Data sovereignty : : from the digital Silk Road to the return of the state / / edited by Anupam Chander and Haochen Sun.
'Data Sovereignty' explores the attempts by governments to place limits on the free movement of data across a global internet. Drawing on theories in political economy, international law, human rights, and data protection, this volume offers new theoretical perspectives and thought-provoki...
Saved in:
Superior document: | Oxford scholarship online |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | New York, NY : : Oxford University Press,, 2023. |
Year of Publication: | 2023 |
Language: | English |
Series: | Oxford scholarship online.
|
Physical Description: | 1 online resource (0 pages) |
Notes: |
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02506nam a2200529 i 4500 | ||
---|---|---|---|
001 | 993640775804498 | ||
005 | 20240118114710.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr cnu|||||||| | ||
008 | 231013s2023 nyu fob 001|0|eng|d | ||
020 | |a 0-19-758282-6 | ||
020 | |a 0-19-758281-8 | ||
020 | |a 0-19-758280-X | ||
024 | 7 | |a 10.1093/oso/9780197582794.001.0001 |2 doi | |
035 | |a (MiAaPQ)EBC7371611 | ||
035 | |a (Au-PeEL)EBL7371611 | ||
035 | |a (OCoLC)1404447408 | ||
035 | |a (StDuBDS)9780197582824 | ||
035 | |a (CKB)28858303900041 | ||
035 | |a (EXLCZ)9928858303900041 | ||
040 | |a StDuBDS |b eng |c StDuBDS |e rda |e pn | ||
050 | 0 | |a K564.C6 |b D35 2023 | |
072 | 7 | |a LAW |2 ukslc | |
072 | 7 | |a LN |2 thema | |
082 | 0 | |a 343.09944 |2 23 | |
245 | 0 | 0 | |a Data sovereignty : |b from the digital Silk Road to the return of the state / |c edited by Anupam Chander and Haochen Sun. |
264 | 1 | |a New York, NY : |b Oxford University Press, |c 2023. | |
300 | |a 1 online resource (0 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Oxford scholarship online | |
505 | 0 | |a Intro -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Introduction: Sovereignty 2.0 -- I. Defining Digital Sovereignty -- II. The Rise of Digital Sovereignty -- A. China: Inventing Digital Sovereignty -- B. The EU: Embracing Digital Sovereignty -- C. Russia: Promoting the Runet -- D. The United States: Digital Sovereignty by Default -- E. The Global South: Avoiding Data Colonialism -- III. How Digital Sovereignty Is Different -- A. Always Global -- B. Against Corporations -- C. More Control -- D. Enables Protectionism -- IV. Digital Sovereignty and the Russian Invasion of Ukraine -- V. The Plan for This Volume -- Part I Retheorizing Digital Sovereignty -- 1. Two Visions for Data Governance: Territorial vs. Functional Sovereignty -- I. Introducing Functional Sovereignty -- II. Asserting Functional Sovereignty -- III. Conclusion -- 2. A Starting Point for Re-thinking "Sovereignty" for the Online Environment -- I. Introduction -- II. The Point of Departure: Sovereignty Applies Online, but How? -- III. Three Examples Showcasing the Messy State of Sovereignty -- A. Sovereignty and Law Enforcement Access to Data -- B. Sovereignty and Content Removal Orders -- C. Sovereignty and Peacetime Cyber Espionage -- IV. Sovereignty and the Four Functions of International Law -- V. The Binary Nature of the Current Concept of Sovereignty -- VI. Sovereignty = "State" + "Exclusiveness"? -- VII. Sovereignty- Rule or Principle? -- VIII. "State Dignity"-the Core of Sovereignty -- A. Sovereignty Anchored in State Dignity-A Brief Illustration -- IX. Digital/Data Sovereignty-Political Slogan or Anchored in International Law? -- X. Concluding Remarks -- 3. Digital Sovereignty as Double-Edged Sword -- I. Introduction -- II. What Is Digital Sovereignty For? -- III. The Double-Edged Sword of Digital Sovereignty -- A. Speech -- B. Privacy. | |
