• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 23
  • 2
  • 2
  • Tagged with
  • 27
  • 27
  • 14
  • 12
  • 9
  • 9
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

秘密證人保護制度

柯孟君 Unknown Date (has links)
「秘密證人」之稱謂在我國法制上最早係源於81年7月29日修正之檢肅流氓條例(原名稱:動員戡亂時期檢肅流氓條例)第十二條,然在司法院釋字第三八四號解釋以侵害被告對質詰問權為由將其宣告違憲後,秘密證人制度之存廢遂成為一大爭議。事實上,如從證人保護觀點將秘密證人制度理解為一種受危害證人之保護措施,在我國許多附屬刑事訴訟法例如組織犯罪防制條例、證人保護法等規定中,仍處處可見其影子;另一方面,在司法院釋字第三八四號、第五八二號、第六三六號解釋相繼問世,被告的對質詰問權已確定成為憲法基本權之保障範疇,而日益受到重視,然而,秘密證人制度與被告對質詰問權的衝突也愈趨明顯;本文認為,當被告的對質詰問權愈受到重視,證人權利的保護亦應相對地受到更多關注。基此,本文擬從秘密證人保護制度的法理基礎出發,從憲法的人性尊嚴、基本權利保障、國家保護義務及基本權衝突等觀點,尋找秘密證人保護制度之法理依據;另考察外國立法例,如德國法的三階段保護理論、歐洲人權法院的秘密證人相關案例等比較法上秘密證人的相關規範及實務見解,透過其與我國秘密證人保護制度的比較,檢討我國秘密證人保護制度待改進之處,並觀察歐洲人權法院判決在秘密證人相關案例上之見解,尋找秘密證人保護與被告對質詰問權的調和方向,進而對我國現行法有關秘密證人的規範如何解釋適用等問題嘗試提出解決之道,再評析我國實務見解,俾在現行法規範架構下謀求個案正義的實現,最後再針對我國秘密證人保護制度的問題提出立法論上的建議。
2

我國營業秘密法對勞動權益之影響

曾于珊 Unknown Date (has links)
基於法律之制定乃反映社會堅固的價值觀,又營業秘密的保護建立在營業秘密法制之規範上,故就其國內、外法制之定義、立法目的(包含國際條約、美、德、我國)、性質、構成要件、範疇、侵害類型與權利歸屬之探討,使對營業秘密法所以施行之來龍去脈能有粗淺而廣泛的認識。 次從私法自治到契約自由,討論營業秘密之概念落實在規範勞資關係之定型化契約、工作規則中,輔以民法中僱傭關係之拘束力,探討經濟弱勢者:勞工,因締約力量不平等之疑慮,在勞動契約實體上及程度上所受之影響;又企業要求員工簽署保密契約或是在一般的僱傭契約當中加上競業禁止條款,是目前存在於業界普遍的作法;然就保護營業秘密於憲法基本權之互為矛盾下,又涉及對員工流動性的限制,保密與競業禁止兩大條款在勞資關係所造成之衝突、難題和後續妥當性的問題。 最後以個案分析之研究方法對文獻之蒐集和理論邏輯之推演作一印證:希望藉由法制爭議、司法實務及社會觀察之角度探討當政府為企業於國際社會之立足之地而實施營業秘密法,又在「服務經濟」將取代「製造經濟」,「知識工作者」也取代傳統勞工,逐漸形成「知識社會」之際,其涉及勞工之勞動權益、就業自由與生存權為何,僱傭關係之轉變又是怎樣的趨勢。 在文獻整理與司法個案之相互映證後,能對營業秘密法實施的必要性、勞動權益的影響範圍及在勞動契約中之面貌以及與其他法律之比較、競合等研究目的有一清晰的思考邏輯及論證,並能有所領悟:近二百年來的無形資產觀瀰漫於企業與個人間,透過國族主義的施壓、國際條約的規範、立法而逐漸在勞工與雇主心中建立了知識有價的鞏固觀念,更賦予了雇主對受雇人非職務上營業秘密的法定實施權,然云云眾生(勞工)處於都市叢林之零和遊戲中,富裕的資本、優渥的條件是可望而不可及的,只為圖溫飽卻必須出賣自我之時間、體力、精神甚或人格顯而易見的,足以證明勞工處境之困窘愈發嚴重。
3

營業秘密保護與不當使用營業秘密保護規範之競合 / The Competitions between Trade Secret Protection and the Misuse of Trade Secret Protection

