LEADER 11563nam 2200613 450 001 9910767597003321 005 20240118114710.0 010 $a0-19-758282-6 010 $a0-19-758281-8 010 $a0-19-758280-X 035 $a(MiAaPQ)EBC7371611 035 $a(Au-PeEL)EBL7371611 035 $a(OCoLC)1404447408 035 $a(EXLCZ)9928858303900041 100 $a20240118d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aData sovereignty $efrom the digital silk road to the return of the state /$fedited by Anupam Chander, Haochen Sun 210 1$aNew York, NY :$cOxford University Press,$d[2023] 210 4$dİ2023 215 $a1 online resource (0 pages) 311 08$aPrint version: Chander, Anupam Data Sovereignty Oxford : Oxford University Press, Incorporated,c2023 9780197582794 320 $aIncludes bibliographical references and index. 327 $aIntro -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Introduction: Sovereignty 2.0 -- I. Defining Digital Sovereignty -- II. The Rise of Digital Sovereignty -- A. China: Inventing Digital Sovereignty -- B. The EU: Embracing Digital Sovereignty -- C. Russia: Promoting the Runet -- D. The United States: Digital Sovereignty by Default -- E. The Global South: Avoiding Data Colonialism -- III. How Digital Sovereignty Is Different -- A. Always Global -- B. Against Corporations -- C. More Control -- D. Enables Protectionism -- IV. Digital Sovereignty and the Russian Invasion of Ukraine -- V. The Plan for This Volume -- Part I Retheorizing Digital Sovereignty -- 1. Two Visions for Data Governance: Territorial vs. Functional Sovereignty -- I. Introducing Functional Sovereignty -- II. Asserting Functional Sovereignty -- III. Conclusion -- 2. A Starting Point for Re-thinking "Sovereignty" for the Online Environment -- I. Introduction -- II. The Point of Departure: Sovereignty Applies Online, but How? -- III. Three Examples Showcasing the Messy State of Sovereignty -- A. Sovereignty and Law Enforcement Access to Data -- B. Sovereignty and Content Removal Orders -- C. Sovereignty and Peacetime Cyber Espionage -- IV. Sovereignty and the Four Functions of International Law -- V. The Binary Nature of the Current Concept of Sovereignty -- VI. Sovereignty = "State" + "Exclusiveness"? -- VII. Sovereignty- Rule or Principle? -- VIII. "State Dignity"-the Core of Sovereignty -- A. Sovereignty Anchored in State Dignity-A Brief Illustration -- IX. Digital/Data Sovereignty-Political Slogan or Anchored in International Law? -- X. Concluding Remarks -- 3. Digital Sovereignty as Double-Edged Sword -- I. Introduction -- II. What Is Digital Sovereignty For? -- III. The Double-Edged Sword of Digital Sovereignty -- A. Speech -- B. Privacy. 327 $aC. National Security -- IV. Conclusion -- 4. From Data Subjects to Data Sovereigns: Addressing the Limits of Data Privacy in the Digital Era -- I. Introduction -- II. Data Subjects vs. Data Sovereigns -- III. Data Privacy in the Time of Pandemic -- A. The Challenge of Non-Personalized Data -- B. From Tracking the Pandemic to Tracking Individuals -- C. The Illusory Promise of Consent -- IV. Beyond Privacy: From Data Subjects to Data Sovereigns -- V. Conclusion -- Part II Technology and Economic Institutions -- 5. Digital Sovereignty + Artificial Intelligence -- I. Introduction -- II. How Digital Sovereignty Might Influence AI -- A. Three Models -- B. Implications -- III. How AI Might Influence Digital Sovereignty? -- A. Three Models -- B. Implications -- IV. Key Variables -- A. Access to Training Data -- B. Industrial Policy -- C. National Laws and Norms -- D. Attitudes toward AI-Powered Machines -- V. Conclusion -- 6. Taobao, Federalism, and the Emergence of Law, Chinese Style -- I. Introduction -- II. Development and Legal Market Infrastructure -- III. Federalism, Chinese Style: Delegation and the Origins of Chinese Political and Economic Reform, 1981-1993 -- IV. Taobao and Law, Chinese Style -- A. Evolution of Law, Chinese Style -- B. Taobao Creates a Market -- C. Taobao's Private Legal System -- V. Taobao and the Evolution of Federalism, Chinese Style: Recentralization -- A. Decentralization and the Incomplete Common Market -- B. Taobao and the Formation of a Common Market -- C. Taobao and Recentralization -- VI. Conclusion -- 7. Leveling the Playing Field between Sharing Platforms and Industry Incumbents: Good Regulatory Practices? -- I. Introduction: Increasing Regulatory Fragmentation -- II. A Case Study: Regulating the Sharing Economy and Its "Enemies" -- A. Innovation: The Sharing Platforms -- B. Competition: The Incumbents. 327 $aC. Regulation: Dynamic and Divergent Approaches -- III. Regulatory Cooperation on Platform Regulations: Good Regulatory Practices? -- A. Regulatory Cooperation Trends in the Regional Trade Agreements -- B. Good Regulatory Practices for Platform Regulations? -- IV. Conclusion: Regulatory Cooperation and Sovereignty -- 8. The Emergence of Financial Data Governance and the Challenge of Financial Data Sovereignty -- I. Introduction -- II. The Datafication of Finance -- III. Financial Data Governance and General Data Governance -- A. Regulating Financial Data -- B. The Evolution of Data Governance Styles -- IV. Open Banking -- V. Financial Data Governance Strategies -- A. Property-Based: United States -- B. Rights-Based: European Union -- C. Shared Resource: China -- D. Hybrid Models -- VI. Financial Data Sovereignty: Localization vs. Globalization -- A. Regulatory Fragmentation -- B. Territorialization and Data Localization -- VII. The Data Sovereignty Challenge -- Part III Trade Regulation -- 9. Data Sovereignty and Trade Agreements: Three Digital