個資法施行細則,定義12項適當安全維護措施
I. 必要的組織
II. 界定個人資料範圍
III. 個人資料蒐集、處理或利用的程序
IV. 當事人行使權利的處理程序
V. 資料安全
VI. 資料稽核
VII. 人員管理及教育訓練
VIII. 設備管理
IX. 紀錄與證據之保存
X. 緊急應變措施及通報
XI. 改善建議措施
XII. 其他安全維護事項
10
BS 10012:2009 PIMSOverview
0 Introduction
0.1 Personal information management system
0.2 Data protection principles 4 Implementing and operating the PIMS
0.3 Notification 4.1 Key appointments
1 Scope 4.2 Identifying and recording uses of personal information
2 Terms, definitions and abbreviations 4.3 Training an awareness
2.1 Terms and definitions 4.4 Risk assessment
2.2 Abbreviations 4.5 Keeping PIMS up-to- date
3 Planning for a personal information management system (PIMS) 4.6 Notification
3.1 Establishing and managing the PIMS 4.7 Fair and lawful processing
3.2 Scope and objectives of the PIMS 4.8 Processing personal information for specified purposes
3.3 Personal information management policy 4.9 Adequate, relevant and not excessive
3.4 Policy content 4.10 Accuracy
3.5 Responsibility and accountability 4.11 Retention and disposal
3.6 Provision of resources 4.12 Individuals’ rights
3.7 Embedding the PIMS in the organization’s culture 4.13 Security issues
4.14 Transfer of personal information outside the EEA
4.15 Disclosure to third parties
4.16 Sub-contracted processing
4.17 Maintenance
5 Monitoring and reviewing the PIMS
5.1 Internal audit
5.2 Management review
6 Improving the PIMS
6.1 Preventive and corrective actions
6.2 Continual improvement
16
導入系統安全檢測機制
測試階段—HP WebInspect
– 智慧型的掃瞄引擎
• 快速掃瞄
• 廣泛的評估
• 精準的檢測結果
– 掃瞄時間顯著縮短
– 提高弱點掃瞄準確度
– 模擬駭客的攻擊行為
• Decision tree
• Analyses dynamically as an application changes
可信任的業界領先掃瞄技術
36
36
38.
導入系統安全檢測機制(續)
– Addressthe latest technologies
• Uniquely and accurately targets Web 2.0
– 可對客戶端的程式碼辨識安全弱點 V
• 自動解譯和靜態分析Adobe Flash
– 可在應用程式動態執行時發現弱點
– Automatically simulates real-world user
actions by executing code paths through
JavaScript and recording the intermediate
stages of a normal user experiences
Testing web applications like web applications, not like web sites
37
Who is looking up who's information
Who is looking up the medical records (nurse, doctor, health technician)?
Accessing a Very Important Person's (VIP) Information
Many times someone who is famous (actor, actress), or even the
management of the Hospital have special VIP codes attached to their
medical records, and every access to the VIP records is examined.
Where the Lookups Are Coming From
Sometimes, medical lookups are NOT allowed from outside the hospital.
Sometimes, the health care application will keep track of which nurses are
assigned to which Floor in the hospital, and will alert when a nurse who is
assigned to one floor, is looking up a patient from another floor.
59