陳璽仲, Chen, Hsi Chung Unknown Date (has links)
隨著科技與網路之進步,不當竊取他人營業秘密之情況越趨嚴重,因此實務上開始出現對營業秘密加強保護的聲浪,法制上也不斷往加強營業秘密排他性之方向修法,但在此趨勢下,市場上不當使用營業秘密保護之情況也逐漸盛行。美國學界便提出警告,若給予營業秘密過強的排他權,導致營業秘密保護成為權利人限制競爭之武器,將阻礙社會的進步,社會福利並受到嚴重的危害。本文藉由討論營業秘密之保護理論與不當使用營業秘密保護規範之情況,探討其間之關係,研究不當使用營業秘密保護之根本原因,並嘗試提出解決辦法,作為預防潛在或解決目前已發生的問題。 本文於第二章先從營業秘密之保護理論談起,藉由探討各種營業秘密之保護理論,並分析其優點與缺點,作為之後分析不當使用營業秘密保護之素材。第三章,配合美國實務案例、法制情況說明不當使用營業秘密保護之主要態樣,並以法學及經濟學方法討論其與營業秘密保護理論之關聯,試圖找出營業秘密保護受到不當使用之原因。第四章及第五章,藉由檢視我國目前的法制規範、行政與司法實務操作方式,配合實務上曾發生過案例,提出我國現存及潛在的問題,並提供改善或法制方向之建議。 / As the progress of technology and internet, the trade secret misappropriation cases become more severe nowadays. Therefore, the trade secret owners began to agitate for strengthening the protection of trade secret, and to keep legislators busy amending the law toward enhancing the exclusivity of trade secret. However, under the trend of strengthening trade secret protection, the situation of misusing trade secret protection has increased drastically. In addition to that, some American scholars have warned that once the legal systems of trade secret protection become the weapons to restrict competition, it will not only impede social progression but it will also do harm to the social welfare. This study reviews various theories of trade secret protections and cases that misused those protections, and provides analyses of the relation between them. Moreover, this study seeks to propose some suggestions to prevent the potential problems and offer some possible solutions for the problems which have occurred. In Chapter II, the study reviews the trade secret protection theories and analyzes the pros and cons of each theory. In chapter III, this thesis introduces the major types of misusing trade secret protection with the U.S. cases and U.S. legal systems. Furthermore, in this chapter, the study applies different methods of the laws and economics in order to analyze the relation between trade secret protection theories and different types of misusing trade secret protection. Moreover, this chapter aims to find the fundamental reasons why the trade secret protection was being misused. In chapter IV, the study addresses the actual and potential misused problems in Taiwan by examining Taiwanese law systems, practices, and cases. Lastly, in chapter V, several suggestions for solving the present problems and improving future legal direction were made to conclude in the current study.
4

中國大陸與巴西商業秘密法律保護制度之比較研究 =Comparative study on the legal system protecting trade secret between mainland China and Brazil / Comparative study on the legal system protecting trade secret between mainland China and Brazil

劉璐 January 2018 (has links)
University of Macau / Faculty of Law
5

営業秘密侵害罪について

林, 尚儒 23 March 2020 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(法学) / 甲第22213号 / 法博第246号 / 新制||法||168(附属図書館) / 京都大学大学院法学研究科法政理論専攻 / (主査)教授 髙山 佳奈子, 教授 塩見 淳, 教授 安田 拓人 / 学位規則第4条第1項該当 / Doctor of Laws / Kyoto University / DGAM
6

