2017 Conceptualising the Right to Data Protection in an Era of Big Data

Total Page:16

File Type:pdf, Size:1020Kb

2017 Conceptualising the Right to Data Protection in an Era of Big Data Conceptualising the Right to Data Protection in an Era of Big Data ANGOR UNIVERSITY McDermott , Yvonne Big Data and Society DOI: 10.1177/2053951716686994 PRIFYSGOL BANGOR / B Published: 01/01/2017 Publisher's PDF, also known as Version of record Cyswllt i'r cyhoeddiad / Link to publication Dyfyniad o'r fersiwn a gyhoeddwyd / Citation for published version (APA): McDermott , Y. (2017). Conceptualising the Right to Data Protection in an Era of Big Data. Big Data and Society, 4(1), 1-7. https://doi.org/10.1177/2053951716686994 Hawliau Cyffredinol / General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. 29. Sep. 2021 Commentary Big Data & Society January-June 2017: 1–7 ! The Author(s) 2017 Conceptualising the right to data Reprints and permissions: sagepub.co.uk/journalsPermissions.nav protection in an era of Big Data DOI: 10.1177/2053951716686994 journals.sagepub.com/home/bds Yvonne McDermott Abstract In 2009, with the enactment of the Lisbon Treaty, the Charter of Fundamental Rights of the European Union entered into force. Under Article 8 of the Charter, for the first time, a stand-alone fundamental right to data protection was declared. The creation of this right, standing as a distinct right to the right to privacy, is undoubtedly significant, and it is unique to the European legal order, being absent from other international human rights instruments. This commentary examines the parameters of this new right to data protection, asking what are the principles underpinning the right. It argues that the right reflects some key values inherent in the European legal order, namely: privacy, transparency, autonomy and nondiscrimination. It also analyses some of the challenges in implementing this right in an era of ubiquitous veillance practices and Big Data. Keywords Big Data, Global Data Protection Regulation, privacy, veillance, human rights, transparency In 2009, with the enactment of the Lisbon Treaty, the Developing a fundamental right to Charter of Fundamental Rights of the European Union data protection entered into force. Under Article 8 of the Charter, for the first time, a stand-alone fundamental right to data The Data Protection Directive of 1995 made no men- protection was declared. The creation of this right, tion to a human right to data protection. As Van der standing as a distinct right to the right to privacy, is Sloot has argued, the original rules in the Data undoubtedly significant, and it is unique to the Protection Directive and related rules ‘could best be European legal order, being absent from other inter- regarded as principles of good governance’, as they national human rights instruments, such as the were not framed as relating to the human rights of International Covenant on Civil and Political Rights. the data subject, but rather focussed on the procedural However, the European Union ‘has neither adequately obligations of controllers (Van der Sloot, 2014). justified the introduction of the right to data protection By contrast, the Global Data Protection Regulation in the EU legal order nor explained its content.’ (GDPR) is expressly framed in terms of rights, with (Lynskey, 2014: 572). Article 1 noting that the Regulation ‘protects funda- This commentary examines the parameters of this mental rights and freedoms of natural persons and in new right to data protection, asking what the values particular their right to the protection of personal underpinning the right are. This piece also analyses data.’ Given that a right to privacy was well-established some of the challenges in implementing this right in in the European legal order for many years before the an era of ubiquitous ‘dataveillance’, or the systematic monitoring of citizen’s communications or actions through the use of information technology (Clarke, Bangor University, UK 1988), and ‘Big Data’, or the collection of large data- Corresponding author: sets, which are capable of being searched, aggregated, Yvonne McDermott, Bangor University, Bangor LL57 2DG, UK. and cross-referenced (Boyd and Crawford, 2012: 663). Email: [email protected] Creative Commons Non Commercial CC-BY-NC: This article is distributed under the terms of the Creative Commons Attribution- NonCommercial 3.0 License (http://www.creativecommons.org/licenses/by-nc/3.0/) which permits non-commercial use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage). 