Litigating Data Sovereignty Abstract
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Storm on the Horizon
Storm on the Horizon: HOW THE U.S. CLOUD ACT MAY INTERACT WITH FOREIGN ACCESS TO EVIDENCE AND DATA LOCALIZATION LAWS Shelli Gimelstein TABLE OF CONTENTS I. Introduction 3 II. The CLOUD Act 5 A. Certification Requirements 5 B. Limitations on Orders 5 1. QFG Requests 5 2. Challenging Orders in Court 6 3. U.S. Requests for Data Located in a non-QFG 8 III. Potential Conflicts of Law 9 A. Forced Decryption and the UK Investigatory Powers Act 9 B. UK Overseas Production Orders Bill 10 C. EU Legislation 11 1. General Data Protection Regulation 11 2. E-Evidence Directive 12 D. Australia’s Assistance and Access Act 13 E. Data Localization Laws 14 IV. Impact on Providers & Conclusions 18 Storm on the Horizon: How the U.S. CLOUD Act May Interact with Foreign Access to Evidence and Data Localization Laws I. INTRODUCTION Frustrated by the complex and inefficient process of obtaining online data stored by technology companies around the world, the U.S., EU, and numerous other governments have recently enacted legislation making it easier for them to access users’ data in connection with criminal investigations. As a result of the U.S. Clarifying Legal Overseas Use of Data Act (“CLOUD Act”)1, the EU’s General Data Protection Regulation (“GDPR”), and various countries’ data protection and localization laws, technology companies—in particular, online service providers—face rapidly shifting legal landscapes and practical considerations underlying their decisions about where to store user data. U.S.-based providers have particular cause for concern: while the Stored Communications Act (SCA) previously blocked them from disclosing U.S.-held communications content requested by foreign governments, the CLOUD Act amended the SCA to permit foreign governments that have entered into executive agreements with the U.S. -
Data Localization Requirements Across Different Jurisdictions 70
The Localisation Gambit Unpacking Policy Measures for Sovereign Control of Data in India 19th March, 2019 By Arindrajit Basu, Elonnai Hickok, and Aditya Singh Chawla Edited by Pranav M Bidare, Vipul Kharbanda, and Amber Sinha Research Assistance Anjanaa Aravindan The Centre for Internet and Society, India Acknowledgements 2 Executive Summary 3 Introduction 9 Methodology 10 Defining and Conceptualizing Sovereign Control of Data 11 Mapping of Current Policy Measures for Localization of Data in India 13 The Draft Personal Data Protection Bill, 2018 13 Draft E-commerce Policy (s) 17 RBI Notification on ‘Storage of Payment System Data’ 19 Draft E-Pharmacy Regulations 20 FDI Policy 2017 20 National Telecom M2M Roadmap 21 Unified Access License for Telecom 21 Companies Act, 2013 and Rules 21 The IRDAI (Outsourcing of Activities by Indian Insurers) Regulations, 2017 22 Guidelines on Contractual Terms Related to Cloud Services 22 Reflecting on Objectives, Challenges and Implications of National Control of Data 24 Enabling Innovation and Economic Growth 24 Enhancing National Security and Law Enforcement Access 34 Law Enforcement Access 34 Protecting Against Foreign Surveillance 36 Threat to fibre-optic cables 37 Widening Tax Base 40 Data Sovereignty and India’s Trade Commitments 41 A Survey of Stakeholder Responses 48 Data Localisation Around the World 49 Conclusions and Recommended Approaches 61 Annexure I 70 Mapping Data Localization Requirements Across Different Jurisdictions 70 Annexure 2 75 A survey of stakeholder responses 75 1 Acknowledgements The authors would like to thank Pranav MB, Vipul Kharbanda, Amber Sinha, and Saumyaa Naidu for their invaluable edits and comments on the draft. -
From Safe Harbor to Choppy Waters: Youtube, the Digital Millennium Copyright Act,And a Much Needed Change of Course
Vanderbilt Journal of Entertainment & Technology Law Volume 10 Issue 1 Issue 1 - Fall 2007 Article 3 2007 From Safe Harbor to Choppy Waters: YouTube, the Digital Millennium Copyright Act,and a Much Needed Change of Course Lauren B. Patten Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Lauren B. Patten, From Safe Harbor to Choppy Waters: YouTube, the Digital Millennium Copyright Act,and a Much Needed Change of Course, 10 Vanderbilt Journal of Entertainment and Technology Law 179 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol10/iss1/3 This Note is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. From Safe Harbor to Choppy Waters: YouTube, the Digital Millennium Copyright Act, and a Much Needed Change of Course ABSTRACT YouTube.com, named Time magazine's "Invention of the Year" for 2006 and widely recognized as the most-visited video site on the Internet, has changed the face of online entertainment. With the site's acquisition by Google in October 2006, the possibilities for YouTube's growth became truly endless. However, there is a darker side to the story of the Internet sensation, one that is grounded in its potential liability for copyright infringement. The issue is that many of the most-viewed and most-popular videos on the site are copyrighted. -
