题名

賦予當事人個人資料財產權地位之優勢與侷限:以美國法為中心

并列篇名

The Strengths and Weaknesses for Granting Property Rights in Personal Information to Data Subjects: Focusing on the U.S. Laws

DOI

10.6199/NTULJ.201809_47(3).0001

作者

翁清坤(Ching-Kuen Ueng)

关键词

個人資料 ; 隱私 ; 客戶名單 ; 大數據 ; 財產權 ; 營業秘密 ; 公開權 ; 自由轉讓 ; 人性尊嚴 ; personal information ; privacy ; customer list ; big data ; property right ; trade secret ; right of publicity ; free alienability ; human dignity

期刊名称

臺大法學論叢

卷期/出版年月

47卷3期(2018 / 09 / 01)

页次

941 - 1051

内容语文

繁體中文

中文摘要

因科技發展,個人資料輕易被大量蒐集、運用、甚至交易,乃易遭濫用。美國學者因此主張,應賦予個資「財產權」地位,而全面賦予當事人對於各種類型個資之「控制權」。賦予個資財產權地位,當事人得評估是否、何時、對誰揭露或分享其何種個資,而平等參與個資供需交易的運作,且可避免資料蒐集者未支付對價的「搭便車」行為,以減緩個資遭濫用。惟賦予個資財產權地位,卻也引起各種質疑。尤其,個資固有財產利益之面向,但亦有精神利益之面向,不應將涉及當事人人性尊嚴與人格發展的個資因出售或授權使用而永久喪失控制權。當事人擁有其個資上之財產權之主張,可能為一種迷思。美國雖有極少數州立法將個資中之「基因資訊」界定為當事人之財產權,但其適用範圍卻僅侷限於保險用途。相反地,美國法院則認定,當事人對於其個資並無財產權;而包括客戶名單等個資在內之「資料庫」,法院卻認定,乃業者之營業秘密及財產。因賦予個資財產權地位之可行性堪慮,乃有呼籲美國應採行歐盟立法模式,而全面賦予當事人對於各種類型個資之控制權。而在臺灣,個資法既已全面賦予當事人對於各種類型個資之控制權,故縱未另賦予個資財產權地位,惟其理論主張與實務運作,仍有值得臺灣借鏡之處。

英文摘要

A large amount of personal information is easily collected, processed, used, shared, and even transacted as a result of technological progress. However, it leads to a threat to consumer privacy. Therefore, some American scholars proposed that property rights in personal information should be granted to individuals to bargain over which personal information to disclose to whom for what purposes. However, since such a proposal to grant property rights in personal information to individuals face many challenges, it is doubtful about its feasibility. In particular, a crucial disparity takes place between the traditional property law supporting free alienability and personal information protection requiring inalienability to protect human dignity and personhood. It is likely a myth that a data subject owns personal information about himself/herself. Although there are very few state statutes in the Unites States defining genetic information as an unique property or exclusive property owned by a data subject, its applicable scope is limited to be used only for the insurance purpose. However, the U.S. courts ruled that property rights in personal information are not owned by data subjects and, instead, that databases, including customer lists and personal information, are trade secrets and properties owned by data collectors. As the feasibility to grant property rights in personal information to individuals is doubtful, there is an advocate that the U.S. should adopt European Union legislation model to comprehensively grant control to individuals to lessen the misuse of personal information. In contrast, Taiwan has passed the Personal Information Protection Act so that data subjects can have comprehensive control over the use of their personal information. Therefore, although it is not necessary to grant property rights in personal information to individuals, Taiwan can still learn from the theories and adjudications relating to the propertization of personal information to avoid the invasion of privacy.

