The Council of Grand Justices’ Constitutional Interpretation No. 603 puts it clearly: “Where it is necessary for the state to ... set up databases ... for the purposes of any particular major public interest, it shall not only prescribe by law the purposes of such collection, which shall be necessary and relevant to the achievement of the purposes of such major public interest, but also prohibit by law any use other than the statutory purposes ... in a manner that is sufficient to ensure the accuracy and safety of the information ... and take any and all necessary protective measures both organizationally and procedurally ... to protect the people’s right of information privacy.”
However, police have recently been misusing the Cloud Computing Applications and Industry Development Program, and have been using mobile devices to download household registration data to run comparison checks on personal information, including examining ID photos with face recognition programs.
Above and beyond concerns about whether this constitutes an abuse of power in the collection of information, there is absolutely no basis in law for authorities to manage and use personal data this way; indeed, it is in violation of the requirements of the constitutional interpretation cited above. This illegal and unconstitutional political sleight of hand not only tramples over data autonomy and personal dignity, it also runs counter to the fundamental requirement in a country run according to the rule of law that the government be self-regulating. Misuse of power leads to a return to authoritarian rule.
The National Police Agency (NPA) has tried to hush up the issue by invoking the Police Power Exercise Act (警察職權行使法). Although this act does authorize the police to use technology to amass information on participants during marches or public events, the activities must still conform with legal procedure. Using the information obtained in this way to analyze personal information can be considered an invasion of personal rights and rights to data privacy. As this goes against the principle of Vorbehalt des Gesetzes — statutory reservation — how can such a policy be justified? The Household Registration Act (戶籍法) authorizes the creation of an ID photo databank for the purpose of household registration only, so this cannot be used as a justification for the police’s policy.
The purpose of legislating the Personal Information Protection Act (個人資料保護法) was to protect, through procedural stipulations, people’s data privacy and data autonomy.
In essence, it is a personal data protection procedure law and absolutely cannot be transformed into a justification for the public authorities to have access to citizens’ personal information when they need it for “any use other than the statutory purposes.”
If the police want to justify this kind of action, they will have to look elsewhere. If this point is lost on even a major judicial body such as the NPA, how can its professed intention to set up internal controls be effective?
Following the stabbings on Taipei’s MRT metropolitan railway system, the NPA ordered more spot checks on what it calls high-risk groups — homeless people, people with mental disorders and “antisocial types,” and to establish a database to store the information it obtained.
In addition to there being, again, no clear legal authorization for this, it is highly debatable whether the aforementioned groups should be included, far and beyond any abstract objections, or whether this would constitute the illegal use of personal data.
Data security expert Simson Garfinkel cautioned about this issue more than a decade ago, saying that this type of intrusion was uncivilized and should not be tolerated in a constitutional democracy, as it leads to prejudice. Behind this intimidatory manipulation of personal data is the implicit threat that the authorities can secretly use and control your personal information as and when they see fit at any point in the future, which again smacks of authoritarianism.
Renowned US investigative journalist Edwin Black has written extensively about the historical lessons that should be drawn from the way the Nazi regime used information technologies available to them at the time to locate Jews and send them to concentration camps, and how the East German Stasi, under its guiding principle of Wir sind Uberall — we are everywhere — was so successful in its stated endeavor. At one point the East German government had secret files on 6 million of its people, a full one-third of the country’s population at the time, allowing the Stasi to amass vast — and completely unsupervised — records on its populace.
More recent examples include the administration of former US president George W. Bush, which Harvard law professor Jack Goldsmith termed the “terror presidency” for abusing executive branch powers to set up a range of databanks in the name of “the fight against terrorism” to control intelligence in the US and abroad. These records have only grown in scale since US President Barack Obama came into office.
In his book No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State, US journalist Glenn Greenwald offers a more detailed insight on the issue, in the light of the Snowden affair. Is it possible that we can learn nothing from these international examples, all of which have occurred in living memory? Is the information state not something we should feel wary of?
Liu Ching-yi is a professor in the College of Social Sciences at National Taiwan University.
Translated by Paul Cooper
China’s supreme objective in a war across the Taiwan Strait is to incorporate Taiwan as a province of the People’s Republic. It follows, therefore, that international recognition of Taiwan’s de jure independence is a consummation that China’s leaders devoutly wish to avoid. By the same token, an American strategy to deny China that objective would complicate Beijing’s calculus and deter large-scale hostilities. For decades, China has cautioned “independence means war.” The opposite is also true: “war means independence.” A comprehensive strategy of denial would guarantee an outcome of de jure independence for Taiwan in the event of Chinese invasion or
A recent Taipei Times editorial (“A targeted bilingual policy,” March 12, page 8) questioned how the Ministry of Education can justify spending NT$151 million (US$4.74 million) when the spotlighted achievements are English speech competitions and campus tours. It is a fair question, but it focuses on the wrong issue. The problem is not last year’s outcomes failing to meet the bilingual education vision; the issue is that the ministry has abandoned the program that originally justified such a large expenditure. In the early years of Bilingual 2030, the ministry’s K-12 Administration promoted the Bilingual Instruction in Select Domains Program (部分領域課程雙語教學實施計畫).
Chinese Nationalist Party (KMT) Chairwoman Cheng Li-wun (鄭麗文) earlier this month said it is necessary for her to meet with Chinese President Xi Jinping (習近平) and it would be a “huge boost” to the party’s local election results in November, but many KMT members have expressed different opinions, indicating a struggle between different groups in the party. Since Cheng was elected as party chairwoman in October last year, she has repeatedly expressed support for increased exchanges with China, saying that it would bring peace and prosperity to Taiwan, and that a meeting with Xi in Beijing takes priority over meeting
Philippine Department of Foreign Affairs spokesman for maritime affairs Rogelio Villanueva on Monday said that Manila’s claims in the South China Sea are backed by international law. Villanueva was responding to a social media post by the Chinese embassy alleging that a former Philippine ambassador in 1990 had written a letter to a German radio operator stating that the Scarborough Shoal (Huangyan Island, 黃岩島) did not fall within Manila’s territory. “Sovereignty is not merely claimed, it is exercised,” Villanueva said. The Philippines won a landmark case at the Permanent Court of Arbitration in 2016 that found China’s sweeping claim of sovereignty in