Tulane Journal of Technology and Intellectual Property
TULANE JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY VOLUME 10 FALL 2007 Increasing Access to Knowledge Through Fair Use—Analyzing the Google Litigation To Unleash Developing Countries Douglas L. Rogers* I. ACCESS TO KNOWLEDGE ...................................................................... 3 II. IN SPITE OF THE COPYING OF COMPLETE WORKS, THE PROVISION OF LIMITED INFORMATION FROM THE GOOGLE DATABASE MAKES THE LIBRARY PROJECT A FAIR USE ........................ 7 A. The Google Library Litigation ................................................... 7 B. Fair Use Is a Crucial Element of the Copyright Balance ........ 11 C. Increasing Access Favors Fair Use ........................................... 21 1. Sony: Time-Shifting Is a Fair Use ................................... 21 2. Campbell: Increasing Access Through Transformative Works Favors Fair Use ........................... 27 3. Summary .......................................................................... 30 D. It Is the End Result that Counts in Determining Fair Use ............................................................................................. 31 1. Fair Use Seeks a Balanced Result ................................... 31 2. Interim Scanning of a Picture and Then Modifying It ...................................................................... 33 a. Kelly v. Arriba Soft Corp. ....................................... 33 b. Bill Graham Archives v. Dorling Kindersley Ltd. ............................................................................ 35 * © 2007 -
High Technology, Consumer Privacy, and U.S. National Security
Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2015 High Technology, Consumer Privacy, and U.S. National Security Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1457 http://ssrn.com/abstract=2563573 Bus. L. Rev. (forthcoming) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Constitutional Law Commons, Consumer Protection Law Commons, Fourth Amendment Commons, and the National Security Law Commons HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY Laura K. Donohue* I. INTRODUCTION Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. 1 The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security. The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act.2 The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act.3 The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking.4 The companies involved read like a who’s who of U.S. -
Overcoming Constitutional Objections to the CLOUD Act Peter Swire & Justin Hemmings Introduction in 2018, the U.S
Issue Brief February 2020 Overcoming Constitutional Objections to the CLOUD Act Peter Swire & Justin Hemmings Introduction In 2018, the U.S. passed the Clarifying Lawful Overseas Use of Data Act (the “CLOUD Act” or “Act”) in response to two related but distinct issues. The first part of the Act clarifies rules governing U.S. law enforcement access to data in the hands of U.S. providers, and in doing so mooted the pending Supreme Court case United States v. Microsoft (the “Microsoft Ireland” case). Microsoft argued that a U.S. warrant had no legal force to compel the production of emails stored on a server in Ireland. To resolve that question of law, the first part of the CLOUD Act provides that compelled disclosure orders issued by the U.S. will apply “regardless of whether such communication, record, or other information is located within or outside of the United States.”1 The second part of the CLOUD Act responds to foreign governments’ access to data in the hands of U.S. providers. Under the Stored Communications Act (SCA),2 which is part of the Electronic Communications Privacy Act (ECPA),3 service providers are generally prohibited from responding to a foreign government request for the content of communications except upon receipt of a court order signed by a U.S. judge. This prohibition applies even when the foreign government seeks to access data regarding its own nationals in the investigation of a local crime. With the prevalence of cloud computing, evidence for ordinary criminal investigations increasingly is held on servers in different countries. -
Parker V. Yahoo!, Inc
