Data sovereignty from the digital Silk Road to the return of the state
'Data Sovereignty' explores the attempts by governments to place limits on the free movement of data across a global internet. Drawing on theories in political economy, international law, human rights, and data protection, this volume offers new theoretical perspectives and thought-provoki...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
New York, NY :
Oxford University Press
2023.
|
Colección: | Oxford scholarship online.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009786583406719 |
Tabla de Contenidos:
- Intro
- Title Page
- Copyright Page
- Contents
- List of Contributors
- Introduction: Sovereignty 2.0
- I. Defining Digital Sovereignty
- II. The Rise of Digital Sovereignty
- A. China: Inventing Digital Sovereignty
- B. The EU: Embracing Digital Sovereignty
- C. Russia: Promoting the Runet
- D. The United States: Digital Sovereignty by Default
- E. The Global South: Avoiding Data Colonialism
- III. How Digital Sovereignty Is Different
- A. Always Global
- B. Against Corporations
- C. More Control
- D. Enables Protectionism
- IV. Digital Sovereignty and the Russian Invasion of Ukraine
- V. The Plan for This Volume
- Part I Retheorizing Digital Sovereignty
- 1. Two Visions for Data Governance: Territorial vs. Functional Sovereignty
- I. Introducing Functional Sovereignty
- II. Asserting Functional Sovereignty
- III. Conclusion
- 2. A Starting Point for Re-thinking "Sovereignty" for the Online Environment
- I. Introduction
- II. The Point of Departure: Sovereignty Applies Online, but How?
- III. Three Examples Showcasing the Messy State of Sovereignty
- A. Sovereignty and Law Enforcement Access to Data
- B. Sovereignty and Content Removal Orders
- C. Sovereignty and Peacetime Cyber Espionage
- IV. Sovereignty and the Four Functions of International Law
- V. The Binary Nature of the Current Concept of Sovereignty
- VI. Sovereignty = "State" + "Exclusiveness"?
- VII. Sovereignty- Rule or Principle?
- VIII. "State Dignity"-the Core of Sovereignty
- A. Sovereignty Anchored in State Dignity-A Brief Illustration
- IX. Digital/Data Sovereignty-Political Slogan or Anchored in International Law?
- X. Concluding Remarks
- 3. Digital Sovereignty as Double-Edged Sword
- I. Introduction
- II. What Is Digital Sovereignty For?
- III. The Double-Edged Sword of Digital Sovereignty
- A. Speech
- B. Privacy.
- C. National Security
- IV. Conclusion
- 4. From Data Subjects to Data Sovereigns: Addressing the Limits of Data Privacy in the Digital Era
- I. Introduction
- II. Data Subjects vs. Data Sovereigns
- III. Data Privacy in the Time of Pandemic
- A. The Challenge of Non-Personalized Data
- B. From Tracking the Pandemic to Tracking Individuals
- C. The Illusory Promise of Consent
- IV. Beyond Privacy: From Data Subjects to Data Sovereigns
- V. Conclusion
- Part II Technology and Economic Institutions
- 5. Digital Sovereignty + Artificial Intelligence
- I. Introduction
- II. How Digital Sovereignty Might Influence AI
- A. Three Models
- B. Implications
- III. How AI Might Influence Digital Sovereignty?
- A. Three Models
- B. Implications
- IV. Key Variables
- A. Access to Training Data
- B. Industrial Policy
- C. National Laws and Norms
- D. Attitudes toward AI-Powered Machines
- V. Conclusion
- 6. Taobao, Federalism, and the Emergence of Law, Chinese Style
- I. Introduction
- II. Development and Legal Market Infrastructure
- III. Federalism, Chinese Style: Delegation and the Origins of Chinese Political and Economic Reform, 1981-1993
- IV. Taobao and Law, Chinese Style
- A. Evolution of Law, Chinese Style
- B. Taobao Creates a Market
- C. Taobao's Private Legal System
- V. Taobao and the Evolution of Federalism, Chinese Style: Recentralization
- A. Decentralization and the Incomplete Common Market
- B. Taobao and the Formation of a Common Market
- C. Taobao and Recentralization
- VI. Conclusion
- 7. Leveling the Playing Field between Sharing Platforms and Industry Incumbents: Good Regulatory Practices?
- I. Introduction: Increasing Regulatory Fragmentation
- II. A Case Study: Regulating the Sharing Economy and Its "Enemies"
- A. Innovation: The Sharing Platforms
- B. Competition: The Incumbents.
- C. Regulation: Dynamic and Divergent Approaches
- III. Regulatory Cooperation on Platform Regulations: Good Regulatory Practices?
- A. Regulatory Cooperation Trends in the Regional Trade Agreements
- B. Good Regulatory Practices for Platform Regulations?
