æ¬Fµ¦¡CGürses¡BTroncoso ©M Diaz «h«ü¥X¡AÓ¸ê³Ì¤p¤ÆÀ³¬°¤uµ{¤ÆÁô¨p´L«¨t²Îªº°ò¥»ì«h¡C 2011¦~ Kung¡BFreytag ©M Kargl ¤S¦bÃö©ó´¼¼z¹B¿é¨t²Î¤¤ªºÁô¨p³]p½×¤å¤¤©w¸q¤F¤TÓì«h¡A§Y³Ì¤p¤Æ¡A°õ¦æ©M³z©ú¡C
2015¦~ Hansen¡BJensen ©M Rost §ó¦b¤@¥÷¦³ÃöÁô¨p¤uµ{«OÅ@¥Ø¼Ðªº½×¤å¤¤¡A½T©w¤F¤TӥؼСG¤£¥i³sµ²©Ê (unlikability)¡B³z©ú©Ê (transparency) ©M¥i¤¶¤J©Ê (intervenability)¡C±µµÛ¦b2014¦~¤Î 2016¦~Ãö©óÁô¨p³]pµ¦²¤ªº¨â½g½×¤å¤¤¡AHoepman «h½T©w¤F¥|ºØ¸ê®Æ¾É¦Vªºµ¦²¤¡G³Ì¤p¤Æ (minimize)¡B¤ÀÂ÷ (separate)¡B©â¨ú (abstract)¡BÁôÂà (hide)¡A¥H¤Î¥|ºØ¬yµ{¾É¦Vªºµ¦²¤¡G§iª¾ (inform)¡B±±¨î (control)¡B±j¨î (enforce)©M®i¥Ü (demonstrate)¡C
LINDDUNÁô¨p«Â¯Ù¤ÀªR¤èªk½× ¤Î ³nÅéµ{¦¡±`¨£°ÝÃD
¥þ²y©Ê½×¤å¥ç³°³°ÄòÄòµoªí¬ÛÃöijÃD¡A¨Ò¦p 2011¦~ KU Leuven ©w¸q¤F¤@ÓÁô¨p«Â¯Ù®Ø¬[¡A¸Ó®Ø¬[¾ÉP¤F LINDDUN ¤èªk½×ªºµo®i¡CÁô¨p¥¿¦b¦¨¬°·í¤µ¹q¤lªÀ·|¤¤ªºÃöÁäijÃD¡C¦ÜÃö«nªº¬O¡A¦p¦óºÉ§Ö±NÁô¨p«OÅ@¾ã¦X¨ì¸ê°T¨t²Î¶}µoªº¥Í©R¶g´Á·í¤¤¡CLINDDUN ¬O¤@ºØÁô¨p«Â¯Ù¤ÀªR¤èªk½×¡A¥Î¥H¤ä«ù¤ÀªR¤Hû©Ò´£¥XªºÁô¨p«OÅ@n¨D¡A¨ä¤¤¤w¸g´£¥X¤F³\¦h¥Î©óÁô¨p¤uµ{ªº·§©À¡Bì²z©M¤èªk¡C
ªñ¦~¨Ó¦]²£«~©Î³nÅé¨t²Î³]pªº·å²«¡A¾ÉP«D¸g·í¨Æ¤H¦P·N¬ªÅSÓ¤H¸ê®Æ©ÎÁô¨p¸ê°Tªº¨Æ¥ó¼h¥X¤£½a¡A¤@¯ë¨Ó»¡¥i·§¤À¬°ºÞ²z¡B§Þ³N»Pºû¹Bµ¥¤TÓ¼h±ªº°ÝÃD¡C¨Ò¦p´¼¼z³â¥z°ê»Ú»â¾É¼t°Ó¹B¥Î¼Æ¤d¦Wû¤uÅ¥¨ú´¼¼z³â¥z¥Î¤á©M¤H¤u´¼¼z (AI)»yµ§U²zªº¹ï¸Ü¬ö¿ý¡A²z¥Ñ¬O¬°¤F°V½m¨Ã´£¤É¨ä AI