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA GORDON ROY PARKER : CIVIL ACTION : v. : : YAHOO!, INC., et al. : NO. 07-2757 MEMORANDUM AND ORDER McLaughlin, J. September 25, 2008 Plaintiff Gordon Roy Parker (“Parker”), pro se, brings this action against Defendants Yahoo!, Inc. (“Yahoo”) and Microsoft Corporation (“Microsoft”), alleging copyright infringement, breach of contract, and negligence. Before the Court are the defendants’ motions to dismiss. The Court will grant in part and deny in part these motions. I. The Complaint Parker is the author of several registered works including Outfoxing the Foxes and Why Hotties Choose Losers , both which are published online and are freely available from Parker’s website. Defendants Yahoo and Microsoft own and operate widely used internet search engines. Parker alleges that these search engines create and republish unauthorized “cached” copies of his works. That is, when an internet user runs a search on either of the defendants’ search engines, the search results include hyperlinks to archived, or “cached,” copies of the web pages that are responsive to the user’s inquiry. A user may view these search results either by following a hyperlink to the original website or, alternatively, by viewing the “cached” copy that is hosted on the defendants’ computers. Parker concedes in his complaint that the defendants each provide opt-out mechanisms that would prevent his websites from being cached, but that Parker has not made use of them. Parker claims that by making cached copies of his websites available to their users, both Yahoo and Microsoft republish his works in their entirety without his permission. -
GDPR, CCPA, & Beyond
GDPR, CCPA, & Beyond: 16 PRACTICAL STEPS TOWARDS GLOBAL DATA PRIVACY COMPLIANCE WITH TALEND By Sunil Soares and Jean-Michel Franco 2019 Edition Contents Introduction . 66 Understanding the fair information practice principles . 66. An overview of data protection & sovereignty legislation . .66 . EMEA Asia Pacific Americas A practical approach towards global compliance . 66 . 1 . Develop data governance policies, standards & controls 2 . Create data taxonomy 3 . Confirm data owners 4 . Identify critical datasets & critical data elements 5 . Establish data collection standards 6 . Define acceptable use standards 7 . Implement data security 8 . Conduct data protection impact assessments 9 . Conduct vendor risk assessments 10 . Improve data quality 11 . Stitch data lineage 12 . Govern analytical models 13 . Manage end user computing 14 . Govern the lifecycle of information 15 . Set up data sharing agreements 16 . Enforce compliance with controls Summary . 66 About information asset & Talend . 66. About the authors . .66 . 2 Gdpr, Ccpa, & Beyond: 16 Practical Steps Towards Global Data Privacy Compliance with Talend Introduction Data privacy and protection are increasingly capturing the attention of business leaders, citizens, law enforcement agencies and governments . Data regulations, whose reach used to be limited to heavily regulated industries such as banking, insurance, healthcare or life sciences are now burgeoning across countries and apply to any business no matter its size or industry, highlighting the importance of a concept called data sovereignty . Data sovereignty refers to legislation that covers information that is subject to the laws of the country in which the information is located or stored . It impacts the protection of data and is affected by governmental regulations for data privacy, data storage, data processing, and data transfers across country boundaries . -
Cybersecurity, Sovereignty and U.S. Foreign Policy
CYBERSECURITY , SOVEREIGNTY AND U.S. F OREIGN POLICY 21st Century Leaders Council 2014 CYBERSECURITY ROUNDTABLE (with NCAFP Policy Recommendations) NEW YORK CITY Tuesday, November 4, 2014 Our Mi ssion The National Committee on American Foreign Policy (NCAFP) was founded in 1974 by Professor Hans J. Morgenthau and others. It is a nonprofit activist think tank dedicated to the resolution of conflicts that threaten U.S. interests. Toward that end, the NCAFP identifies, articulates, and helps advance American foreign policy interests from a nonpartisan perspective within the framework of political realism. American foreign policy interests include: • preserving and strengthening national security; • supporting countries committed to the values and the practice of political, religious, and cultural pluralism; • improving U.S. relations with the developed and developing worlds; • advancing human rights; • encouraging realistic arms control agreements; • curbing the proliferation of nuclear and other unconventional weapons; • promoting an open and