- IV. Conclusion: Regulatory Cooperation and Sovereignty
- 8. The Emergence of Financial Data Governance and the Challenge of Financial Data Sovereignty
- I. Introduction
- II. The Datafication of Finance
- III. Financial Data Governance and General Data Governance
- A. Regulating Financial Data
- B. The Evolution of Data Governance Styles
- IV. Open Banking
- V. Financial Data Governance Strategies
- A. Property-Based: United States
- B. Rights-Based: European Union
- C. Shared Resource: China
- D. Hybrid Models
- VI. Financial Data Sovereignty: Localization vs. Globalization
- A. Regulatory Fragmentation
- B. Territorialization and Data Localization
- VII. The Data Sovereignty Challenge
- Part III Trade Regulation
- 9. Data Sovereignty and Trade Agreements: Three Digital Kingdoms
- I. Data Sovereignty
- II. Data Sovereignty and Trade Agreements
- III. United States: The Firm Sovereignty Model
- A. Firm Sovereignty
- B. Privacy as a Consumer Right
- C. Security as a Business Risk
- D. Trade Agreements
- IV. China: The State Sovereignty Model
- A. Data Sovereignty
- B. Trade Agreements
- C. Personal Information Protection
- D. "Important Data" and "Core Data"
- V. EU: The Individual Sovereignty Model
- A. The GDPR
- B. Digital Sovereignty
- C. Data Flow and Localization
- D. Trade Agreements
- VI. Why the Differences?
- VII. Conclusion
- 10. Data Governance and Digital Trade in India: Losing Sight of the Forest for the Trees?
- I. Introduction
- II. Data Governance in India: Multiple Narratives, Multiple Frameworks
- A. Underlying Ideas of Data Governance.
- B. Policy Goals in Data Governance Instruments
- C. The "Data Governance Complex" in India
- III. Data Governance and Influences on Digital Trade Policies in India
- A. The Nexus of Data Governance and Digital Trade
- B. Digital Trade Policies Reinforce the Data Governance Complex
- C. India in the Global Digital Trade Framework
- IV. Conclusion
- 11. Creating Data Flow Rules through Preferential Trade Agreements
- I. Introduction
- II. Digital Trade Provisions in PTAs
- A. Developments over Time
- B. Overview of Data-Related Rules in PTAs
- III. Different PTA Templates for Digital Trade Governance
- A. The U.S. Template
- B. The Digital Trade Agreements of the European Union
- C. The RCEP
- IV. Conclusion
- Part IV Data Localization
- 12. Personal Data Localization and Sovereignty along Asia's New Silk Roads
- I. Types of "Data Sovereignty" and "Data Localization"
- II. China, Russia, and Near Neighbors on the New Silk Roads
- A. China's Data Localizations
- B. Russia's Data Localizations
- C. Comparison of Chinese and Russian Localizations
- III. South Asia: Three Bills Include Localizations
- A. Regional Agreements
- B. India
- C. Sri Lanka
- D. Pakistan
- E. Comparison of South Asian Provisions
- IV. Central Asia: Five Laws Include Some Localizations
- A. International and Regional Agreements
- B. Data Localization Measures in National Laws
- C. Local Processing and Storage (Loc #1 and #2)
- D. Data Export Conditions and Prohibitions (Loc #3 and #4)
- E. Extraterritoriality and Local Representation (Loc #5 and #6)
- F. "Outsourcing Exemptions"
- G. Comparison of Central Asian Provisions
- V. How Relevant Are Free Trade Agreements?
- A. Adequacy and the GATS
- B. The Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP)
- C. The Regional Comprehensive Economic Partnership (RCEP).
- D. FTAs and the Future of Data Localization
- VI. Conclusion
- 13. Lessons from Internet Shutdowns Jurisprudence for Data Localization
- I. Motivations of Data Localization
- A. Cybersecurity-Protection (Control) of Domestic People
- B. Nurturing Domestic Digital Players and Tax Revenues
- II. Trade Rules Applied to Data Localizations
- A. Applicability of Trade Rules
- B. Trade-Rules-Based Arguments against Data Localization
- III. Regulating Internet Shutdowns through Human Rights Norms
- A. United Nations
- B. UN Special Rapporteurs on Freedom of Expressions
- C. Joint Declarations of Special Rapporteurs on Freedom of Expression
- D. Europe
- E. Turkish Domestic Courts
- F. Americas
- G. Brazil Domestic Courts
- H. Africa
- I. Asia
- IV. Adaptation of the Internet Shutdown Jurisprudence for Data Localization
- A. Synthesis of Jurisprudence on Internet Shutdowns
- B. Adaptation to Data Localization
- V. Conclusion
- 14. European Digital Sovereignty, Data Protection, and the Push toward Data Localization
- I. The Push Toward Data Localization in Europe
- II. The Need to Better Understand the Reasons behind Calls for Data Localization
- III. The Influence of the Schrems II Judgment of the CJEU
- A. The Starting Point: Data Localization Is Not in the GDPR's DNA
- B. Calls for Data Localization After Schrems II
- C. Initial EDPB Guidance: Toward De Facto Data Localization
- D. The New Model SCC's and EDPB's Final Guidance: A Degree of Room for a Risk-Based Approach?
- E. Intensification of Enforcement of Schrems II by European DPAs and Rejection of a Risk-Based Approach
- IV. Conclusion.