Skip to content
You are not logged in |Login  
     
Limit search to available items
Your search query has been changed... Tried: (sealing and law and legislation) no results found... Tried: (sealing or law or legislation)
27526 results found. Sorted by relevance .
Book Cover
Bestseller
BestsellerE-Book

Title Data sovereignty : from the digital Silk Road to the return of the state / edited by Anupam Chander and Haochen Sun.

Publication Info. New York, NY : Oxford University Press, 2023.

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Oxford    Downloadable
Please click here to access this Oxford resource
Description 1 online resource
Note Also issued in print: 2023.
"This is an open access publication, available online and distributed under the terms of a Creative Commons Attribution - Non Commercial - No Derivatives 4.0 International licence (CC BY-NC-ND 4.0)"--Title page verso.
Bibliography Includes bibliographical references and index.
Summary 'Data Sovereignty' explores the attempts by governments to place limits on the free movement of data across a global internet. Drawing on theories in political economy, international law, human rights, and data protection, this volume offers new theoretical perspectives and thought-provoking ideas about the nature and scope of digital sovereignty.
Audience Specialized.
Note Description based on online resource and publisher information; title from PDF title page (viewed on October 18, 2023).
Contents Intro -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Introduction: Sovereignty 2.0 -- I. Defining Digital Sovereignty -- II. The Rise of Digital Sovereignty -- A. China: Inventing Digital Sovereignty -- B. The EU: Embracing Digital Sovereignty -- C. Russia: Promoting the Runet -- D. The United States: Digital Sovereignty by Default -- E. The Global South: Avoiding Data Colonialism -- III. How Digital Sovereignty Is Different -- A. Always Global -- B. Against Corporations -- C. More Control -- D. Enables Protectionism -- IV. Digital Sovereignty and the Russian Invasion of Ukraine -- V. The Plan for This Volume -- Part I Retheorizing Digital Sovereignty -- 1. Two Visions for Data Governance: Territorial vs. Functional Sovereignty -- I. Introducing Functional Sovereignty -- II. Asserting Functional Sovereignty -- III. Conclusion -- 2. A Starting Point for Re-thinking "Sovereignty" for the Online Environment -- I. Introduction -- II. The Point of Departure: Sovereignty Applies Online, but How? -- III. Three Examples Showcasing the Messy State of Sovereignty -- A. Sovereignty and Law Enforcement Access to Data -- B. Sovereignty and Content Removal Orders -- C. Sovereignty and Peacetime Cyber Espionage -- IV. Sovereignty and the Four Functions of International Law -- V. The Binary Nature of the Current Concept of Sovereignty -- VI. Sovereignty = "State" + "Exclusiveness"? -- VII. Sovereignty- Rule or Principle? -- VIII. "State Dignity"-the Core of Sovereignty -- A. Sovereignty Anchored in State Dignity-A Brief Illustration -- IX. Digital/Data Sovereignty-Political Slogan or Anchored in International Law? -- X. Concluding Remarks -- 3. Digital Sovereignty as Double-Edged Sword -- I. Introduction -- II. What Is Digital Sovereignty For? -- III. The Double-Edged Sword of Digital Sovereignty -- A. Speech -- B. Privacy.