多秘密視覺密碼之研究 / A study on visual cryptography with multiple secrets

朱致諺, Chu, Chih Yen Unknown Date (has links)
視覺密碼不同於傳統密碼學,在於視覺密碼不需經過繁雜的計算,而是利用分享影像間的疊合,再透過人類視覺得到原先所要隱藏的秘密影像。傳統視覺密碼被用來設計在隱藏單張秘密影像,但對於隱藏多張秘密影像非常沒有效率,因此本文希望僅以兩張分享影像間的疊合,使用上下或左右平移的方式解密更多張疊合後的秘密影像。 多數的多秘密視覺密碼技術,隱藏的數量侷限在分享影像旋轉的次數,即使目前已有技術可隱藏到n張秘密影像,但對比及形狀比例皆會隨著隱藏的數量作改變。對比決定影像清晰度的關鍵因素;像素擴展決定疊合影像的大小,因此這兩項一直是視覺密碼重要的研究指標。本文主要貢獻在於:(1) 隱藏的數量不受侷限 (2) 對比、像素擴展及形狀比例不隨著隱藏數量改變(3) 產生最小面積的疊合影像。 / Visual cryptography is different from the conventional cryptography, because it can be decrypted directly by human visual system without any complex computation. Conventional visual secret sharing is designed for hiding only single secret image, and it is inefficient to hide numerous secret images. In this thesis, we introduce a new visual secret sharing scheme which requires only two share images, and by shifting one of them up to down or left to right, our new scheme can decrypt more secret images. In most of the current researches on multiple secrets visual cryptography, the amount of the images that can be hidden is limited by the number of times that a sharing image can be rotated. Although some researches provide ways to hide n secret images where n can be any value, the contrast and the ratio of shape will decrease when n is large. Because the contrast determines the image’s clarity and pixel expansion determines the size of composite image, they are two important indicators of researches on visual secret sharing. The main contributions of this thesis are: Firstly, the amount of secret images to be hidden can be any value n. Secondly, the contrast, pixel expansion and the ratio of shape is independent of n, which means that they will remain the same for different n. Thirdly, when hiding the same amount of secret images, our scheme has the least size of composite image (ie., the size of share B) comparing with other schemes.
7

智慧財產民事案件之證據保全與秘密保護-以秘密保持命令為中心 / 無

陳增懿 Unknown Date (has links)
民事訴訟法新修正後,新增了確定事、物現狀類型之證據保全,使當事人得利用法院調查蒐集之事證資料,以了解事實或物體之現狀。而為配合智慧財產案件其事證極易隱匿之性質,智慧財產案件審理法第18條第4項規定賦予證據保全制度直接強制力之效果,使證據保全成為智慧財產案件訴訟中具有直接強制力之蒐證手段。惟於智慧財產案件中,尤其是專利侵權案件,兩造多具有商業上之強烈競爭關係,且產品之競爭週期短暫,有可能產生一方當事人以證據保全之名義,實則卻係欲窺探對方商業或技術上營業秘密之行為,因此對於智慧財產證據保全案件之秘密保護即有其必要。而因美國和日本法制均設有秘密保持命令之制度,且為緩和秘密保護與訴訟審理主義間之衝突,故智慧財產案件審理法乃參照日本法之制度,引進秘密保持命令制度。依照目前我國智慧財產案件審理法第11至第15條之規定,秘密保持命令制度可能有以下若干值得討論之問題:秘密保持命令於證據保全程序之應用、法院對於秘密保持命令之審理於裁判、受秘密保持命令拘束之主體範圍以及違反秘密保持命令之刑事責任等,本論文即擬基於前開問題對於秘密保持命令制度進行介紹和提出未來展望。
8

哥老會的起源及其發展

徐安琨, XU, AN-KUN Unknown Date (has links)
本文凡一冊,在研究內容上,所要探討的問題是: 一、哥老會的起源與擴張。一個秘密會黨的出現,必定有其孕育的環境,本文就人口 流動的方向來說明哥老會的起源源和移民的關係。同時,藉湘軍的招募與裁撤以解釋 哥老會擴張的因素。 二、哥老會的內部結構。探討000的組織內容,並且藉其成員的社會階層狀況與領 袖群的結構說明哥老會本身的性質。 三、哥老會的外在行為。哥老會在清官方文書常稱為哥匪,相信必與其行為有直接關 係。本文除了論述哥老會成員平時的一般行徑外,更經由他們暴亂的行為來探討其宗 旨理念。另外,再就近代革命思想的滲入方面,解釋哥老會本質是否真正的蛻變。 本文結構,共分六章十四節 一、緒論。 二、哥老會的起源:(1)近人對哥老會起源研究之異說。(2)移民入川與嘓嚕子 的興起。(3)嘓嚕子的組織型態及其性質。(4)嘓嚕子的演變與哥老會的出現。 三、哥老會內擴展的因素:(1)勇營的招募。(2)勇營的裁撤。(3)優越的主 觀條件。 四、哥老會的組織與內容:(1)組織型態與結構。(2)成員的類別與意義。(3 )領袖群的產生方式及其社會特徵。(4)名異實同的流派。 五、哥老會的活動與蛻變:(1)平時的活動與地理分布狀況。 (2)暴亂行為及其宗旨理念。 (3)近代政治思想的滲入與本質的蛻變。 六、結論。
9

一個可降低Gentry全同態加密演算法公鑰個數之提案 / An Improvement of Gentry’s “Fully Homomorphic Encryption Scheme” by Reducing the Number of Public Keys