505 | 8 | |a C. National Security -- IV. Conclusion -- 4. From Data Subjects to Data Sovereigns: Addressing the Limits of Data Privacy in the Digital Era -- I. Introduction -- II. Data Subjects vs. Data Sovereigns -- III. Data Privacy in the Time of Pandemic -- A. The Challenge of Non-Personalized Data -- B. From Tracking the Pandemic to Tracking Individuals -- C. The Illusory Promise of Consent -- IV. Beyond Privacy: From Data Subjects to Data Sovereigns -- V. Conclusion -- Part II Technology and Economic Institutions -- 5. Digital Sovereignty + Artificial Intelligence -- I. Introduction -- II. How Digital Sovereignty Might Influence AI -- A. Three Models -- B. Implications -- III. How AI Might Influence Digital Sovereignty? -- A. Three Models -- B. Implications -- IV. Key Variables -- A. Access to Training Data -- B. Industrial Policy -- C. National Laws and Norms -- D. Attitudes toward AI-Powered Machines -- V. Conclusion -- 6. Taobao, Federalism, and the Emergence of Law, Chinese Style -- I. Introduction -- II. Development and Legal Market Infrastructure -- III. Federalism, Chinese Style: Delegation and the Origins of Chinese Political and Economic Reform, 1981-1993 -- IV. Taobao and Law, Chinese Style -- A. Evolution of Law, Chinese Style -- B. Taobao Creates a Market -- C. Taobao's Private Legal System -- V. Taobao and the Evolution of Federalism, Chinese Style: Recentralization -- A. Decentralization and the Incomplete Common Market -- B. Taobao and the Formation of a Common Market -- C. Taobao and Recentralization -- VI. Conclusion -- 7. Leveling the Playing Field between Sharing Platforms and Industry Incumbents: Good Regulatory Practices? -- I. Introduction: Increasing Regulatory Fragmentation -- II. A Case Study: Regulating the Sharing Economy and Its "Enemies" -- A. Innovation: The Sharing Platforms -- B. Competition: The Incumbents. | |
505 | 8 | |a C. Regulation: Dynamic and Divergent Approaches -- III. Regulatory Cooperation on Platform Regulations: Good Regulatory Practices? -- A. Regulatory Cooperation Trends in the Regional Trade Agreements -- B. Good Regulatory Practices for Platform Regulations? -- IV. Conclusion: Regulatory Cooperation and Sovereignty -- 8. The Emergence of Financial Data Governance and the Challenge of Financial Data Sovereignty -- I. Introduction -- II. The Datafication of Finance -- III. Financial Data Governance and General Data Governance -- A. Regulating Financial Data -- B. The Evolution of Data Governance Styles -- IV. Open Banking -- V. Financial Data Governance Strategies -- A. Property-Based: United States -- B. Rights-Based: European Union -- C. Shared Resource: China -- D. Hybrid Models -- VI. Financial Data Sovereignty: Localization vs. Globalization -- A. Regulatory Fragmentation -- B. Territorialization and Data Localization -- VII. The Data Sovereignty Challenge -- Part III Trade Regulation -- 9. Data Sovereignty and Trade Agreements: Three Digital Kingdoms -- I. Data Sovereignty -- II. Data Sovereignty and Trade Agreements -- III. United States: The Firm Sovereignty Model -- A. Firm Sovereignty -- B. Privacy as a Consumer Right -- C. Security as a Business Risk -- D. Trade Agreements -- IV. China: The State Sovereignty Model -- A. Data Sovereignty -- B. Trade Agreements -- C. Personal Information Protection -- D. "Important Data" and "Core Data" -- V. EU: The Individual Sovereignty Model -- A. The GDPR -- B. Digital Sovereignty -- C. Data Flow and Localization -- D. Trade Agreements -- VI. Why the Differences? -- VII. Conclusion -- 10. Data Governance and Digital Trade in India: Losing Sight of the Forest for the Trees? -- I. Introduction -- II. Data Governance in India: Multiple Narratives, Multiple Frameworks -- A. Underlying Ideas of Data Governance. | |
505 | 8 | |a B. Policy Goals in Data Governance Instruments -- C. The "Data Governance Complex" in India -- III. Data Governance and Influences on Digital Trade Policies in India -- A. The Nexus of Data Governance and Digital Trade -- B. Digital Trade Policies Reinforce the Data Governance Complex -- C. India in the Global Digital Trade Framework -- IV. Conclusion -- 11. Creating Data Flow Rules through Preferential Trade Agreements -- I. Introduction -- II. Digital Trade Provisions in PTAs -- A. Developments over Time -- B. Overview of Data-Related Rules in PTAs -- III. Different PTA Templates for Digital Trade Governance -- A. The U.S. Template -- B. The Digital Trade Agreements of the European Union -- C. The RCEP -- IV. Conclusion -- Part IV Data Localization -- 12. Personal Data Localization and Sovereignty along Asia's New Silk Roads -- I. Types of "Data Sovereignty" and "Data Localization" -- II. China, Russia, and Near Neighbors on the New Silk Roads -- A. China's Data Localizations -- B. Russia's Data Localizations -- C. Comparison of Chinese and Russian Localizations -- III. South Asia: Three Bills Include Localizations -- A. Regional Agreements -- B. India -- C. Sri Lanka -- D. Pakistan -- E. Comparison of South Asian Provisions -- IV. Central Asia: Five Laws Include Some Localizations -- A. International and Regional Agreements -- B. Data Localization Measures in National Laws -- C. Local Processing and Storage (Loc #1 and #2) -- D. Data Export Conditions and Prohibitions (Loc #3 and #4) -- E. Extraterritoriality and Local Representation (Loc #5 and #6) -- F. "Outsourcing Exemptions" -- G. Comparison of Central Asian Provisions -- V. How Relevant Are Free Trade Agreements? -- A. Adequacy and the GATS -- B. The Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) -- C. The Regional Comprehensive Economic Partnership (RCEP). | |
505 | 8 | |a D. FTAs and the Future of Data Localization -- VI. Conclusion -- 13. Lessons from Internet Shutdowns Jurisprudence for Data Localization -- I. Motivations of Data Localization -- A. Cybersecurity-Protection (Control) of Domestic People -- B. Nurturing Domestic Digital Players and Tax Revenues -- II. Trade Rules Applied to Data Localizations -- A. Applicability of Trade Rules -- B. Trade-Rules-Based Arguments against Data Localization -- III. Regulating Internet Shutdowns through Human Rights Norms -- A. United Nations -- B. UN Special Rapporteurs on Freedom of Expressions -- C. Joint Declarations of Special Rapporteurs on Freedom of Expression -- D. Europe -- E. Turkish Domestic Courts -- F. Americas -- G. Brazil Domestic Courts -- H. Africa -- I. Asia -- IV. Adaptation of the Internet Shutdown Jurisprudence for Data Localization -- A. Synthesis of Jurisprudence on Internet Shutdowns -- B. Adaptation to Data Localization -- V. Conclusion -- 14. European Digital Sovereignty, Data Protection, and the Push toward Data Localization -- I. The Push Toward Data Localization in Europe -- II. The Need to Better Understand the Reasons behind Calls for Data Localization -- III. The Influence of the Schrems II Judgment of the CJEU -- A. The Starting Point: Data Localization Is Not in the GDPR's DNA -- B. Calls for Data Localization After Schrems II -- C. Initial EDPB Guidance: Toward De Facto Data Localization -- D. The New Model SCC's and EDPB's Final Guidance: A Degree of Room for a Risk-Based Approach? -- E. Intensification of Enforcement of Schrems II by European DPAs and Rejection of a Risk-Based Approach -- IV. Conclusion. | |
521 | |a Specialized. | ||
506 | 0 | |a Open access. | |
500 | |a Also issued in print: 2023. | ||
500 | |a "This is an open access publication, available online and distributed under the terms of a Creative Commons Attribution - Non Commercial - No Derivatives 4.0 International licence (CC BY-NC-ND 4.0)"--Title page verso. | ||
504 | |a Includes bibliographical references and index. | ||
520 | 8 | |a 'Data Sovereignty' explores the attempts by governments to place limits on the free movement of data across a global internet. Drawing on theories in political economy, international law, human rights, and data protection, this volume offers new theoretical perspectives and thought-provoking ideas about the nature and scope of digital sovereignty. | |
588 | |a Description based on online resource and publisher information; title from PDF title page (viewed on October 18, 2023). | ||
650 | 0 | |a Data sovereignty. | |
650 | 0 | |a Internet |x Law and legislation. | |
650 | 0 | |a Data protection |x Law and legislation. | |
650 | 0 | |a Data transmission systems |x Law and legislation. | |
650 | 0 | |a Digital media |x Law and legislation. | |
650 | 0 | |a Privacy, Right of. | |
650 | 0 | |a Computer networks |x Law and legislation. | |
650 | 7 | |a Law. |2 ukslc | |
650 | 7 | |a Laws of specific jurisdictions & specific areas of law. |2 thema | |
776 | 0 | 8 | |i Print version: |a Chander, Anupam |t Data Sovereignty |d Oxford : Oxford University Press, Incorporated,c2023 |z 9780197582794 |
700 | 1 | |a Chander, Anupam, |e editor. | |
700 | 1 | |a Sun, Haochen, |e editor. | |
830 | 0 | |a Oxford scholarship online. | |
906 | |a BOOK | ||
ADM | |b 2024-06-05 02:10:23 Europe/Vienna |f system |c marc21 |a 2023-11-17 14:00:33 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5351962550004498&Force_direct=true |Z 5351962550004498 |b Available |8 5351962550004498 |