C. National Security -- IV. Conclusion -- 4. From Data Subjects to Data Sovereigns: Addressing the Limits of Data Privacy in the Digital Era -- I. Introduction -- II. Data Subjects vs. Data Sovereigns -- III. Data Privacy in the Time of Pandemic -- A. The Challenge of Non-Personalized Data -- B. From Tracking the Pandemic to Tracking Individuals -- C. The Illusory Promise of Consent -- IV. Beyond Privacy: From Data Subjects to Data Sovereigns -- V. Conclusion -- Part II Technology and Economic Institutions -- 5. Digital Sovereignty + Artificial Intelligence -- I. Introduction -- II. How Digital Sovereignty Might Influence AI -- A. Three Models -- B. Implications -- III. How AI Might Influence Digital Sovereignty? -- A. Three Models -- B. Implications -- IV. Key Variables -- A. Access to Training Data -- B. Industrial Policy -- C. National Laws and Norms -- D. Attitudes toward AI-Powered Machines -- V. Conclusion -- 6. Taobao, Federalism, and the Emergence of Law, Chinese Style -- I. Introduction -- II. Development and Legal Market Infrastructure -- III. Federalism, Chinese Style: Delegation and the Origins of Chinese Political and Economic Reform, 1981-1993 -- IV. Taobao and Law, Chinese Style -- A. Evolution of Law, Chinese Style -- B. Taobao Creates a Market -- C. Taobao's Private Legal System -- V. Taobao and the Evolution of Federalism, Chinese Style: Recentralization -- A. Decentralization and the Incomplete Common Market -- B. Taobao and the Formation of a Common Market -- C. Taobao and Recentralization -- VI. Conclusion -- 7. Leveling the Playing Field between Sharing Platforms and Industry Incumbents: Good Regulatory Practices? -- I. Introduction: Increasing Regulatory Fragmentation -- II. A Case Study: Regulating the Sharing Economy and Its "Enemies" -- A. Innovation: The Sharing Platforms -- B. Competition: The Incumbents.
C. Regulation: Dynamic and Divergent Approaches -- III. Regulatory Cooperation on Platform Regulations: Good Regulatory Practices? -- A. Regulatory Cooperation Trends in the Regional Trade Agreements -- B. Good Regulatory Practices for Platform Regulations? -- IV. Conclusion: Regulatory Cooperation and Sovereignty -- 8. The Emergence of Financial Data Governance and the Challenge of Financial Data Sovereignty -- I. Introduction -- II. The Datafication of Finance -- III. Financial Data Governance and General Data Governance -- A. Regulating Financial Data -- B. The Evolution of Data Governance Styles -- IV. Open Banking -- V. Financial Data Governance Strategies -- A. Property-Based: United States -- B. Rights-Based: European Union -- C. Shared Resource: China -- D. Hybrid Models -- VI. Financial Data Sovereignty: Localization vs. Globalization -- A. Regulatory Fragmentation -- B. Territorialization and Data Localization -- VII. The Data Sovereignty Challenge -- Part III Trade Regulation -- 9. Data Sovereignty and Trade Agreements: Three Digital Kingdoms -- I. Data Sovereignty -- II. Data Sovereignty and Trade Agreements -- III. United States: The Firm Sovereignty Model -- A. Firm Sovereignty -- B. Privacy as a Consumer Right -- C. Security as a Business Risk -- D. Trade Agreements -- IV. China: The State Sovereignty Model -- A. Data Sovereignty -- B. Trade Agreements -- C. Personal Information Protection -- D. "Important Data" and "Core Data" -- V. EU: The Individual Sovereignty Model -- A. The GDPR -- B. Digital Sovereignty -- C. Data Flow and Localization -- D. Trade Agreements -- VI. Why the Differences? -- VII. Conclusion -- 10. Data Governance and Digital Trade in India: Losing Sight of the Forest for the Trees? -- I. Introduction -- II. Data Governance in India: Multiple Narratives, Multiple Frameworks -- A. Underlying Ideas of Data Governance.