主题分类 社會科學 > 法律學
参考文献
  1. 翁清坤(2013)。告知後同意與消費者個人資料之保護。臺北大學法學論叢,87,217-322。
    連結:
  2. 翁清坤(2010)。論個人資料保護標準之全球化。東吳法律學報,22(1),1-60。
    連結:
  3. 翁清坤(2016)。網路上隱私權政策之效力:以美國法為中心。臺大法學論叢,45(1),151-248。
    連結:
  4. 劉靜怡(2012)。社群網路時代的隱私困境:Facebook 為討論對象。臺大法學論叢,41(1),1-70。
    連結:
  5. Acquisti, A.,John, L. K.,Loewenstein, G.(2013).What Is Privacy Worth?.Journal of Legal Studies,42,249-274.
  6. Aspatore(Ed.)(2012).Managing Intellectual Property in Cyberspace.Eagan, MN:Thomson Reuters.
  7. Aspatore(Ed.)(2014).Understanding Developments in Cyberspace Law.Eagan, MN:Aspatore.
  8. Ayres, I.,Talley, E.(1995).Solomonic Bargaining: Dividing a Legal Entitlement to Facilitate Coasean Trade.Yale Law Journal,104,1027-1116.
  9. Balaban, T. L.(2009).Comprehensive Data Privacy Legislation: Why Now is the Time?.Case Western Reserve Journal of Law, Technology & the Internet,1(1),1-35.
  10. Bambauer, J. R.(2015).All Life Is an Experiment. (Sometimes It Is a Controlled Experiment.).Loyola University Chicago Law Journal,47(2),487-513.
  11. Banta, N. M.(2017).Property Interests in Digital Assets: The Rise of Digital Feudalism.Cardozo Law Review,38(3),1099-1157.
  12. Barnhizer, D. D.(2006).Propertization Metaphors for Bargaining Power and Control of the Self in the Information Age.Cleveland State Law Review,54,69-113.
  13. Baron, J. B.(2012).Property as Control: The Case of Information.Michigan Telecommunications and Technology Law Review,18(2),367-418.
  14. Barrad, C. M. V.(1993).Genetic Information and Property Theory.Northwestern University Law Review,87(3),1037-1086.
  15. Bartow, A.(2000).Our Data, Ourselves: Privacy, Propertization, and Gender.University of San Francisco Law Review,34(4),663-704.
  16. Basho, K.(2000).The Licensing of Our Personal Information: Is It a Solution to Internet Privacy?.California Law Review,88(5),1507-1546.
  17. Belgum, K. D.(1999).Who Leads at Half-time?: Three Conflicting Visions of Internet Privacy Policy.Richmond Journal of Law & Technology,6(1)
  18. Bergelson, V.(2003).It's Personal But Is It Mine? Toward Property Rights in Personal Information.U.C. Davis Law Review,37(2),379-452.
  19. Bloustein, E. J.(1964).Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser.New York University Law Review,39(6),962-1007.
  20. Bovenberg, J. A.(2006).Property Rights in Blood, Genes & Data: Naturally Yours?.Leiden, Holland:Martinus Nijhoff.
  21. Bregman-Eschet, Y.(2006).Genetic Databases and Biobanks: Who Controls Our Genetic Privacy?.Santa Clara Computer and High Technology Law Journal,23(1),1-54.
  22. Brookman, J.(2015).Protecting Privacy in an Era of Weakening Regulation.Harvard Law & Policy Review,9(2),355-374.
  23. Burdon, M.(2010).Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws.Santa Clara Computer and High Technology Law Journal,27(1),63-130.
  24. Calabresi, G.,Melamed, A. D.(1972).Property Rules, Liability Rules, and Inalienability: One View of the Cathedral.Harvard Law Review,85(6),1089-1128.
  25. Chisum, D. S.,Ochoa, T. T.,Ghosh, S.,LaFrance, M.(2011).Understanding Intellectual Property Law.New York, NY:LexisNexis.
  26. Chlapowski, F. S.(1991).The Constitutional Protection of Informational Privacy.Boston University Law Review,71(1),133-160.
  27. Cofone, I. N.(2017).The Dynamic Effect of Information Privacy Law.Minnesota Journal of Law, Science & Technology,18(2),517-547.
  28. Cohen, J. E.(2000).Examined Lives: Informational Privacy and the Subject as Object.Stanford Law Review,52(5),1373-1438.
  29. Cooter, R. D.,Ulen, T.(2004).Law and Economics.Upper Saddle River, NJ:Prentice Hall.
