Bulk collection : systematic government access to private-sector data / / Fred H. Cate and James X. Dempsey [[electronic resource]] |
Pubbl/distr/stampa | New York, NY : , : Oxford University Press, , 2017 |
Descrizione fisica | xxxiii, 469p. ; : ill |
Disciplina | 342.0662 |
Soggetto topico |
Government information - Law and legislation
Electronic records - Access control Privacy, Right of Data protection - Law and legislation Electronic surveillance - Law and legislation Internet - Government policy Data transmission systems - Law and legislation |
ISBN | 9780190685546 : (ebk : OxfordScholarship) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910282226903321 |
New York, NY : , : Oxford University Press, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data sovereignty : from the digital silk road to the return of the state / / edited by Anupam Chander, Haochen Sun |
Pubbl/distr/stampa | New York, NY : , : Oxford University Press, , [2023] |
Descrizione fisica | 1 online resource (0 pages) |
Disciplina | 343.09944 |
Soggetto topico |
Internet - Law and legislation
Data protection - Law and legislation Data transmission systems - Law and legislation Digital media - Law and legislation Privacy, Right of Computer networks - Law and legislation |
ISBN |
0-19-758282-6
0-19-758281-8 0-19-758280-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Introduction: Sovereignty 2.0 -- I. Defining Digital Sovereignty -- II. The Rise of Digital Sovereignty -- A. China: Inventing Digital Sovereignty -- B. The EU: Embracing Digital Sovereignty -- C. Russia: Promoting the Runet -- D. The United States: Digital Sovereignty by Default -- E. The Global South: Avoiding Data Colonialism -- III. How Digital Sovereignty Is Different -- A. Always Global -- B. Against Corporations -- C. More Control -- D. Enables Protectionism -- IV. Digital Sovereignty and the Russian Invasion of Ukraine -- V. The Plan for This Volume -- Part I Retheorizing Digital Sovereignty -- 1. Two Visions for Data Governance: Territorial vs. Functional Sovereignty -- I. Introducing Functional Sovereignty -- II. Asserting Functional Sovereignty -- III. Conclusion -- 2. A Starting Point for Re-thinking "Sovereignty" for the Online Environment -- I. Introduction -- II. The Point of Departure: Sovereignty Applies Online, but How? -- III. Three Examples Showcasing the Messy State of Sovereignty -- A. Sovereignty and Law Enforcement Access to Data -- B. Sovereignty and Content Removal Orders -- C. Sovereignty and Peacetime Cyber Espionage -- IV. Sovereignty and the Four Functions of International Law -- V. The Binary Nature of the Current Concept of Sovereignty -- VI. Sovereignty = "State" + "Exclusiveness"? -- VII. Sovereignty- Rule or Principle? -- VIII. "State Dignity"-the Core of Sovereignty -- A. Sovereignty Anchored in State Dignity-A Brief Illustration -- IX. Digital/Data Sovereignty-Political Slogan or Anchored in International Law? -- X. Concluding Remarks -- 3. Digital Sovereignty as Double-Edged Sword -- I. Introduction -- II. What Is Digital Sovereignty For? -- III. The Double-Edged Sword of Digital Sovereignty -- A. Speech -- B. Privacy.
C. National Security -- IV. Conclusion -- 4. From Data Subjects to Data Sovereigns: Addressing the Limits of Data Privacy in the Digital Era -- I. Introduction -- II. Data Subjects vs. Data Sovereigns -- III. Data Privacy in the Time of Pandemic -- A. The Challenge of Non-Personalized Data -- B. From Tracking the Pandemic to Tracking Individuals -- C. The Illusory Promise of Consent -- IV. Beyond Privacy: From Data Subjects to Data Sovereigns -- V. Conclusion -- Part II Technology and Economic Institutions -- 5. Digital Sovereignty + Artificial Intelligence -- I. Introduction -- II. How Digital Sovereignty Might Influence AI -- A. Three Models -- B. Implications -- III. How AI Might Influence Digital Sovereignty? -- A. Three Models -- B. Implications -- IV. Key Variables -- A. Access to Training Data -- B. Industrial Policy -- C. National Laws and Norms -- D. Attitudes toward AI-Powered Machines -- V. Conclusion -- 6. Taobao, Federalism, and the Emergence of Law, Chinese Style -- I. Introduction -- II. Development and Legal Market Infrastructure -- III. Federalism, Chinese Style: Delegation and the Origins of Chinese Political and Economic Reform, 1981-1993 -- IV. Taobao and Law, Chinese Style -- A. Evolution of Law, Chinese Style -- B. Taobao Creates a Market -- C. Taobao's Private Legal System -- V. Taobao and the Evolution of Federalism, Chinese Style: Recentralization -- A. Decentralization and the Incomplete Common Market -- B. Taobao and the Formation of a Common Market -- C. Taobao and Recentralization -- VI. Conclusion -- 7. Leveling the Playing Field between Sharing Platforms and Industry Incumbents: Good Regulatory Practices? -- I. Introduction: Increasing Regulatory Fragmentation -- II. A Case Study: Regulating the Sharing Economy and Its "Enemies" -- A. Innovation: The Sharing Platforms -- B. Competition: The Incumbents. C. Regulation: Dynamic and Divergent Approaches -- III. Regulatory Cooperation on Platform Regulations: Good Regulatory Practices? -- A. Regulatory Cooperation Trends in the Regional Trade Agreements -- B. Good Regulatory Practices for Platform