|
Part I Cyber Security & Artificial Intelligence |
|
|
|
1 Problem Definition, Structure and Methodology |
|
|
3 | (1) |
|
|
4 | (6) |
|
1.2 Structure and Methodology |
|
|
10 | (4) |
|
1.3 Limitation of this Research |
|
|
14 | (1) |
|
|
15 | (4) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (18) |
|
|
22 | (3) |
|
2.2 Interconnectedness of Cyber Security, Personal Data, and AI |
|
|
25 | (2) |
|
|
27 | (6) |
|
2.4 Cyber Security -- Theory |
|
|
33 | (3) |
|
|
36 | (1) |
|
|
37 | (2) |
|
3 Artificial Intelligence and Law |
|
|
39 | (32) |
|
|
40 | (4) |
|
3.2 Artificial Intelligence and Law |
|
|
44 | (22) |
|
3.2.1 Artificial Intelligence Facilitating Law |
|
|
44 | (4) |
|
3.2.2 Law to Regulate Artificial Intelligence |
|
|
48 | (7) |
|
3.2.3 Further Challenges for Law and Artificial Intelligence |
|
|
55 | (11) |
|
|
66 | (2) |
|
|
68 | (3) |
|
|
71 | (26) |
|
|
72 | (8) |
|
4.2 Organisation for Economic Cooperation and Development |
|
|
80 | (2) |
|
4.3 Asia-Pacific Economic Cooperation |
|
|
82 | (1) |
|
4.4 Asia Pacific Privacy Authorities |
|
|
83 | (1) |
|
4.5 Association of South East Nations |
|
|
84 | (2) |
|
|
86 | (5) |
|
|
91 | (2) |
|
|
93 | (4) |
|
Part II Data Protection Law -- Asia |
|
|
|
|
97 | (36) |
|
|
98 | (6) |
|
|
104 | (5) |
|
5.2.1 Guarantee of Data Subject Rights |
|
|
105 | (1) |
|
5.2.2 Correction and Deletion of Personal Data |
|
|
106 | (2) |
|
5.2.3 Suspension of Personal Information |
|
|
108 | (1) |
|
5.2.4 Method of Exercising One's Rights |
|
|
108 | (1) |
|
5.3 Definition of Personal Information [ Data] |
|
|
109 | (1) |
|
5.4 Public and Private Application |
|
|
109 | (1) |
|
5.5 Data Protection Principles |
|
|
110 | (1) |
|
5.6 Processing of Personal Information and Consent |
|
|
110 | (7) |
|
5.6.1 Limitation to Processing |
|
|
114 | (1) |
|
5.6.2 Limitation to Processing [ Unique Identifier] |
|
|
114 | (1) |
|
5.6.3 Limitation on Visual Data Processing Devices |
|
|
115 | (1) |
|
5.6.4 Processing Limitation [ Consignment of Work] |
|
|
116 | (1) |
|
5.6.5 Limitation to Transfer Business Transfer |
|
|
117 | (1) |
|
5.6.6 Processor Oversight [ Supervision] |
|
|
117 | (1) |
|
5.7 Notification and Destruction |
|
|
117 | (2) |
|
|
119 | (2) |
|
5.9 Privacy Officer and Disclosure |
|
|
121 | (3) |
|
5.10 Regulator [ Commission] |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (2) |
|
|
127 | (1) |
|
5.14 Imposing a Penalty [ Fine] -- Damages |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
132 | (1) |
|
|
133 | (38) |
|
|
134 | (8) |
|
6.2 Definition of Personal Data |
|
|
142 | (1) |
|
|
143 | (1) |
|
6.4 Matching and Transfer of Personal Data |
|
|
144 | (2) |
|
|
146 | (3) |
|
6.5.1 Repeated Collections |
|
|
147 | (2) |
|
6.6 Erasing Personal Data [ Right to Be Forgotten] |
|
|
149 | (2) |
|
|
151 | (1) |
|
6.7 Controller [ Data User] |
|
|
151 | (1) |
|
6.8 Data User Returns and Register of Data Users |
|
|
152 | (2) |
|
6.9 Access and Correction of Personal Data |
|
|
154 | (2) |
|
6.10 Consent and Direct Marketing |
|
|
156 | (5) |
|
|
156 | (2) |
|
|
158 | (3) |
|
6.11 Privacy Commissioner |
|
|
161 | (3) |
|
|
162 | (1) |
|
6.11.2 Advisory Committee |
|
|
163 | (1) |
|
6.11.3 Standing Committee |
|
|
164 | (1) |
|
|
164 | (2) |
|
6.12.1 International Enforcement |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (2) |
|
|
169 | (2) |
|
|
171 | (26) |
|
|
172 | (3) |
|
7.2 Application and Scope |
|
|
175 | (1) |
|
7.3 Denning Personal Data |
|
|
176 | (1) |
|
7.4 Data Subject -- Rights |
|
|
177 | (6) |
|
|
178 | (5) |
|
7.5 Processing, Access and Quality of Personal Data |
|
|
183 | (2) |
|
7.6 Controller and Processor |
|
|
185 | (2) |
|
|
186 | (1) |
|
7.7 Transnational Transfer of Personal Data |
|
|
187 | (4) |
|
|
191 | (1) |
|
|
192 | (1) |
|
7.10 Crimes [ Cyber Security] |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (24) |
|
|
198 | (3) |
|
|
201 | (4) |
|
8.2.1 Right to Be Forgotten and Deletion |
|
|
203 | (2) |
|
8.3 Definition Personal Information |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
208 | (1) |
|
8.6 Processing and Consent |
|
|
209 | (2) |
|