  30. Cranor, L.,Frischmann, B.,Harkins, R.,Nissenbaum, H.(2014).Spring Symposium: Data Privacy & Transparency in Private and Government Data Collection.Cardozo Arts & Entertainment Law Journal,32(3),781-838.
  31. Cuaresma, J. C.(2002).The Gramm-Leach-Bliley Act.Berkeley Technology Law Journal,17(1),497-518.
  32. Cunningham, M.(2013).Diminishing Sovereignty: How European Privacy Law Became International Norm.Santa Clara Journal of International Law,11(2),421-456.
  33. Cunningham, M.(2012).Privacy in the Age of the Hacker: Balancing Global Privacy and Data Security Law.George Washington International Law Review,44(4),643-696.
  34. DeMarco, D. A.(2006).Understanding Consumer Information Privacy in the Realm of Internet Commerce: Personhood and Pragmatism, Pop-Tarts and Six-Packs.Texas Law Review,84(4),1013-1064.
  35. Determann, L.(2012).Social Media Privacy: A Dozen Myths and Facts.Stanford Technology Law Review,2012(7)
  36. Dymek, A.(2000).A Clash Between Commercial Speech and Individual Privacy: U.S. West v. FCC.Utah Law Review,2000(3),603-643.
  37. Elkin-Koren, N.,Salzberger, E. M.(2004).Law, Economics and Cyberspace: The Effects of Cyberspace on the Economic Analysis of Law.Cheltenham, England:Edward Elgar Pub.
  38. Evans, C.(2012).It's the Autonomy, Stupid: Political Data-Mining and Voter Privacy in the Information Age.Minnesota Journal of Law, Science & Technology,13(2),867-898.
  39. Executive Office of the President. (2014). Big Data: Seizing Opportunities, Preserving Values. Retrieved from https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
  40. Fairclough, B.(2016).Privacy Piracy: The Shortcomings of the United States' Data Privacy Regime and How to Fix.Journal of Corporation Law,42(2),461-480.
  41. Goldman, D.(2006).I Always Feel Like Someone is Watching Me: A Technological Solution for Online Privacy.Hastings Communications and Entertainment Law Journal,28(3),353-408.
  42. Green, D. A.(2009).Indigenous Intellect: Problems of Calling Knowledge Property and Assigning it Rights.Texas Wesleyan Law Review,15(2),335-356.
  43. Hagel, J., III,Rayport, J. F.(1997).The Coming Battle for Customer Information.Harvard Business Review,1997,53-65.
  44. Hahn, R. W.,Layne-Farrar, A.(2002).The Benefits and Costs of Online Privacy Legislation.Administrative Law Review,54(1),85-172.
  45. Halijan, D. F.(2001).The Past, Present, and Future of Trade Secrets Law in Tennessee: A Practitioner's Guide Following the Enactment of the Uniform Trade Secrets Act.University of Memphis Law Review,32(1),1-44.
  46. Hall, M. A.(2010).Property, Privacy, and the Pursuit of Interconnected Electronic Medical Records.Iowa Law Review,95(2),631-664.
  47. Hemnes, T.(2012).The Ownership and Exploitation of Personal Identity in the New Media Age.John Marshall Review of Intellectual Property Law,12(1),1-39.
  48. Hirsch, D.D.(2006).Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law.Georgia Law Review,41(1),1-64.
  49. Hirsch, D.D.(2014).The Glass House Effect: Big Data, the New Oil, and the Power of Analogy.Maine Law Review,66(2),373-396.
  50. Holland, H. B.(2010).Privacy Paradox 2.0.Widener Law Journal,19(3),893-932.
  51. Humbach, J. A.(2012).Privacy and the Right of Free Expression.First Amendment Law Review,11(1),16-89.
  52. Information Commissioner's Office (ICO). Big data, Artificial Intelligence, Machine Learning and Data Protection (20170904 Version: 2.2). Retrieved from https://ico.org.uk/media/for-organisations/documents/2013559/bigdata-ai-ml-and-data-protection.pdf
  53. Janger, E. J.(2003).Muddy Property: Generating and Protecting Information Privacy Norms in Bankruptcy.William and Mary Law Review,44(4),1801-1882.