2 Big Data & Society drafting of the Charter, one might wonder what add- processing to those European Union activities that itional value or need was perceived to attach to a stand- fell outside the Data Protection Directive’s remit, alone right to data protection, especially given that the namely police and security co-operation (Article 29 European Court of Human Rights had, in a number of Working Party, 2009; Cannataci and Mifsud-Bonnici, cases, included data protection rights, including the 2005). That argument, while attractive, is not supported principle that data should only be used for the limited by the GDPR, which expressly excludes national secur- purpose for which it was gathered, within the ambit of ity activities and the processing of personal data in rela- Article 8 of the European Convention on Human tion to the Union’s common foreign and security policy Rights on the right to privacy (Peck, 2003). Yet, from the scope of the Regulation’s application. I argue while the right to data protection is closely related to below that the creation of the right could be traced to a the right to privacy, as well as the rights to freedom of number of distinct values inherent in the pre-existing thought, conscience and religion; freedom of expres- data protection framework – namely privacy, auton- sion; an effective remedy, and a fair trial, it has some omy, transparency and non-discrimination – that were distinct elements that justify its framing as a stand- perhaps seen as not being fully protected in the pre- alone right. These elements are: that data should be Charter fundamental rights framework, and that by processed fairly, for specific purposes, and only on placing data protection on an equal footing with exist- the basis of the consent of the person concerned or ing rights, those values were sought to be protected. some other legitimate basis set down in law; the right Aside from the uncertain legislative basis for its of access and rectification of data collected, and control incorporation, the nature of the right to data protection by an independent authority (Article 8, Charter of has sometimes been criticized as being necessarily of a Fundamental Rights). procedural nature, insofar as it ‘does not directly rep- This new construction effectively elevates established resent any value or interest per se; it prescribes the pro- principles of data protection to obligations incumbent cedures and methods for pursuing the respect of values on data processers in order to respect the rights of data embodied in other rights’ (de Andrade, 2012). subjects. In a Habermassian sense, this adds some nor- Determann, for example, is critical of the Schrems judg- mative force to the rights holder’s claim, insofar as indi- ment in pointing out that the claimant ‘could hardly viduals’ status is enhanced when they demand show any plausible harm or need of protection’ compliance with rights, as opposed to some moral obli- (Determann, 2016: 246). This arguably misses the gation (Habermas, 2010: 349). Indeed, the framing of point of fundamental rights protection; the recognition data protection as a right appears to have imposed of rights as fundamental reflect the norms underpinning much greater obligations on private actors than most a legal order (Palombella, 2007), and ‘plausible’ harm other human rights – it is difficult, for example, to think (whatever that might mean) need not be shown for a of another human right that product designers must violation to be proven. This is illustrated by the exten- take into account when developing new products, as sive jurisprudence on the right to a fair trial, for exam- is required under the GDPR. ple, where a violation can be found even where the Therefore, the creation of data protection as a dis- failure to respect a component of the right to a fair tinct right is both normatively and practically signifi- trial (such as the right to examine witnesses, or access cant. The reasons for the creation of this right are to a lawyer) has had no discernible impact on the out- somewhat unclear, however, and the explanations relat- come of the trial (Trechsel, 2005). Rights are recognised ing to the Charter provide little illustration in this as such because they protect particular values of a regard. It could be said to have been a reflection of polity, and whilst rights violations often result in ser- an increasing recognition of the right in domestic law ious harm to claimants, this is not a necessary compo- across Europe – the German Constitutional Court had nent of a claim because a breach of those rights is an developed the notion of ‘informational self-determina- attack on the values underpinning the legal system, and tion’, stemming from the constitutional principle of dig- that is the harm that human rights jurisprudence seeks nity, whilst, in France, the courts had begun to apply to protect against.
