Information sovereignty : data privacy, sovereign powers and the rule of law / Radim Polčák, Institute of Law and Technology, Faculty of Law, Masaryk University, Czech Republic; Dan Jerker B. Svantesson, Centre for Commercial Law, Faculty of Law, Bond University, Australia.
2017
K3264.C65 P65 2017 (Map It)
Available at Cellar
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Author
Title
Information sovereignty : data privacy, sovereign powers and the rule of law / Radim Polčák, Institute of Law and Technology, Faculty of Law, Masaryk University, Czech Republic; Dan Jerker B. Svantesson, Centre for Commercial Law, Faculty of Law, Bond University, Australia.
Published
Cheltenham, UK : Edward Elgar Publishing, [2017]
Copyright
©2017
Call Number
K3264.C65 P65 2017
ISBN
9781786439215 (cased)
1786439212 (cased)
9781786439222 (eBook)
1786439212 (cased)
9781786439222 (eBook)
Description
xvii, 268 pages ; 25 cm
System Control No.
(OCoLC)979264680
Summary
This thought-provoking work elaborates on the assumption that information privacy is, in its essence, comparable to information sovereignty. This seemingly rudimentary observation serves as the basis for an analysis of various information instruments in domestic and international law. It also provides for the method to resolve situations where informational domains of individuals and/or states collide. Information Sovereignty combines a philosophical and methodological analysis of the phenomena of information, sovereignty and privacy. It also encompasses more practical discussions of cybersecurity and cross-border processing of personal data, including in the context of cross-border discovery of digital evidence.-- Provided by Publisher.
Bibliography, etc. Note
Includes bibliographical references (pages 239-256) and index.
Record Appears in
Table of Contents
Foreword
viii
Acknowledgements
x
List of abbreviations
xi
Table of authorities
xiii
1.
Introduction
1
1.1.
Introduction
1
1.2.
developing area of great importance
2
1.3.
User guide (how to read this book)
4
2.
Potemkin's laws
6
2.1.
Catherine's `ought'
6
2.2.
Wiener's `is'
9
2.3.
Good rules
13
2.4.
Good facts
16
2.5.
Commanding sunsets
18
2.6.
spatial paradigm
22
2.7.
Commanding data
25
2.8.
Conclusion - a negative ontology of information law
27
3.
International information sovereignty
32
3.1.
Introduction
32
3.2.
To regulate or not to regulate, that was the question
34
3.3.
international legal system: public, and private, international law
40
3.4.
Jurisdiction
43
3.5.
Drawing upon analogies and metaphors from the offline world
48
3.6.
Territoriality and extraterritoriality
52
3.7.
Sovereignty
58
3.8.
Sovereignty, sovereign states and their `gods'
65
3.9.
duty of non-intervention
68
3.10.
Comity
70
3.11.
Due diligence and no harm
70
3.12.
Consent - not the central concept it is assumed to be
73
3.13.
Where does this leave us?
79
4.
Private information sovereignty
81
4.1.
century of privacy
81
4.2.
Being left to one's self
84
4.3.
Right to peace
86
4.4.
limits to privacy
89
4.5.
Information privacy and information sovereignty
94
4.6.
First implication - independent existence of privacy
96
4.7.
Second implication - limitation or justified infringement
100
4.8.
Third implication - carving one out of another
103
4.9.
Fourth implication - consent
104
4.10.
No implication - personal data
108
5.
legal culture of the horse
113
5.1.
Lex informatica vel lex nulla
113
5.2.
new legal tradition
120
5.3.
End of the law as we know it
124
5.4.
Efficiency spoiled by lawyers
128
5.5.
No hierarchy needed
130
5.6.
Floyd's way forward
133
5.7.
Methodological dilemma
135
6.
possible method for solving sovereignty clashes
140
6.1.
Introduction
140
6.2.
Legitimate interest and substantial connection - their common origin and similarity
143
6.3.
Substantial connection
144
6.4.
Legitimate interest
145
6.5.
Interest balancing
146
6.6.
proposed framework applied to data privacy
153
6.7.
Concluding remarks
153
7.
Cybersecurity for hedgehogs
155
7.1.
Virtualized security
155
7.2.
Privatized security
158
7.3.
Delocalized security
161
7.4.
Home or abroad
165
7.5.
No direct link between territory and data
167
7.6.
Object or procedure
173
7.7.
Diligent sovereigns
177
7.8.
Choosing the information sovereign
180
7.9.
Due diligence
182
7.10.
Foxes and hedgehogs
185
8.
Law enforcement for hedgehogs
188
8.1.
Introduction
188
8.2.
characteristics of the current landscape
189
8.3.
Jurisdiction, but what type and over what?
192
8.4.
unhelpful obsession with single-factor tests
195
8.5.
stranglehold of territoriality
197
8.6.
Applying the framework to law enforcement access to data
199
8.7.
Achieving change - a task for us all
205
9.
Cross-border data transfers for hedgehogs
207
9.1.
Introduction
207
9.2.
How data privacy law deals with cross-border data flows
211
9.3.
European data colonization through global delisting orders
223
9.4.
Concluding remarks
230
10.
Conclusions
233
Bibliography
239
Index
257