  54. Janger, E. J.(2003).Privacy Property, Information Costs, and the Anticommons.Hastings Law Journal,54(4),899-930.
  55. Jentzsch, N.,Preibusch, S.,Harasser, A.,Ikonomou, D.(2012).,未出版
  56. Kang, J.(1998).Information Privacy in Cyberspace Transactions.Stanford Law Review,50(4),1193-1294.
  57. Kang, J.,Buchner, B.(2004).Privacy in Atlantis.Harvard Journal of Law & Technology,18(1),229-268.
  58. Karas, S.(2002).Privacy, Identity, Databases.American University Law Review,52(2),393-446.
  59. Kerr, I.(Ed.),Steeves, V.(Ed.),Lucock, C.(Ed.)(2009).Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society.Oxford, England:Oxford University Press.
  60. Kline, C. L.(2008).Security Theater and Database-Driven Information Markets: A Case for an Omnibus U.S. Data Privacy Statute.University of Toledo Law Review,39(2),443-496.
  61. Kuner, C.(2007).European Data Protection Law: Corporate Compliance and Regulation.Oxford, England:Oxford University Press.
  62. Lane, J.(Ed.),Stodden, V.(Ed.),Bender, S.(Ed.),Nissenbaum, H.(Ed.)(2014).Privacy, Big Data, and the Public Good: Frameworks for Engagement.
  63. Laudon, K. C.(1996).Markets and Privacy.Communications of the ACM,39(9),92-104.
  64. Lemley, M. A.(2000).Private Property: A Comment on Professor Samuelson's Contribution.Stanford Law Review,52(5),1545-1558.
  65. Lessig, L.(1999).The Architecture of Privacy.Vanderbilt Journal of Entertainment Law Practice,1,56-65.
  66. Lipman, R.(2016).Online Privacy and the Invisible Market for Our Data.Penn State Law Review,120(3),777-806.
  67. Lipton, J.(2003).Balancing Private Rights and Public Policies: Reconceptualizing Property in Databases.Berkeley Technology Law Journal,18(3),773-852.
  68. Litman, J.(2000).Information Privacy/Information Property.Stanford Law Review,52(5),1283-1314.
  69. Littmann, A. E.(2002).The Technology Split in Customer List Interpretation.University of Chicago Law Review,69(4),1901-1928.
  70. Lund, J.(2011).Property Rights to Information.Northwestern Journal of Technology and Intellectual Property,10(1),1-18.
  71. Magid, J. M.,Tatikonda, M. V.,Cochran, P. L.(2009).Radio Frequency Identification and Privacy Law: An Integrative Approach.American Business Law Journal,46(1),1-54.
  72. Malgieri, G.(2016)."Ownership" of Customer (Big) Data in the European Union: Quasi-Property as Comparative Solution?.Journal of Internet Law,20(5),3-13.
  73. Mayer-Schönberger, V.(2010).Beyond Privacy, beyond Rights: Toward a "Systems" Theory of Information Governance.California Law Review,98(6),1853-1886.
  74. Mayer-Schönberger, V.,Padova, Y.(2016).Regime Change? Enabling Big Data through Europe's New Data Protection Regulation.Columbia Science and Technology Law Review,17(2),315-335.
  75. McCarthy, T.(2004).The Rights of Publicity and Privacy.Eagan, MN:Thomson West.
  76. McClurg, A. J.(2003).A Thousand Words are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling.Northwestern University Law Review,98,63-144.
  77. McMahon, D. J.(2008).The Future of Privacy in a Unified National Health Information Infrastructure.Seton Hall Law Review,38,787-822.
  78. McWilliams, M. C., Jr.(2005).Applicants Laid Bare: The Privacy Economics of University Application Files.Hofstra Law Review,34,185-228.
  79. Mejido, J. A.(2011).Personalized Genomics: A Need for a Fiduciary Duty Remains.Rutgers Computer and Technology Law Journal,37,281-312.
  80. Mell, P.(1996).Seeking Shade in a Land of Perpetual Sunlight: Privacy as Property in the Electronic Wilderness.Berkeley Technology Law Journal,11,1-92.