Recommended publications
  • Data Localization the Unintended Consequences of Privacy Litigation
    American University Law Review Volume 67 | Issue 3 Article 6 2018 Data Localization The ninU tended Consequences Of Privacy Litigation H Jacqueline Brehmer American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aulr Part of the Computer Law Commons, and the Privacy Law Commons Recommended Citation Brehmer, H Jacqueline (2018) "Data Localization The ninU tended Consequences Of Privacy Litigation," American University Law Review: Vol. 67 : Iss. 3 , Article 6. Available at: http://digitalcommons.wcl.american.edu/aulr/vol67/iss3/6 This Comment is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Data Localization The ninU tended Consequences Of Privacy Litigation Keywords cybersecurity threats, data localization, data privacy, Electronic Communications Privacy Act, Microsoft Ireland This comment is available in American University Law Review: http://digitalcommons.wcl.american.edu/aulr/vol67/iss3/6 NOTE DATA LOCALIZATION: THE UNINTENDED CONSEQUENCES OF PRIVACY LITIGATION H JACQUELINE BREHMER* This Note addresses a key unintended consequence of recent data privacy litigation before the European Court of Justice and the U.S. Supreme Court. Two cases—Data Protection Commissioner v. Schrems and United States v. Microsoft Corp.—contravene the principles upon which the internet was founded by removing legal and scalable mechanisms for cross-border data transfers. While these cases do not directly create data localization regimes, they highlight the irreconcilably different approaches to data privacy held by the United States and the European Union and eliminate valid options for transfer such that localization is the only remaining scalable solution.
    [Show full text]
  • Making the Cut? | SPECIAL REPORT | Sept
    DATA PRIVACY & SECURITY SPECIAL REPORT SEPT. 24, 2020 After EU judges struck down the Privacy Shield data-transfer agreement, what’s next for US tech Making giants, thousands of other companies and regulatory the Cut? regimes around the world? INSIGHT | COMMENTARY | ANALYSIS Editor’s Letter Lewis Crofts MLex Editor-in-Chief We have arranged it in three thematic sections to reflect the multiple moving parts of the topic: 1) the EU court’s decision and immediate effects on Facebook and other companies; 2) the scramble by the US and EU to work out what to do about replacing the binned agreement and making SCCs more robust; and headache. A bombshell. A seismic shift. 3) the concerns and responses by other affected However dramatic you might like your countries around the world — including the UK, A metaphors, there is little doubt that EU Japan and Australia. judges delivered an extraordinarily significant We trust you enjoy reading this report and ruling on July 16. In striking down Privacy Shield, find it a useful guide to a complex, evolving issue. the EU-US data-transfer framework, they instantly The reporting here is a brief example of the threw into doubt the operations of more than insight and predictive analysis that MLex brings 5,000 US companies that relied on it. subscribers to our data privacy and security The ruling — essentially based on the failure service every day. of the mechanism to protect EU citizens’ data The stories included were all published from US government snooping — doesn’t as events unfolded, bringing our subscribers prevent companies transferring data between unrivalled insight into the significance of the EU and other foreign countries under developments and the likely next steps in an issue “standard contractual clauses.” But these can’t that will affect the operations of many thousands protect data in countries, including the US, that of businesses around the world.
    [Show full text]
  • Canadian Cross-Border Data: Your Data May Be Heading South Even When You Are Not
    Canada Institute | May 2019 Canadian Cross-Border Data: Your Data May Be Heading South Even When You Are Not By Jacqueline Orr Canadian data: what goes where? Canada is fast becoming a technology powerhouse with cities across the country such as Waterloo, Calgary, Toronto, Montreal, and Edmonton transforming into tech hubs. They promise that their research centers and internet companies are going to light the way for Canada’s innovation economy. But the state of Canada’s internet is increasingly becoming an oxymoron. While Canada’s internet economy might be self-sustaining, the Canadian internet itself is not. Issues of territoriality are fluid and unbound. This is because Canada’s network infrastructure relies on American networks to transfer and store data. But, when Canadian data enters the United States, it becomes foreign data and is not protected by the same privacy rights as those accorded to U.S. domestic data and its owners. CIRA, the Canadian Internet Registration Authority, states that three-quarters of the Canadian population spends three to four hours a day online.1 CIRA also reports 64 percent of Canadians are concerned about the security of their personal information when it is routed through the United States. Are these concerns justified? This Canada Institute briefing explores key questions about cross-border data travel to better understand the risks and opportunities facing Canadians in an increasingly inter-connected world. There is a glossary at the end of the document. Is it legal for the U.S. government to collect data from Canadians? Yes. U.S. government agencies may collect any foreign data that crosses into U.S.
