{"id":981,"date":"2010-11-08T08:38:15","date_gmt":"2010-11-08T00:38:15","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/11\/08\/euro-personal-data-protection-law\/"},"modified":"2010-11-08T08:38:15","modified_gmt":"2010-11-08T00:38:15","slug":"euro-personal-data-protection-law","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=981","title":{"rendered":"\u6b50\u76df\u5c07\u66f4\u65b0\u8cc7\u6599\u4fdd\u8b77\u6cd5\u3000\u9810\u8a08\u660e\u5e74\u5b8c\u6210"},"content":{"rendered":"<p>\u6b50\u76df\u5c07\u5c31\u5f37\u5316\u500b\u4eba\u6b0a\u5229\u3001\u78ba\u4fdd\u6b50\u76df\u55ae\u4e00\u5e02\u5834\u5167\u7684\u8cc7\u6599\u81ea\u7531\u6d41\u901a\u3001\u66f4\u65b0\u8b66\u5bdf\u8207\u72af\u7f6a\u53f8\u6cd5\u9818\u57df\u7684\u8cc7\u6599\u4fdd\u8b77\u898f\u7bc4\u3001\u78ba\u4fdd\u8cc7\u6599\u50b3\u9001\u5230\u6b50\u76df\u5916\u90e8\u6642\u7684\u9ad8\u5ea6\u5b89\u5168\u6027\u3001\u4ee5\u53ca\u63d0\u5347\u57f7\u6cd5\u6548\u7387\u7b49\u5404\u65b9\u9762\u5236\u5b9a\u65b0\u6cd5\u3002<\/p>\n<p>\u6b50\u76df(EU)\u9031\u56db(11\/4)\u5ba3\u5e03\uff0c\u5c07\u66f4\u65b0\u73fe\u884c\u7684\u300c\u8cc7\u6599\u4fdd\u8b77\u6cd5\u6848\u300d\uff0c\u4ee5\u5c0d\u7db2\u969b\u7db2\u8def\u4e0a\u7684\u500b\u8cc7\u9032\u884c\u66f4\u56b4\u8b39\u7684\u4fdd\u8b77\u4f5c\u696d\u3002<\/p>\n<p>\u6b50\u76df\u73fe\u884c\u7684\u300c\u8cc7\u6599\u4fdd\u8b77\u6cd5\u6848\u300d\u662f\u65bc1995\u5e74\u5236\u5b9a\uff0c\u8ddd\u4eca\u5df2\u670915\u5e74\u7684\u6b77\u53f2\uff0c\u96a8\u8457\u7db2\u8def\u6280\u8853\u7684\u6301\u7e8c\u9032\u5c55\uff0c\u4ee5\u53ca\u5404\u985e\u7684\u500b\u4eba\u96b1\u79c1\u6b0a\u4fb5\u72af\u4e8b\u4ef6\u5c64\u51fa\u4e0d\u7aae\uff0c\u6b50\u76df\u6c7a\u5b9a\u5c55\u958b\u6b64\u6cd5\u6848\u7684\u66f4\u65b0\u4f5c\u696d\u3002<\/p>\n<p>\u6b50\u76df\u8868\u793a\uff0c\u4fdd\u8b77\u500b\u4eba\u8cc7\u6599\u662f\u57fa\u672c\u4eba\u6b0a\u3002\u70ba\u78ba\u4fdd\u6b64\u6b0a\u5229\uff0c\u9700\u8981\u660e\u78ba\u4e14\u4e00\u81f4\u7684\u8cc7\u6599\u4fdd\u8b77\u898f\u7bc4\u3002\u540c\u6642\uff0c\u6cd5\u5f8b\u4e5f\u8981\u8ddf\u5f97\u4e0a\u65b0\u6280\u8853\u8207\u5168\u7403\u5316\u767c\u5c55\u7684\u8173\u6b65\u3002<\/p>\n<p>\u6b50\u76df\u5c07\u5c31\u5f37\u5316\u500b\u4eba\u6b0a\u5229\u3001\u78ba\u4fdd\u6b50\u76df\u55ae\u4e00\u5e02\u5834\u5167\u7684\u8cc7\u6599\u81ea\u7531\u6d41\u901a\u3001\u66f4\u65b0\u8b66\u5bdf\u8207\u72af\u7f6a\u53f8\u6cd5\u9818\u57df\u7684\u8cc7\u6599\u4fdd\u8b77\u898f\u7bc4\u3001\u78ba\u4fdd\u8cc7\u6599\u50b3\u9001\u5230\u6b50\u76df\u5916\u90e8\u6642\u7684\u9ad8\u5ea6\u5b89\u5168\u6027\u3001\u4ee5\u53ca\u63d0\u5347\u57f7\u6cd5\u6548\u7387\u7b49\u5404\u65b9\u9762\u5236\u5b9a\u65b0\u6cd5\u3002<\/p>\n<p>\u6b50\u76df\u4e26\u6b61\u8fce\u76f8\u95dc\u55ae\u4f4d\u8207\u4e00\u822c\u6c11\u773e\u65bc\u660e\u5e741\u670815\u65e5\u4ee5\u524d\uff0c\u5c0d\u65b0\u6cd5\u6848\u63d0\u51fa\u5efa\u8b70\u3002\u6839\u64da\u5404\u65b9\u9762\u7684\u610f\u898b\u8207\u8a0e\u8ad6\uff0c\u6b50\u76df\u5c07\u65bc\u660e\u5e74\u63d0\u51fa\u65b0\u7684\u8cc7\u6599\u4fdd\u8b77\u6cd5\u6848\uff0c\u4ea4\u7531\u6b50\u6d32\u8b70\u6703\u5be9\u6838\u3002<\/p>\n<p>(\u7de8\u8b6f\/ <a target=\"_blank\" href=\"http:\/\/www.ithome.com.tw\/itadm\/article.php?c=64342\" rel=\"noopener\">iThome \u8303\u7720<\/a>) <br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6b50\u76df\u5c07\u5c31\u5f37\u5316\u500b\u4eba\u6b0a\u5229\u3001\u78ba\u4fdd\u6b50\u76df\u55ae\u4e00\u5e02\u5834\u5167\u7684\u8cc7\u6599\u81ea\u7531\u6d41\u901a\u3001\u66f4\u65b0\u8b66\u5bdf\u8207\u72af\u7f6a\u53f8\u6cd5\u9818\u57df\u7684\u8cc7\u6599\u4fdd\u8b77\u898f\u7bc4\u3001\u78ba\u4fdd\u8cc7\u6599\u50b3\u9001\u5230\u6b50 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-981","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=981"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/981\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}