Regulations? -- IV. Conclusion: Regulatory Cooperation and Sovereignty -- 8. The Emergence of Financial Data Governance and the Challenge of Financial Data Sovereignty -- I. Introduction -- II. The Datafication of Finance -- III. Financial Data Governance and General Data Governance -- A. Regulating Financial Data -- B. The Evolution of Data Governance Styles -- IV. Open Banking -- V. Financial Data Governance Strategies -- A. Property-Based: United States -- B. Rights-Based: European Union -- C. Shared Resource: China -- D. Hybrid Models -- VI. Financial Data Sovereignty: Localization vs. Globalization -- A. Regulatory Fragmentation -- B. Territorialization and Data Localization -- VII. The Data Sovereignty Challenge -- Part III Trade Regulation -- 9. Data Sovereignty and Trade Agreements: Three Digital Kingdoms -- I. Data Sovereignty -- II. Data Sovereignty and Trade Agreements -- III. United States: The Firm Sovereignty Model -- A. Firm Sovereignty -- B. Privacy as a Consumer Right -- C. Security as a Business Risk -- D. Trade Agreements -- IV. China: The State Sovereignty Model -- A. Data Sovereignty -- B. Trade Agreements -- C. Personal Information Protection -- D. "Important Data" and "Core Data" -- V. EU: The Individual Sovereignty Model -- A. The GDPR -- B. Digital Sovereignty -- C. Data Flow and Localization -- D. Trade Agreements -- VI. Why the Differences? -- VII. Conclusion -- 10. Data Governance and Digital Trade in India: Losing Sight of the Forest for the Trees? -- I. Introduction -- II. Data Governance in India: Multiple Narratives, Multiple Frameworks -- A. Underlying Ideas of Data Governance. B. Policy Goals in Data Governance Instruments -- C. The "Data Governance Complex" in India -- III. Data Governance and Influences on Digital Trade Policies in India -- A. The Nexus of Data Governance and Digital Trade -- B. Digital Trade Policies Reinforce the Data Governance Complex -- C. India in the Global Digital Trade Framework -- IV. Conclusion -- 11. Creating Data Flow Rules through Preferential Trade Agreements -- I. Introduction -- II. Digital Trade Provisions in PTAs -- A. Developments over Time -- B. Overview of Data-Related Rules in PTAs -- III. Different PTA Templates for Digital Trade Governance -- A. The U.S. Template -- B. The Digital Trade Agreements of the European Union -- C. The RCEP -- IV. Conclusion -- Part IV Data Localization -- 12. Personal Data Localization and Sovereignty along Asia's New Silk Roads -- I. Types of "Data Sovereignty" and "Data Localization" -- II. China, Russia, and Near Neighbors on the New Silk Roads -- A. China's Data Localizations -- B. Russia's Data Localizations -- C. Comparison of Chinese and Russian Localizations -- III. South Asia: Three Bills Include Localizations -- A. Regional Agreements -- B. India -- C. Sri Lanka -- D. Pakistan -- E. Comparison of South Asian Provisions -- IV. Central Asia: Five Laws Include Some Localizations -- A. International and Regional Agreements -- B. Data Localization Measures in National Laws -- C. Local Processing and Storage (Loc #1 and #2) -- D. Data Export Conditions and Prohibitions (Loc #3 and #4) -- E. Extraterritoriality and Local Representation (Loc #5 and #6) -- F. "Outsourcing Exemptions" -- G. Comparison of Central Asian Provisions -- V. How Relevant Are Free Trade Agreements? -- A. Adequacy and the GATS -- B. The Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) -- C. The Regional Comprehensive Economic Partnership (RCEP). D. FTAs and the Future of Data Localization -- VI. Conclusion -- 13. Lessons from Internet Shutdowns Jurisprudence for Data Localization -- I. Motivations of Data Localization -- A. Cybersecurity-Protection (Control) of Domestic People -- B. Nurturing Domestic Digital Players and Tax Revenues -- II. Trade Rules Applied to Data Localizations -- A. Applicability of Trade Rules -- B. Trade-Rules-Based Arguments against Data Localization -- III. Regulating Internet Shutdowns through Human Rights Norms -- A. United Nations -- B. UN Special Rapporteurs on Freedom of Expressions -- C. Joint Declarations of Special Rapporteurs on Freedom of Expression -- D. Europe -- E. Turkish Domestic Courts -- F. Americas -- G. Brazil Domestic Courts -- H. Africa -- I. Asia -- IV. Adaptation of the Internet Shutdown Jurisprudence for Data Localization -- A. Synthesis of Jurisprudence on Internet Shutdowns -- B. Adaptation to Data Localization -- V. Conclusion -- 14. European Digital Sovereignty, Data Protection, and the Push toward Data Localization -- I. The Push Toward Data Localization in Europe -- II. The Need to Better Understand the Reasons behind Calls for Data Localization -- III. The Influence of the Schrems II Judgment of the CJEU -- A. The Starting Point: Data Localization Is Not in the GDPR's DNA -- B. Calls for Data Localization After Schrems II -- C. Initial EDPB Guidance: Toward De Facto Data Localization -- D. The New Model SCC's and EDPB's Final Guidance: A Degree of Room for a Risk-Based Approach? -- E. Intensification of Enforcement of Schrems II by European DPAs and Rejection of a Risk-Based Approach -- IV. Conclusion. |
Record Nr. | UNINA-9910767597003321 |
New York, NY : , : Oxford University Press, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|