  81. Merrill, T. W.(1997).Does Public Choice Theory Justify Judicial Activism After All?.Harvard Journal of Law & Public Policy,21,219-230.
  82. Miller, K.(2014).Total Surveillance,Big Data, and Predictive Crime Technology: Privacy's Perfect Storm.Journal of Technology Law & Policy,19,105-146.
  83. Miller, W. W., Jr.,O'Rourke, M. A.(2001).Bankruptcy Law V. Privacy Rights: Which Holds the Trump Card?.Houston Law Review,38,777-854.
  84. Murphy, R. S.(1996).Property Rights in Personal Information: An Economic Defense of Privacy.Georgetown Law Journal,84,2381-2418.
  85. Nehf, J. P.(2003).Recognizing the Societal Value in Information Privacy.Washington Law Review,78,1-92.
  86. Nehf, J. P.(2005).Incomparability and the Passive Virtues of Ad Hoc Privacy Policy.University of Colorado Law Review,76,1-56.
  87. Newman, D. E.(2008).European Union and United States Personal Information Privacy and Human Rights Philosophy: Is There a Match?.Temple International and Comparative Law Journal,22,307-344.
  88. Nguyen, X.-T. N.(2004).Collateralizing Privacy.Tulane Law Review,78,553-604.
  89. Organization for Economic Co-Operation and Development=OECD(2013).Exploring the Economics of Personal Data: A Survey of Methodologies for Measuring Monetary Value.OECD Digital Economy Papers,220
  90. Parkin, M.(2014).Economics.Boston, MA:Pearson.
  91. Posner, R. A.(1978).The Right of Privacy.Georgia Law Review,12,393-422.
  92. Powles, J.(2015).The Case That Won't Be Forgotten.Loyola University Chicago Law Journal,47(2),583-616.
  93. Radin, M. J.(1987).Market-Inalienability.Harvard Law Review,100,1849-1937.
  94. Regoli, N. L.(2001).A Tort For Prying E-eyes.University of Illinois Journal of Law, Technology Policy,2001,267-290.
  95. Richards, N. M.,King, J. H.(2013).Three Paradoxes of Big Data.Stanford Law Review Online,66,41-46.
  96. Richardson, S. B.(2011).How Community Property Jurisdictions Can Avoid Being Lost in Cyberspace.Louisiana Law Review,72,89-126.
  97. Rockandela, K.(2013).A Myriad of Reasons to Celebrate: Why the Invalidation of Isolated DNA Patents is a Victory for Personal Property Rights.Vermont Law Review,38,225-250.
  98. Rosen, J.(2001).The Unwanted Gaze: The Destruction of Privacy in America.New York, NY:Vintage.
  99. Rothman, J. E.(2012).The Inalienable Right of Publicity.Georgetown Law Journal,101,185-242.
  100. Salbu, S. R.(2002).The European Union Data Privacy Directive and International Relations.Vanderbilt Journal of Transnational Law,35,655-696.
  101. Samuelson, P.(2000).Privacy as Intellectual Property?.Staford Law Review,52,1125-1174.
  102. Samuelson, P.(1999).A New Kind of Privacy? Regulating Uses of Personal Data in the Global Information Economy.California Law Review,87,751-778.
  103. Schiller, J. C.(2003).Informational Privacy v. the Commercial Speech Doctrine: Can the Gramm-Leach-Bliley Act Provide Adequate Privacy Protection?.CommLaw Conspectus: Journal of Communications Law and Policy,11,349-368.
  104. Schwartz, P. M.(2004).Property, Privacy, and Personal Data.Harvard Law Review,117,2056-2128.
  105. Schwartz, P. M.(1995).The Protection of Privacy in Health Care Reform.Vanderbilt Law Review,48,295-347.
  106. Segovia, S.(2015).Privacy: An Issue of Priority.Hastings Business Law Journal,11,193-224.
  107. Shorr, S.(1995).Personal Information Contracts: How To Protect Privacy Without Violating The First Amendment.Cornell Law Review,80,1756-1850.
  108. Sinrod, E. J.,Reyna, J. W.,Jolish, B. D.(1999).The New Wave of Speech and Privacy Developments in Cyberspace.Hastings Communications and Entertainment Law Journal,21,583-600.
