Crisis of personal data protection during the construction of E-government: reaction and limits of Hong Kong privacy laws

Yongxi Chen*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The government of Hong Kong has achieved remarkable staged results according to its comprehensive E-government blueprint. At the same time, it is its statutory responsibility to protect privacy and personal data. However, there has been a succession of incidents of unauthorized leakage onto the Internet of personal data held by the agencies of Hong Kong government since 2006. These incidents occurred during the implementation of E-government, and aroused the public's deep concern of their privacy rights impacted by the Internet and the security of their personal data held by government agencies. This paper studies two typical cases of personal data leakage, one arising during the internal outsourcing process, the other occurring in external online service to citizens. It analyzes how the existing privacy regime addresses privacy intrusion and whether the redress is sufficient, before exploring the defects of the remedy system as well as the ways of improving legal protection of personal data within E-government environment.

Original languageEnglish
Title of host publicationICEGOV 2007 - Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance
Pages155-164
Number of pages10
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007 - Macao, China
Duration: 10 Dec 200713 Dec 2007

Publication series

NameACM International Conference Proceeding Series
Volume232

Conference

Conference1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007
Country/TerritoryChina
CityMacao
Period10/12/0713/12/07

Fingerprint

Dive into the research topics of 'Crisis of personal data protection during the construction of E-government: reaction and limits of Hong Kong privacy laws'. Together they form a unique fingerprint.

Cite this