陳漢光 Unknown Date (has links)
"全同態加密法"(Fully Homomorphic Encryption (FHE))一詞的介紹以及架構源於西元2009年由Gentry所提出。它讓加密後的密文執行特定的運算再將其解密即可得出該對應的明文運算結果,除此之外,全同態與同態最大的不同是它允許兩種或是多種以上的運算元進行資料運算,期間必須可以處理大量的資料並且保護其資料隱私性使其無洩漏之虞。也因為上述特點使得它可被廣泛使用在許多資料庫或是資料儲存上的應用,像是ASP、雲端運算或是雙方相等性驗證上,然而在Gentry的全同態加密中,它需要大量的空間來儲存所需要的公鑰,因此在實作上仍有一定的難度。為了解決上述問題,本文提供了一種新的改良方案使其更有效率來達到全同態加密的實作性,除此之外,我們也會在文章中提出安全性分析來證明本改良方案並不會對安全性造成影響,並且提出系統效能測試,說明本方案除了可減少公鑰儲存空間之外,在時間上,更可降低公鑰生成以及系統加密的時間,讓其全同態運算更具效率。 / C. Gentry in 2009 proposed the first practical scheme which can compute arbitrary functions of encrypted data. This scheme is named “Fully Homomorphic Encryption (FHE)”. FHE allows a worker without the secret decryption key to compute any result of the data on one hand and still keep the data privacy on the other hand. It can be widely used in data storage application or database application, such as ASP, cloud computing and two-party equality testing. However, one drawback of Gentry’s fully homomorphic encryption scheme is that the size of public keys used in this system is extremely large. This means that a lot of space is required in order to store those public keys. This problem causes Gentry’s FHE hard to be implemented. In this thesis, we address the problem above, and give an improvement encryption scheme. Our improvement scheme needs less space to store the public keys which also makes the new scheme more efficient than Gentry’s original scheme. We also give a rigorous security proof to show that our improvement scheme is as secure as Gentry’s original scheme. A system performance test is also provided which shows that our scheme can not only reduce the numbers of public keys, but also reduce the time for public key generation and for encryption. Therefore, our improvement scheme can make fully homomorphic encryption more practical.
10

競業禁止和營業秘密之實證研究 -以台北地院民事判決為例(2012年到2015年) / Non-competition and Trade Secret Empirical Research

莊苡婷, Chuang, Yi Ting Unknown Date (has links)
營業秘密係全球化時代下重要的產物,若接觸過此營業秘密的員工在離職後,將此高度價值的商業機密洩漏出去,公司將會蒙受極大的損失,因此公司會想防範離職員工竊取或利用其營業秘密,其中,競業禁止即著重於與員工事先先簽訂好相關的條款,予以箝制員工恣意洩漏其極具經濟價值的商業資訊,以保障公司能更努力投入研發等創新活動,並且活絡市場促進科技和商業發展。 營業祕密之保護和競業禁約款都在於維持雇主之競爭力,但從其構成要件和性質來觀察卻不盡相同,本文在競業禁止部分係著重在僱傭關係結束後之討論,而營業秘密之部分則是包括在職期間和離職後兩種情況,而競業禁止和營業秘密這兩者在某程度之關聯上,除了基本之理論介紹,本文亦會從台北地方法院近三年之相關判決加以探討,藉由統計方法中的量化和質化研究,分析並了解營業秘密和競業禁止之互動關係,並結合理論和實務之運作,提出一些有關於實務上運作之建議。 / Business secrets are the production under the era of globalization. In addition, it start playing an important role on business development. After employees who have been touched the business secrets had left their jobs might lead to leaking out highly valuable commercial secrets making the company suffer great losses. Company will protect their trade secrets and prevent economic losses by asking employees to sign non-competition clauses. With the protection, companies are willing to invest more assets and money on research and development, making market more active. Eventually, these kinds of clauses and precautions can promote technological and commercial environment and development. Trade secret protection and non-competition clauses can maintain competitiveness of employers. But trade secret and non-competition are not the same due to the original source of law and elements. This thesis related to the non-competition clauses are focusing on the periods of the end of the employment relationship. But trade secrets divided into two situations including employment periods and after-service periods. In fact, non-competition and trade secrets have a certain extent of connections. In addition to the basic theoretical introduction, the thesis explored and extracted judgment from the Taipei District Court ruling during the past three years. With methods of Statistical Analysis. We can understand the relationship and interaction between trade secrets and non-competition. By combining the theories with empirical research, we can speculate the results and conclude the suggestions about the operation of the practice.

Page generated in 0.0132 seconds