{"id":1152,"date":"2011-06-28T23:47:16","date_gmt":"2011-06-28T15:47:16","guid":{"rendered":"http:\/\/localhost\/portal\/2011\/06\/28\/personal-data-protection-act\/"},"modified":"2011-06-28T23:47:16","modified_gmt":"2011-06-28T15:47:16","slug":"personal-data-protection-act","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1152","title":{"rendered":"\u65b0\u7248\u500b\u8cc7\u6cd5\u65bd\u884c\u7d30\u5247\u8349\u6848\u5ef6\u81f37\u6708\u516c\u5e03"},"content":{"rendered":"<p>iThome\u96fb\u8166\u5831\u9031\u520a \u2502 2011-06-28\u3000\u8a18\u8005\u9ec3\u5f65\u68fb\u5831\u5c0e<br \/>\n&nbsp;<br \/>\n\u6cd5\u52d9\u90e8\u539f\u8a026\u6708\u5c0d\u5916\u9810\u544a\u65b0\u7248\u500b\u8cc7\u6cd5\u65bd\u884c\u7d30\u5247\u8349\u6848\uff0c\u56e0\u70ba\u65e5\u524d\u6cd5\u52d9\u90e8\u5e38\u52d9\u6b21\u9577\u8abf\u52d5\uff0c\u6cd5\u52d9\u90e8\u6cd5\u5f8b\u4e8b\u52d9\u53f8\u79d1\u9577\u9ec3\u8377\u5a77\u8868\u793a\uff0c\u6700\u9072\u5c07\u65bc7\u6708\u9032\u884c\u6cd5\u898f\u9810\u544a\u3002<\/p>\n<p>\u9ec3\u8377\u5a77\u6307\u51fa\uff0c\u65b0\u7248\u500b\u8cc7\u6cd5\u56e0\u70ba\u9069\u7528\u65bc\u6240\u6709\u7522\u696d\u5225\uff0c\u548c\u5176\u4ed6\u653f\u5e9c\u6a5f\u95dc\u6240\u4e3b\u7ba1\u7684\u7522\u696d\u8207\u696d\u52d9\u90fd\u606f\u606f\u76f8\u95dc\uff0c\u5728\u65bd\u884c\u7d30\u5247\u5236\u8a02\u6642\uff0c\u5f80\u5f80\u9700\u8981\u807d\u53d6\u5176\u4ed6\u653f\u5e9c\u90e8\u9580\u7684\u76f8\u95dc\u610f\u898b\uff0c\u5c31\u5fc5\u9808\u7531\u5e38\u52d9\u6b21\u9577\u9032\u884c\u8de8\u90e8\u6703\u7684\u6e9d\u901a\u5354\u8abf\u3002\u6240\u4ee5\uff0c\u5979\u8aaa\uff0c\u5728\u65b0\u4efb\u5e38\u52d9\u6b21\u9577\u9673\u660e\u5802\u65bc6\u670815\u65e5\u5230\u4efb\u5f8c\uff0c\u5c07\u5b89\u6392\u81f3\u5c111\uff5e2\u6b21\u7684\u8de8\u90e8\u6703\u6703\u8b70\uff0c\u5f59\u6574\u65bd\u884c\u7d30\u5247\u6700\u5f8c\u610f\u898b\u5f8c\u624d\u9032\u884c\u6cd5\u898f\u9810\u544a\u3002<\/p>\n<p>\u56e0\u70ba\u65b0\u7248\u500b\u8cc7\u6cd5\u65bd\u884c\u7d30\u5247\u5f71\u97ff\u91cd\u5927\uff0c\u9ec3\u8377\u5a77\u8868\u793a\uff0c\u70ba\u4e86\u5ee3\u7d0d\u5404\u754c\u7684\u5efa\u8a00\uff0c\u81f3\u5c11\u6703\u67092\u661f\u671f\u7684\u6cd5\u898f\u9810\u544a\u6642\u9593\uff0c\u4e5f\u6b61\u8fce\u5404\u754c\u5728\u9019\u671f\u9593\u63d0\u4f9b\u5efa\u8b70\uff0c\u6cd5\u52d9\u90e8\u5f59\u6574\u5404\u754c\u610f\u898b\u5f8c\uff0c\u518d\u9001\u4ea4\u884c\u653f\u9662\u9032\u884c\u65bd\u884c\u7d30\u5247\u7684\u5be9\u67e5\u3002\u6309\u7167\u6cd5\u52d9\u90e8\u6cd5\u5f8b\u4e8b\u52d9\u53f8\u53f8\u9577\u5468\u5fd7\u69ae\u65e5\u524d\u63d0\u4f9b\u7684\u9032\u5ea6\uff0c\u539f\u8a026\u6708\u6642\u5b8c\u6210\u7d30\u5247\u8349\u6848\u5f8c\uff0c\u9001\u4ea4\u884c\u653f\u9662\u5be9\u67e5\u534a\u5e74\uff0c\u518d\u65bc11\u670825\u65e5\u6b63\u5f0f\u516c\u5e03\uff0c\u540c\u6642\u4e5f\u4e00\u4f75\u4fee\u8a02\u5176\u4ed6\u7684\u5b50\u6cd5\u8207\u914d\u5957\u63aa\u65bd\uff0c\u5404\u6a5f\u95dc\u4e5f\u5c07\u91dd\u5c0d\u7279\u7a2e\u8cc7\u6599\u4f7f\u7528\u8a02\u5b9a\u76f8\u95dc\u6cd5\u898f\u547d\u4ee4\u3002<\/p>\n<p><script type=\"text\/javascript\"><!--\ngoogle_ad_client = \"ca-pub-1319158505166829\";\n\/* 468x60, \u5df2\u5efa\u7acb 2010\/10\/17 *\/\ngoogle_ad_slot = \"7257811969\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 60;\n\/\/-->\n<\/script><script type=\"text\/javascript\"\nsrc=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\n<\/script><br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>iThome\u96fb\u8166\u5831\u9031\u520a \u2502 2011-06-28\u3000\u8a18\u8005\u9ec3\u5f65\u68fb\u5831\u5c0e &nbsp; \u6cd5\u52d9\u90e8\u539f\u8a026\u6708\u5c0d\u5916\u9810\u544a\u65b0\u7248\u500b\u8cc7 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1152","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1152"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1152\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}