ªºªA°È«~½è¡F©Î¬O±N´¼¼z³â¥zªº°¼¿ý¬ö¿ý»P©e¥~¼t°Ó¤À¨É¡A¥H´£¤É¨ä²£«~ªº»yµ¿ëÃÑ¥¿½T©Ê¡AºØºØ§@¬°¤Þµo¤F¥Î¤á¹ïÁô¨p³Q«Dªk»`¶°¡B³B²z»P§Q¥Î¤§ºÃ¼{¡A¦¹µ¥ºÞ²z±ªº³]p§Y»PÁô¨p«OÅ@ì«h¬Û¬»Ä²¡C¤S2018¦~5¤ë§Y®É³q°T¤j¼t¦b³Ì·sª©APP§ó·s«á¡A¨t²Î±N¡uÁô¨p³]©w¡v¤§¡u¥~³¡À³¥Îµ{¦¡¦s¨ú¡v¹w³]È¡A±q¡u©Úµ´¡v§ó§ï¬°¡u¤@«ß¤¹³\¡v¡A±j¢¥Î¤á¶}©ñÁô¨p¨Ñ¦s¨ú¡A¦¹¤D¯A¤Î§Þ³N±»Pºû¹BÂù¼hªº°ÝÃD¡C
¦Ó³nÅéµ{¦¡±`¨£ªº°ÝÃD¤jP¤W¦³´XºØ¦]¯À¡G»yªk¿ù»~ (syntax error)¡B°õ¦æ¿ù»~ (run-time error)¡BÅÞ¿è¿ù»~ (logic error)¡B¤wª¾©M¥¼ª¾º|¬} (vulnerability) ©M®zÂI (weakness)¡C²Îp¬ã¨sµo²{¡A³nÅé¨t²Î¯äÂÎ (bug) ªº×¥¿¦¨¥»¦b»Ý¨D¶¥¬qµo²{¨Ã³B²zªº¦¨¥»¡A»P¦b³¡¸p (deploy) «á¤~µo²{¨Ã³B²z±¼ªº¦¨¥»®t¤F30¿¡C¦b¶}µo¶¥¬q®t6¿¡A¦b¨t²Î¾ã¦X´ú¸Õ (SIT, System integration testing) ¶¥¬q®t3¿¡A¦b¨Ï¥ÎªÌÅ禬´ú¸Õ (UAT, User Acceptance Testing) ¶¥¬q¤S®t¤F2¿¡C
¡u±q³]pµÛ¤â«OÅ@Áô¨p¡v¤C¤jì«h
2018¦~5¤ë25¤é¼Ú·ù¤½§iGDPR (General Data Protection Regulation)¡A¼Ú·ù¦a°Ïªº¤@¯ë¸ê®Æ«OÅ@³W½d¶}©l±j¨î¥Í®Ä¡A¥un±zªº²£«~©ÎªA°Èªº¨Ï¥ÎªÌ¬O¼Ú·ù©~¥Á¡A´N¥²¶·¿í¦u¬ÛÃö³W½d¡CGDPR ¤]º¦¸±N¸ê®Æ«OÅ@³]p¦C¬°¸ê®Æ±±ºÞ¤Î³B²zªÌ (Data Controller ©M Data Processor)ªºªk©w¸q°È¡A©ú½T´£¨ì²£«~©MªA°È¥²¶·¥[¤J¸ê®Æ³Ì¤p¤Æ©M¥i¨Ï¥ÎÀÀ°Î¦W¤Æµ¥³]p¡C²£«~³]p¤è¦V«hÀ³¦Ò¶q¡u±q³]pµÛ¤â«OÅ@Áô¨p¡v¤C¤jì«h¡G
¤@¡B¤Æ³Q°Ê¬°¥D°Ê¡B¨¾±w©ó¥¼µM¡B«D¨Æ«á¤`¦Ï¸É¨c (Proactive not Reactive; Preventative not Remedial)
¤G¡B¨ÏÁô¨p¦¨¬°¹w³]¾÷¨î (Privacy as the Default Setting)
¤T¡B©ó³]p¤¤¸m¤JÁô¨p (Privacy Embedded into Design)
¥|¡B§¹¾ãªº¥\¯à¡G¥¿©M¦Ó«D¹s©M (Full Functionality - Positive-Sum, not Zero-Sum)