  109. Solove, D. J.(2001).Privacy and Power: Computer Databases and Metaphors for Information Privacy.Stanford Law Review,53,1393-1462.
  110. Solove, D. J.(2008).Understanding Privacy.Cambridge, MA:Harvard University Press.
  111. Solove, D. J.(2004).The Digital Person: Technology and Privacy in the information Age.New York, NY:NYU Press.
  112. Solove, D. J.,Schwartz, P. M.(2011).Information Privacy Law.New York, NY:Aspen Publishers.
  113. Spencer, S. B.(2002).Reasonable Expectations and the Erosion of Privacy.San Diego Law Review,39,843-916.
  114. Suter, S. M.(2004).Disentangling Privacy from Property: Toward a Deeper Understanding of Genetic Privacy.George Washington Law Review,72(4),737-814.
  115. Swedloff, R.(2014).Risk Classification's Big Data (R)evolution.Connecticut Insurance Law Journal,21(1),339-374.
  116. Swire, P. P. (1997). Markets, Self-Regulation and Government Enforcement in the Protection of Personal Information. In U.S. Department of Commerce (Ed.), Privacy and Self-Regulation in the Information Age. Retrieved from https://www.ntia.doc.gov/page/chapter-1-theory-markets-and-privacy. doi: 10.2139/ssrn.11472
  117. Teh, J.(2002).Privacy Wars in Cyberspace: An Examination of the Legal and Business Tensions in Information Privacy.Yale Journal of Law and Technology,4,1-96.
  118. Tene, O.,Polonetsky, J.(2013).Big Data for All: Privacy and User Control in the Age of Analytics.Northwestern Journal of Technology and Intellectual Property,11,239-274.
  119. Turkington, R. C.(1990).Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Constitutional Right to Informational Privacy.Northern Illinois University Law Review,10(3),479-520.
  120. Victor, J. M.(2013).The EU General Data Protection Regulation: Toward a Property Regime for Protecting Data Privacy.Yale Law Journal,123,513-529.
  121. Volokh, E.(2000).Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You.Stanford Law Review,52,1049-1124.
  122. Weeden, J. L.(2006).Genetic Liberty, Genetic Property: Protecting Genetic Information.Ave Maria Law Review,4,611-664.
  123. Westby, J. R.(2004).International Guide to Privacy.Chicago, IL:America Bar Association.
  124. Westin, A.(1967).Privacy and Freedom.New York, NY:Atheneum.
  125. Young, A. C.,Levine J. P.,Zurich, B. R.(2017).Franchise Relationships, Personal Information and Trade Secret Liability.Intellectual Property and Technology Law Journal,29(1),18-19.
  126. Zarsky, T. Z.(2017).Incompatible: The GDPR in the Age of Big Data.Seton Hall Law Review,47,995-1020.
  127. Zarsky, T. Z.(2004).Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society.Maine Law Review,56,13-60.
  128. Zhu, B. A.(2014).A Traditional Tort for a Modern Threat: Applying Intrusion upon Seclusion to Dataveillance Observations.New York University Law Review,89,2381-2416.
  129. 王澤鑑(2012)。人格權法。臺北:自刊。
  130. 史迪格里茲、羅耀宗譯(2013)。不公平的代價。臺北:天下。
  131. 張靜(2007)。我國營業秘密法學的建構與開展第一冊:營業秘密的基礎理論。臺北:新學林。
  132. 陳計男(2008)。破產法論。臺北:三民。
  133. 勞倫斯雷席格、劉靜怡譯(2002)。網路自由與法律。臺北:商周。
  134. 謝銘洋(2010)。從美國法上之商業利用權(Right of Publicity)探討肖像權之財產權化:最高法院九十七年台上字第一三九六號民事判決解析。月旦裁判時報,4,102-108。
  135. 謝銘洋、古清華、丁中原、張凱娜(1996)。營業秘密法解讀。臺北:元照。
  136. 羅伯‧萊克、周徵譯(2017)。拯救資本主義:在大翻轉年代,照顧多數人的福利,不是少數者的財富。臺北:聯經。
被引用次数
  1. 翁清坤(2020)。大數據對於個人資料保護之挑戰與因應之道。東吳法律學報,31(3),79-159。
  2. 翁清坤(2023)。個人資料之去識別化與再識別化風險:法律之觀點。臺大法學論叢,52(3),619-739。
  3. 葉志良,楊東穎,程致剛(2020)。5G與消費者保障:以維護消費者資訊自主權為中心。台灣國際法學刊,16(1),23-51。
  4. (2021)。侵害個資罪之利益概念──兼評最高法院109年度台大上字第1869號裁定。月旦法學雜誌,313,62-75。
  5. (2022)。論歐盟數位內容契約和數位服務契約指令。中原財經法學,49,1-65。
  6. (2024)。金融科技之競爭法課題:以數位金融平台與限制競爭為中心。臺大法學論叢,53(1),209-292。