    [Show full text]
  • A/74/130 General Assembly
    United Nations A/74/130 General Assembly Distr.: General 30 July 2019 Original: English Seventy-fourth session Item 109 of the provisional agenda* Countering the use of information and communications technologies for criminal purposes Countering the use of information and communications technologies for criminal purposes Report of the Secretary-General Summary The present report has been prepared pursuant to General Assembly resolution 73/187, entitled “Countering the use of information and communications technologies for criminal purposes”. In that resolution, the General Assembly requested the Secretary-General to seek the views of Member States on the challenges that they faced in countering the use of information and communications technologies for criminal purposes and to present a report based on those views for consideration by the General Assembly at its seventy-fourth session. The report contains information on the views of Member States submitted pursuant to the aforementioned resolution. __________________ * A/74/150. V.19-08182 (E) 190819 200819 *1908182* A/74/130 Contents Page I. Introduction ................................................................... 4 II. Replies received from Governments ............................................... 4 Argentina ..................................................................... 4 Armenia ...................................................................... 6 Australia ..................................................................... 8 Austria ......................................................................
    [Show full text]
  • Data Transfers to the US Since the Schrems II
    Data transfers to the U.S. since the Schrems II judgement: An analysis seeking to integrate GAFAM and major providers in the E.U. enforcement strategy Tilburg Institute for Law, Technology and Society, Tilburg University LL.M. Law and Technology Janvier Parewyck SNR 2065486 June 2021 Supervisor: Prof. Dr. Eleni Kosta Second Reader: Dr. Irene Kamara Table of Content Chapter 1 – Introduction ...................................................................................................................... 4 1.1 Background ................................................................................................................................... 4 1.2 Problem Statement ........................................................................................................................ 8 1.3 Methodology and limitations ......................................................................................................... 8 1.4 Narrative structure ......................................................................................................................... 9 Chapter 2 – Lawfulness of data transfers in EU law up to the Schrems II judgement and the invalidation of the Privacy Shield ...................................................................................................... 10 2.1 Introduction ................................................................................................................................. 10 2.2 The GDPR regime and the ‘accountability’ principle ................................................................
    [Show full text]
  • EU Digital Policy and International Trade
    EU Digital Policy and International Trade March 25, 2021 Congressional Research Service https://crsreports.congress.gov R46732 SUMMARY R46732 EU Digital Policy and International Trade March 25, 2021 A “Europe fit for the digital age” is a top European Union (EU) priority and a key part of EU economic recovery efforts from the Coronavirus Disease 2019 (COVID-19) pandemic. Under the Rachel F. Fefer European Commission’s digital policy roadmap, “Shaping Europe’s Digital Future,” the EU aims Analyst in International to strengthen the EU economy and improve the region’s digital competitiveness, especially with Trade and Finance the United States and China. The EU initiative may raise several issues for Congress, such as the impact on U.S. firms doing business in the EU and U.S. leadership in setting global digital rules and standards. The initiative may also offer the potential for partnership between the United States and the EU to address areas of common concern. The EU has several digital efforts underway, including The draft “Digital Markets Act (DMA)” that aims to establish competition rules for large online platforms designated as “gatekeepers” and specify a list of “do’s and don’ts” among other requirements. The draft “Digital Services Act (DSA)” that seeks to modernize the 2000 E-Commerce Directive, which set the legal framework for online services in the EU, and set liability rules related to illegal online content and products, transparency, and other requirements for all online intermediary services. The enacted General Data Protection Regulation (GDPR), which took effect in 2018 and creates obligations on firms and rights for individuals regarding processing of personal data, including cross-border data flows.
    [Show full text]
  • Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security
    International Journal of Communication 10(2016), 2221–2237 1932–8036/20160005 Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security TATEVIK SARGSYAN American University, USA Due to the increased awareness of the politics embedded in Internet technologies, there has been a growing tendency for state and nonstate actors around the world to leverage Internet infrastructure configurations to attain various political and economic objectives. Governments push for infrastructure modifications in pursuit of economic development, data privacy and security, and law enforcement and surveillance effectiveness. Information intermediaries set and enact their infrastructure to maximize revenue by enabling data collection and analytics, but have the capacity to implement tools for protecting privacy and limiting government surveillance. Relying on a conceptual framework of the politics of infrastructure, this article explores tensions and competing interests that emerge around intermediaries’ technical and policy infrastructure through analysis of (a) data localization strategies in a number of countries and (b) privacy and security undertakings by information intermediaries. Keywords: privacy, security, Internet infrastructure, surveillance, data localization The Politics of Infrastructure Governments across the world have come to recognize the importance of information intermediaries’ infrastructure for national security, public safety, and other political interests. Law enforcement and intelligence agencies are tasked with addressing various challenges, including the growth of terrorism, cyberattacks, cybercrime, fraud, and—in some regimes—political opposition and social movements. To pursue these goals, government agencies often need to access communications data that are beyond their immediate control, facilitated by a handful of information intermediaries. These companies mediate content by providing online services and communication platforms to global users.