¤¡B±qÀY¦Ü§Àªº¦w¥þ¡G«OÅ@²[»\¾ãÓ¸ê®Æ¥Í©R¶g´Á (End-to-End Security - Full Lifecycle Protection)
¤»¡B¯à¨£«×»P³z©ú«×¡G«O«ù¶}©ñ©Ê (Visibility and Transparency - Keep it Open)
¤C¡B´L«¥Î¤áÁô¨p¡G½T«O¥H¥Î¤á¬°¤¤¤ß (Respect for User Privacy - Keep it User-Centric)
¥t»P¼Ú·ù³q¥Î¸ê®Æ«OÅ@³W½d (GDPR) ²Ä25±øn¨D¬ÛÃö¤§ ISO ¼Ð·Ç¬°¡G
♦ ISO/IEC TR 27550 ¡u±q³]pµÛ¤â«OÅ@Áô¨p¡v¡F
♦ ISO/IEC 27001¡u¸ê¦wºÞ²zÅçÃÒn¨D¡v¡F
♦ ISO/IEC 27002¡u¸ê¦wºÞ²z¹ê§@«ü¤Þ¡v¡F
♦ ISO/IEC 20000-1¡uªA°ÈºÞ²z¨t²ÎÅçÃÒn¨D¡v¡F
♦ ISO/IE 20000-2¡uªA°ÈºÞ²z¨t²Î¹ê§@«ü¤Þ¡v¡F
♦ ISO/IEC 29134¡uÁô¨p½ÄÀ»µû¦ô«ü¤Þ¡v¡F
♦ ISO/IEC/IEEE 15288 ¡u¨t²Î¥Í©R¶g´Á¬yµ{¡v¡F
n³]p¤@ӲŦX Privacy-by-Design(¥H¤U²ºÙPbD) ©Î Privacy-by-Default ªº²£«~¡Aº¥ýÀ³«Ø¥ß²£«~ªº¸ê®Æ¬yµ{¹Ï (DFD, Data Flow Diagram)¡ADFD¹Ïªººë¯«´N¦b©ó¸ê®Æ¬yµ{ªº³W¹º¡B¦U³B²z³æ¤¸ªº°Ê§@¡B¨Ã¥B¥i¥H§@§ó²`¤@¨Bªº¤Á¤À¡C¥Dn¨Ï¥Î¥|ºØÃþ«¬ªº¹Ï¥Ü¹ï¨t²Î¶i¦æµ²ºc¤Æªº¹Ï§Îªí¥Ü¡GÀx¦sÅé (entity), ¸ê®ÆÀx¦s©Ò (data store), ¸ê®Æ¬y (data flow) ¤ÎÂà´«µ{§Ç (process)¡C¨CÓ DFD ¤¸¯ÀÃþ«¬³£»P³\¦hÁô¨p«Â¯ÙÃþ§O¬ÛÃöÁp¡]¤wÃѧO¥X¤CºØÁô¨p°ª«×«Â¯ÙªºÃþ§O¡G¥i³s±µ©Ê¡B¥iÃѧO©Ê¡B¤£¥i§_»{©Ê¡BŲ§O©Ê¡B¸ê°T´¦ÅS¡B¤º®e¤£¤F¸Ñ¡A¥H¤Î¥¼¿í´`¬Fµ¦©M³\¥i¡^¡C¬°¤F½T©wÁô¨p«Â¯Ù¾A¥Î©ó¨t²Îªº¤ÀªR¡A¥²¶·ÀËÅç¨CÓ DFD ¹Ï¥Ü¬ÛÀ³Ãþ§Oªº«Â¯Ù¡C
LINDDUN ¤èªk½×³q¹L«Â¯Ù¾ð (threat trees) ¨ÓÀ°§U¤ÀªR¤Hû¡A«Â¯Ù¾ð´yz¤F«Â¯ÙÃþ«¬©M DFD Ãþ«¬ªº¨CºØ¥i¯à²Õ¦Xªº³Ì±`¨£§ðÀ»¸ô®|¡C°ò©ó³o¨Ç«Â¯Ù¾ð¡A¤ÀªR¤Hû±N¨Ï¥Î¦UºØ»~¥Î®×¨Ò±¡¹Ò¡A°O¿ý¤wÃѧOªº«Â¯Ù¡A¥H¸Ô²Ó´yz¥i¯àªº§ðÀ»¤âªk¡CµM«á»Ýn®Ú¾Ú«Â¯Ùªº·ÀI¹ï«Â¯Ù¶i¦æÀu¥ý¯Å±Æ§Ç¡CµM«á¥i¥H±N¤Þ°_ªº«Â¯ÙÂà´«¬°Áô¨p¦w¥þn¨D¡CLINDDUN ¤èªk½×¬O¤@ºØ«Â¯Ù«Ø¼Ò§Þ³N¡A¹ªÀy¤ÀªR¤Hû¹B¥Î¨t²Î¤è¦¡¦Ò¼{Áô¨p¦w¥þ°ÝÃD¡C