Kingdoms -- I. Data Sovereignty -- II. Data Sovereignty and Trade Agreements -- III. United States: The Firm Sovereignty Model -- A. Firm Sovereignty -- B. Privacy as a Consumer Right -- C. Security as a Business Risk -- D. Trade Agreements -- IV. China: The State Sovereignty Model -- A. Data Sovereignty -- B. Trade Agreements -- C. Personal Information Protection -- D. "Important Data" and "Core Data" -- V. EU: The Individual Sovereignty Model -- A. The GDPR -- B. Digital Sovereignty -- C. Data Flow and Localization -- D. Trade Agreements -- VI. Why the Differences? -- VII. Conclusion -- 10. Data Governance and Digital Trade in India: Losing Sight of the Forest for the Trees? -- I. Introduction -- II. Data Governance in India: Multiple Narratives, Multiple Frameworks -- A. Underlying Ideas of Data Governance. 327 $aB. Policy Goals in Data Governance Instruments -- C. The "Data Governance Complex" in India -- III. Data Governance and Influences on Digital Trade Policies in India -- A. The Nexus of Data Governance and Digital Trade -- B. Digital Trade Policies Reinforce the Data Governance Complex -- C. India in the Global Digital Trade Framework -- IV. Conclusion -- 11. Creating Data Flow Rules through Preferential Trade Agreements -- I. Introduction -- II. Digital Trade Provisions in PTAs -- A. Developments over Time -- B. Overview of Data-Related Rules in PTAs -- III. Different PTA Templates for Digital Trade Governance -- A. The U.S. Template -- B. The Digital Trade Agreements of the European Union -- C. The RCEP -- IV. Conclusion -- Part IV Data Localization -- 12. Personal Data Localization and Sovereignty along Asia's New Silk Roads -- I. Types of "Data Sovereignty" and "Data Localization" -- II. China, Russia, and Near Neighbors on the New Silk Roads -- A. China's Data Localizations -- B. Russia's Data Localizations -- C. Comparison of Chinese and Russian Localizations -- III. South Asia: Three Bills Include Localizations -- A. Regional Agreements -- B. India -- C. Sri Lanka -- D. Pakistan -- E. Comparison of South Asian Provisions -- IV. Central Asia: Five Laws Include Some Localizations -- A. International and Regional Agreements -- B. Data Localization Measures in National Laws -- C. Local Processing and Storage (Loc #1 and #2) -- D. Data Export Conditions and Prohibitions (Loc #3 and #4) -- E. Extraterritoriality and Local Representation (Loc #5 and #6) -- F. "Outsourcing Exemptions" -- G. Comparison of Central Asian Provisions -- V. How Relevant Are Free Trade Agreements? -- A. Adequacy and the GATS -- B. The Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) -- C. The Regional Comprehensive Economic Partnership (RCEP). 327 $aD. FTAs and the Future of Data Localization -- VI. Conclusion -- 13. Lessons from Internet Shutdowns Jurisprudence for Data Localization -- I. Motivations of Data Localization -- A. Cybersecurity-Protection (Control) of Domestic People -- B. Nurturing Domestic Digital Players and Tax Revenues -- II. Trade Rules Applied to Data Localizations -- A. Applicability of Trade Rules -- B. Trade-Rules-Based Arguments against Data Localization -- III. Regulating Internet Shutdowns through Human Rights Norms -- A. United Nations -- B. UN Special Rapporteurs on Freedom of Expressions -- C. Joint Declarations of Special Rapporteurs on Freedom of Expression -- D. Europe -- E. Turkish Domestic Courts -- F. Americas -- G. Brazil Domestic Courts -- H. Africa -- I. Asia -- IV. Adaptation of the Internet Shutdown Jurisprudence for Data Localization -- A. Synthesis of Jurisprudence on Internet Shutdowns -- B. Adaptation to Data Localization -- V. Conclusion -- 14. European Digital Sovereignty, Data Protection, and the Push toward Data Localization -- I. The Push Toward Data Localization in Europe -- II. The Need to Better Understand the Reasons behind Calls for Data Localization -- III. The Influence of the Schrems II Judgment of the CJEU -- A. The Starting Point: Data Localization Is Not in the GDPR's DNA -- B. Calls for Data Localization After Schrems II -- C. Initial EDPB Guidance: Toward De Facto Data Localization -- D. The New Model SCC's and EDPB's Final Guidance: A Degree of Room for a Risk-Based Approach? -- E. Intensification of Enforcement of Schrems II by European DPAs and Rejection of a Risk-Based Approach -- IV. Conclusion. 330 $aData Sovereignty: From the Digital Silk Road to the Return of the State focuses on the question of territorial control over data flows and attempts by national and regional governments to place limits on the free movement of data across a global internet. Drawing on theories in political economy, international law, human rights, and data protection, this volume offers new theoretical perspectives and thought-provoking ideas about the nature and scope of data sovereignty. 606 $aInternet$xLaw and legislation 606 $aData protection$xLaw and legislation 606 $aData transmission systems$xLaw and legislation 606 $aDigital media$xLaw and legislation 606 $aPrivacy, Right of 606 $aComputer networks$xLaw and legislation 615 0$aInternet$xLaw and legislation. 615 0$aData protection$xLaw and legislation. 615 0$aData transmission systems$xLaw and legislation. 615 0$aDigital media$xLaw and legislation. 615 0$aPrivacy, Right of. 615 0$aComputer networks$xLaw and legislation. 676 $a343.09944 702 $aChander$b Anupam 702 $aSun$b Haochen 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910767597003321 996 $aData sovereignty$93875010 997 $aUNINA