    [Show full text]
  • Internet & Jurisdiction and ECLAC Regional Status Report 2020
    2020 & INTERNET JURISDICTION AND ECLAC REGIONAL STATUS REPORT REGIONAL STATUS REPORT 2020 ECLAC AND INTERNET & JURISDICTION Thank you for your interest in this ECLAC publication ECLAC Publications Please register if you would like to receive information on our editorial products and activities. When you register, you may specify your particular areas of interest and you will gain access to our products in other formats. www.cepal.org/en/publications ublicaciones www.cepal.org/apps INTERNET & JURISDICTION AND ECLAC REGIONAL STATUS REPORT 2020 This report was commissioned by the Secretariat of the Internet & Jurisdiction Policy Network (I&JPN) and the United Nations Economic Commission for Latin America and the Caribbean (ECLAC), and was authored by Carlos Affonso Souza. The report represents the author’s best endeavour to map the current ecosystem and trends in Latin America and the Caribbean on the basis of desk research and stakeholder surveys and interviews. The completeness of the information cannot be guaranteed, however, as this report constitutes a first regional baseline with regard to the state of jurisdiction over the Internet. ECLAC and the I&JPN Secretariat are grateful for the financial and institutional support of the Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ), acting on behalf of the German Federal Ministry for Economic Cooperation and Development (BMZ), which enabled this report to be produced. The views expressed in this document are those of the authors and do not necessarily reflect the views of the
    [Show full text]
  • New NAFTA's Chapters 14 and 19: a Continental Privacy Regime
    New NAFTA’s Chapters 14 and 19: A Continental Privacy Regime 20th Annual Privacy and Security Conference February 2019 Presented by: Constantine Karbaliotis, Director National Cybersecurity & Privacy Practice Session Description At the end of September 2018, the US, Canada and Mexico finally concluded the New NAFTA and it has significant impact on privacy and organisations’ privacy programs. The goal of the agreement is to establish free(er) trade, and Chapters 14 and 19’s goal is to create a continental free trade zone in digital goods and services. The Chapter puts heavy emphasis on the countries’ development of privacy regulation and collaboration in the area of personal information protection, and the use of the APEC members Privacy Framework and Cross Border Privacy Rules to support adequate data protection and cross-border data flows. Very importantly, it largely prohibits data localization requirements. PwC’s privacy team (US and Canada), will discuss its provisions and how the agreement presents both challenges and opportunities to organisations operating in North America (and globally). Take-away: ● Impact of New NAFTA on privacy ● Data localization and how it is impacted ● Leveraging the APEC Framework and CBPR for compliance 20th Annual Privacy and Security Conference February 2019 PwC 2 Three Amigos… Again? The New NAFTA: • US: USMCA • Canada: CUSMA • Mexico: T-MEC 20th Annual Privacy and Security Conference February 2019 PwC 3 New NAFTA Chapter 19 — Digital Trade • The New NAFTA creates a continental market in digital goods
    [Show full text]
  • The Law of Informational Capitalism
    AMY KAPCZYNSKI The Law of Informational Capitalism The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power BY SHOSHANA ZUBOFF PUBLICAFFAIRS, 2019 Between Truth and Power: The Legal Constructions of Informational Capitalism BY JULIE E. COHEN OXFORD UNIVERSITY PRESS, 2019 abstract. Over the past several decades, our capacity to technologically process and ex- change data and information has expanded dramatically. An early sense of optimism about these developments has given way to widespread pessimism, in the wake of a wave of revelations about the extent of digital tracking and manipulation. Shoshana Zuboff’s book, The Age of Surveillance Capitalism, has been hailed by many as the decisive account of the looming threat of private power in the digital age. While the book offers important insights, Zuboff’s account is too narrow: it fixates on technological threats to our autonomy and obscures the relationship between technology and the problems of monopoly, inequality, and discriminatory hierarchy that threaten our democ- racy. Zuboff’s book also fails to appreciate the critical role that law plays in the construction and persistence of private power. Julie Cohen’s book, Between Truth and Power: The Legal Constructions of Informational Capitalism, gives us a much better framework to comprehend intensifying forms of private power today and the role that law has played in supporting them. Drawing on Cohen’s insights, I construct an account of the “law of informational capitalism,” with particular attention to the law that undergirds platform power. Once we come to see informational capitalism as con- tingent upon specific legal choices, we can begin to consider how democratically to reshape it.