8.7 Transferring Personal Information |
|
|
211 | (1) |
|
8.7.1 Extraterritorial Reach |
|
|
211 | (1) |
|
|
211 | (2) |
|
8.9 Data Impact Assessments |
|
|
213 | (2) |
|
|
215 | (1) |
|
|
216 | (2) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (28) |
|
|
222 | (6) |
|
|
228 | (2) |
|
9.3 Definition of Personal Data |
|
|
230 | (1) |
|
9.4 Rights of Data Subjects |
|
|
231 | (1) |
|
9.4.1 Right to Be Forgotten |
|
|
231 | (1) |
|
9.5 Public and Private -- Applicable |
|
|
231 | (1) |
|
9.6 Collection and Processing |
|
|
232 | (5) |
|
|
233 | (1) |
|
9.6.2 Non-government Agency |
|
|
234 | (1) |
|
9.6.3 Cross-Border Transfer of Personal Data |
|
|
235 | (2) |
|
|
237 | (2) |
|
|
238 | (1) |
|
9.7.2 Replying to a Data Subject |
|
|
239 | (1) |
|
|
239 | (2) |
|
|
240 | (1) |
|
|
241 | (4) |
|
|
241 | (2) |
|
9.9.2 Damages and Class Action |
|
|
243 | (2) |
|
|
245 | (1) |
|
|
245 | (2) |
|
|
247 | (2) |
|
|
249 | (12) |
|
|
250 | (3) |
|
10.2 Prevention of Cybercrime |
|
|
253 | (1) |
|
10.3 Definition of Personal Data |
|
|
253 | (1) |
|
|
254 | (2) |
|
10.4.1 Criminal Offences and Penalties |
|
|
256 | (1) |
|
10.5 Electronic Data Protection |
|
|
256 | (2) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (26) |
|
|
262 | (4) |
|
|
266 | (3) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
11.2.4 Prohibited Activities |
|
|
268 | (1) |
|
|
268 | (1) |
|
11.3 2007 Law on Information Technology |
|
|
269 | (4) |
|
11.3.1 Definition of Personal Data |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
11.4 Law on Protection of Consumer Rights [ LPCR] |
|
|
273 | (2) |
|
11.5 Law on Network Information Security [ LNIS] |
|
|
275 | (1) |
|
|
276 | (2) |
|
11.7 2018 Law on Cybersecurity [ LoC] |
|
|
278 | (6) |
|
11.8 Additional Law that Governs the Use of Personal Data |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (34) |
|
|
288 | (9) |
|
12.2 Principles of Personal Information Security |
|
|
297 | (2) |
|
12.3 Definition Personal Data |
|
|
299 | (2) |
|
|
301 | (1) |
|
|
302 | (1) |
|
12.6 Agency, Organisation & Controller - Responsibilities |
|
|
303 | (3) |
|
12.6.1 Security Impact Assessments |
|
|
305 | (1) |
|
12.6.2 Industry Regulation |
|
|
305 | (1) |
|
|
306 | (2) |
|
|
308 | (1) |
|
|
309 | (3) |
|
|
309 | (1) |
|
12.9.2 Information Infrastructure Operators |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
12.11 Proposed 2020 Law Reform |
|
|
313 | (2) |
|
|
315 | (2) |
|
|
317 | (4) |
|
Part III Data Protection Law -- North America |
|
|
|
|
321 | (36) |
|
|
322 | (5) |
|
13.2 Definition -- Personal Information |
|
|
327 | (5) |
|
|
332 | (4) |
|
13.4 Personal Information -- Index |
|
|
336 | (1) |
|
|
336 | (8) |
|
|
342 | (2) |
|
|
344 | (5) |
|
|
344 | (4) |
|
|
348 | (1) |
|
13.7 Electronic Documents |
|
|
349 | (1) |
|
13.8 Offences of an Organisation |
|
|
350 | (3) |
|
|
351 | (2) |
|
|
353 | (2) |
|
|
355 | (2) |
|
|
357 | (48) |
|
|
358 | (11) |
|
14.2 The Federal Trade Commission Act |
|
|
369 | (10) |
|
14.3 Health Insurance Portability and Accountability Act |
|
|
379 | (1) |
|
14.4 Definition Personal Data |
|
|
380 | (1) |
|
|
381 | (2) |
|
14.6 Collection, Correction, Disclosure, Access and Deletion |
|
|
383 | (1) |
|
14.7 Controller and Processors |
|
|
383 | (1) |
|
|
384 | (4) |
|
14.8.1 International Effect |
|
|
385 | (1) |
|
|
386 | (1) |
|
14.8.3 Do Not Call Registry |
|
|
387 | (1) |
|
14.9 States of California and New York |
|
|
388 | (9) |
|
14.9.1 California's New Privacy Laws---2020 |
|
|
388 | (7) |
|
|
395 | (2) |
|
14.10 Bilateral---Multilateral Approach |
|
|
397 | (1) |
|
|
398 | (2) |
|
14.12 A New Decade and Cyber Security |
|
|
400 | (1) |
|
|
401 | (2) |
|
|
403 | (2) |
|
15 Comparison, Challenges and a Way Forward |
|
|
405 | (50) |
|
|
406 | (3) |
|
15.2 Application to Public and Private Sectors |
|
|
409 | (2) |
|
15.3 Definition Personal Data -- Information |
|
|
411 | (7) |
|
|
418 | (5) |
|
|
423 | (1) |
|
15.6 Right to be Forgotten, Correction and Deletion |
|
|
424 | (9) |
|
|
433 | (3) |
|
15.8 Challenges and a Way Forward |
|
|
436 | (16) |
|
|
452 | (2) |
|
|
454 | (1) |
Index |
|
455 | |