global economy. An important part of the activity of the NCAFP is Track I½ and Track II diplomacy. Such closed-door and off-the-record endeavors provide unique opportunities for senior U.S. and foreign officials, think tank experts, and scholars to engage in discussions designed to defuse conflict, build confidence, and resolve problems. Believing that an informed public is vital to a democratic society, the National Committee offers educational programs that address security challenges facing the United States and publishes a variety of publications, including its bimonthly journal, American Foreign Policy Interests, that present keen analyses of all aspects of American foreign policy. CONTENTS Introduction . .1 Summary of Discussions . .3 Panel 1: Connected Choices: The Internet and Sovereign Decision Making. -
Cross-Border Data Sharing Under the CLOUD Act
Cross-Border Data Sharing Under the CLOUD Act Stephen P. Mulligan Legislative Attorney April 23, 2018 Congressional Research Service 7-5700 www.crs.gov R45173 Cross-Border Data Sharing Under the CLOUD Act Summary Law enforcement officials in the United States and abroad increasingly seek access to electronic communications, such as emails and social media posts, stored on servers and in data centers in foreign countries. Because the architecture of the internet allows technology companies to store data at a great distance from the physical location of their customers, electronic communications that could serve as evidence of a crime often are not housed in the same country where the crime occurred. This disconnect has caused governments around the world, including the United States, to seek data stored outside their territorial jurisdictions. In the Clarifying Lawful Overseas Use of Data (CLOUD) Act, Congress enacted one of the first major changes in years to U.S. law governing cross-border access to electronic communications held by private companies. The CLOUD Act has two major components. The first facet addresses the U.S. government’s ability to compel technology companies to disclose the contents of electronic communications stored on the companies’ servers and data centers overseas. The Stored Communications Act (SCA) mandates that certain technology companies disclose the contents of electronic communications pursuant to warrants issued by U.S. courts based on probable cause that the communications contain evidence of a crime. But a dispute arose over whether warrants issued under the SCA could compel disclosure of data held outside the territorial jurisdiction of the United States. -
NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament. -
Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security
International Journal of Communication 10(2016), 2221–2237 1932–8036/20160005 Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security TATEVIK SARGSYAN American University, USA Due to the increased awareness of the politics embedded in Internet technologies, there has been a growing tendency for state and nonstate actors around the world to leverage Internet infrastructure configurations to attain various political and economic objectives. Governments push for infrastructure modifications in pursuit of economic development, data privacy and security, and law enforcement and surveillance effectiveness. Information intermediaries set and enact their infrastructure to maximize revenue by enabling data collection and analytics, but have the capacity to implement tools for protecting privacy and limiting government surveillance. Relying on a conceptual framework of the politics of infrastructure, this article explores tensions and competing interests that emerge around intermediaries’ technical and policy infrastructure through analysis of (a) data localization strategies in a number of countries and (b) privacy and security undertakings by information intermediaries. Keywords: privacy, security, Internet infrastructure, surveillance, data localization The Politics of Infrastructure Governments across the world have come to recognize the importance of information intermediaries’ infrastructure for national security, public safety, and other political interests. Law enforcement and intelligence agencies are tasked with addressing various challenges, including the growth of terrorism, cyberattacks, cybercrime, fraud, and—in some regimes—political opposition and social movements. To pursue these goals, government agencies often need to access communications data that are beyond their immediate control, facilitated by a handful of information intermediaries. These companies mediate content by providing online services and communication platforms to global users.