¨t²Î¥Í©R¶g´Á¬yµ{¤§Áô¨p¤uµ{
ISO (°ê»Ú¼Ð·Ç¤Æ²Õ´) ©ó 2019 ¦~ 9 ¤ë¥¿¦¡µo§G ISO/IEC TR 27550 ¡u¨t²Î¥Í©R¶g´Á¬yµ{¤§Áô¨p¤uµ{¡v¡A´£¨Ñ¤FÁô¨p¤uµ{·Ç«h¡A¦®¦bÀ°§U²Õ´±NÁô¨p¤uµ{ªº³Ì·s¶i®i¾ã¦X¨ì¨t²Î¥Í©R¶g´Á¬yµ{¤¤¡CÁô¨p¤uµ{¯A¤Î¦b ICT (¸ê³q°T) ¨t²Î±q·nÄx¨ì¼X¹Óªº¾ãӥͩR¶g´Á¤¤±NÁô¨p°ÝÃD¯Ç¤J¦Ò¶q¡A½T«OÁô¨p¤@ª½¬O¨Ã¥B¤´µM¬O¨ä¥\¯àªº¤@³¡¤À¡C
¡u±q³]pµÛ¤â«OÅ@Áô¨p¡v(PbD) ¬O¬°¯A¤ÎÓ¸ê (PII) ¬¡°Êªº²£«~¡BªA°È©ÎºÞ²z¨t²Î¤¤«Øºc°_Áô¨p«OÅ@ªº²Ä¤@¹D¨¾½u¡C¾A¥Î©ó¸ê®Æ±±¨îªÌ (Data Controller)©M¸ê®Æ³B²zªÌ (Data Processor)¡A¦b³B²z¹ï·í¨Æ¤H¤§Åv§Q¤Î¦Û¥Ñ©Ò¥Í¤§½Ñ¦h¥i¯à¥BÄY«ªº·ÀI¡A¤£½×¬O¦b¨M©w³B²z¤è¦¡®É©Î¬O¦b³B²z¤¤¡A¸ê®Æ±±¨îªÌ©y¿í´`¼Ú·ù³q¥Î¸ê®Æ«OÅ@±ø¨Ò ²Ä25±ø the principles of data protection by design and by default ¤§n¨D¡A¹ê¬I¾A·í¤§§Þ³N¤Î²Õ´±¹¬I(technical and organizational measures)¡A¨Ò¦p¡GÀÀ°Î¦W¤Æ (pseudonymization) (µù¤@)¡A¥B¸Óµ¥±¹¬I¦®¦b¹ê²{¸ê®Æ«OÅ@ì«h (¦p¸ê®Æ³Ì¤p¤Æì«h)¡A¨Ã±Ä¨ú¦³®Ä¤è¦¡±q³]pµÛ¤â«OÅ@Áô¨p¡A¥B±N¥²n«OÅ@±¹¬I¯Ç¤J³B²zµ{¦¡¡A¥H²Å¦Xn¨D¨Ã«OÅ@Ó¸ê·í¨Æ¤H¤§Åv§Q¡C
(µù¤@)¡GÀÀ°Î¦W¤Æ/¥h³sµ²¤Æ¡]Pseudonymisation¡^¡G¨Ì¾Ú GDPR ¤¤©w¸q¡A¬O«ü³B²zÓ¤H¸ê®Æ¤§¤è¦¡¡A¨Ï¸ÓÓ¤H¸ê®Æ¦b¤£¨Ï¥ÎÃB¥~¸ê°T®É¡A¤£¦A¯à°÷ÃѧO¥X¯S©w¤§Ó¸ê·í¨Æ¤H¡A¥B¸ÓÃB¥~¸ê®Æ¤w³Q¤À¶}¦s©ñ¡A¨Ã¥H§Þ³N¤Î²Õ´±¹¬I½T«O¸ÓÓ¤H¸ê®ÆµLªk©ÎµL¥iÃѧO¥X·í¨Æ¤H¡C