    [Show full text]
  • Data Governance in the Digital Age a Cigi Essay Series
    DATA GOVERNANCE IN THE DIGITAL AGE A CIGI ESSAY SERIES I CONTENTS Introduction Data Governance in the Digital Age . 2 Rohinton P. Medhora Rationale of a Data Strategy Considerations for Canada’s National Data Strategy . 6 Teresa Scassa The Economics of Data: Implications for the Data-driven Economy . 14 Dan Ciuriak The Government’s Role in Constructing the Data-driven Economy . 20 Blayne Haggart Canadian Network Sovereignty: A Strategy for Twenty-First-Century National Infrastructure Building . 26 Andrew Clement The Role of a Data Strategy for Canadian Industries Treasure of the Commons: Global Leadership through Health Data . 34 Sachin Aggarwal Monetizing Smart Cities: Framing the Debate . 43 Kurtis McBride Big Data: The Canadian Opportunity . 47 Ian MacGregor Balancing Privacy and Commercial Values Preventing Big Data Discrimination in Canada: Addressing Design, Consent and Sovereignty Challenges . 54 Jonathan Obar and Brenda McPhail Data and the Future of Growth: The Need for Strategic Data Policy . 63 Dan Breznitz Domestic Policy for Data Governance Ungoverned Space: How Surveillance Capitalism and AI Undermine Democracy . 70 Taylor Owen Screen Time, the Brain, Privacy and Mental Health . 75 Norman Doidge Governance Vacuums and How Code Is Becoming Law . 81 Bianca Wylie Measuring the Economy in an Increasingly Digitalized World: Are Statistics Up to the Task? . 86 André Loranger, Amanda Sinclair and James Tebrake International Policy Considerations Data Libera? Canada’s Data Strategy and the Law of the Sea . 92 Ariel Katz Data Rules in Modern Trade Agreements: Toward Reconciling an Open Internet with Privacy and Security Safeguards . 99 Michael Geist Data Minefield? How AI Is Prodding Governments to Rethink Trade in Data .
    [Show full text]
  • Data Localization Laws in a Digital World
    Data localization laws in a digital world Data protection or data protectionism? Neha Mishra LLM in Public International Law, Class of 2011, London School of Economics and Political Science Master in Public Policy, Class of 2015 National University of Singapore ©Jaroslaw Puszczyński ABSTRACT Data localization laws are emerging as a pernicious form of non-tariff barrier which significantly harms the growth of trade in a digitally powered world. An International Political Economy approach provides a more comprehensive analysis of the policy rationale behind such laws, as compared to a purely economic approach, which only focuses on economic losses resulting from protectionism. On a closer analysis, it is found that different countries may have different policy rationales for implementing data localization laws – while some promote their domestic ICT industry through forced localization measures, others have concerns regarding national security, privacy, and ensuring sovereign control in the highly privatized world of internet governance. It is not always possible to demarcate the “protectionist” rationale from that of rational “data protection”. To address data localization effectively and facilitate digital trade, it is not sufficient to negotiate for free flow of data in trade agreements without Governments and companies being open and transparent about the related issues of privacy, national security and consumer protection. Particularly, the role of US Government as well as leading US-based technology companies will be instrumental in this regard. At the same time, it may be necessary to develop policy initiatives both to encourage transparent and clear international standards on data security, as well as to enable higher levels of digital innovation in developing countries such that they can harness the benefits of evolving internet technologies.
    [Show full text]