B. Policy Goals in Data Governance Instruments -- C. The "Data Governance Complex" in India -- III. Data Governance and Influences on Digital Trade Policies in India -- A. The Nexus of Data Governance and Digital Trade -- B. Digital Trade Policies Reinforce the Data Governance Complex -- C. India in the Global Digital Trade Framework -- IV. Conclusion -- 11. Creating Data Flow Rules through Preferential Trade Agreements -- I. Introduction -- II. Digital Trade Provisions in PTAs -- A. Developments over Time -- B. Overview of Data-Related Rules in PTAs -- III. Different PTA Templates for Digital Trade Governance -- A. The U.S. Template -- B. The Digital Trade Agreements of the European Union -- C. The RCEP -- IV. Conclusion -- Part IV Data Localization -- 12. Personal Data Localization and Sovereignty along Asia's New Silk Roads -- I. Types of "Data Sovereignty" and "Data Localization" -- II. China, Russia, and Near Neighbors on the New Silk Roads -- A. China's Data Localizations -- B. Russia's Data Localizations -- C. Comparison of Chinese and Russian Localizations -- III. South Asia: Three Bills Include Localizations -- A. Regional Agreements -- B. India -- C. Sri Lanka -- D. Pakistan -- E. Comparison of South Asian Provisions -- IV. Central Asia: Five Laws Include Some Localizations -- A. International and Regional Agreements -- B. Data Localization Measures in National Laws -- C. Local Processing and Storage (Loc #1 and #2) -- D. Data Export Conditions and Prohibitions (Loc #3 and #4) -- E. Extraterritoriality and Local Representation (Loc #5 and #6) -- F. "Outsourcing Exemptions" -- G. Comparison of Central Asian Provisions -- V. How Relevant Are Free Trade Agreements? -- A. Adequacy and the GATS -- B. The Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) -- C. The Regional Comprehensive Economic Partnership (RCEP).
D. FTAs and the Future of Data Localization -- VI. Conclusion -- 13. Lessons from Internet Shutdowns Jurisprudence for Data Localization -- I. Motivations of Data Localization -- A. Cybersecurity-Protection (Control) of Domestic People -- B. Nurturing Domestic Digital Players and Tax Revenues -- II. Trade Rules Applied to Data Localizations -- A. Applicability of Trade Rules -- B. Trade-Rules-Based Arguments against Data Localization -- III. Regulating Internet Shutdowns through Human Rights Norms -- A. United Nations -- B. UN Special Rapporteurs on Freedom of Expressions -- C. Joint Declarations of Special Rapporteurs on Freedom of Expression -- D. Europe -- E. Turkish Domestic Courts -- F. Americas -- G. Brazil Domestic Courts -- H. Africa -- I. Asia -- IV. Adaptation of the Internet Shutdown Jurisprudence for Data Localization -- A. Synthesis of Jurisprudence on Internet Shutdowns -- B. Adaptation to Data Localization -- V. Conclusion -- 14. European Digital Sovereignty, Data Protection, and the Push toward Data Localization -- I. The Push Toward Data Localization in Europe -- II. The Need to Better Understand the Reasons behind Calls for Data Localization -- III. The Influence of the Schrems II Judgment of the CJEU -- A. The Starting Point: Data Localization Is Not in the GDPR's DNA -- B. Calls for Data Localization After Schrems II -- C. Initial EDPB Guidance: Toward De Facto Data Localization -- D. The New Model SCC's and EDPB's Final Guidance: A Degree of Room for a Risk-Based Approach? -- E. Intensification of Enforcement of Schrems II by European DPAs and Rejection of a Risk-Based Approach -- IV. Conclusion.
Local Note Oxford University Press Oxford University Press Open Access Books
Subject Data sovereignty.
Internet -- Law and legislation.
Data protection -- Law and legislation.
Data transmission systems -- Law and legislation.
Digital media -- Law and legislation.
Privacy, Right of.
Computer networks -- Law and legislation.
Computer networks -- Law and legislation
Data protection -- Law and legislation
Data sovereignty
Data transmission systems -- Law and legislation
Digital media -- Law and legislation
Internet -- Law and legislation
Privacy, Right of
Added Author Chander, Anupam, editor.
Sun, Haochen, editor.
Other Form: Print version : 9780197582794
ISBN 9780197582824 ebook
0197582826
Standard No. 10.1093/oso/9780197582794.001.0001 doi
-->
Add a Review