Written by a renowned expert on data protection law, this work examines the history, policies, and future of transborder data flow regulation, and is the only text to provide a detailed legal analysis of its global implications.
The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack “adequate” protection of privacy. If enforced as written, the Directive could create enormous obstacles to commerce between Europe and other countries, such as the United States, that do not have comprehensive privacy statutes. In this book, Peter Swire and Robert Litan provide the first detailed analysis of the sector-by-sector effects of the Directive. They examine such topics as the text of the Directive, the tension between privacy laws and modern information technologies, issues affecting a wide range of businesses and other organizations, effects on the financial services sector, and effects on other prominent sectors with large transborder data flows. In light of the many and significant effects of the Directive as written, the book concludes with detailed policy recommendations on how to avoid a coming trade war with Europe. The book will be of interest to the wide range of individuals and organizations affected by the important new European privacy laws. More generally, the privacy clash discussed in the book will prove a major precedent for how electronic commerce and world data flows will be governed in the Internet Age.
The new edition of this acclaimed book has been expanded to give a fully updated overview of European data protection law, with a focus on data protection compliance issues affecting companies, and incorporating the important legal developments which have taken place since the last edition was published. These include the first three cases of the European Court of Justice interpreting the EU Data Protection Directive (95/46); accession of new Member States to the EU; the new Data Retention Directive; new developments on international data transfers, such as model contracts and binding corporate rules; and conflicts between US security requirements and EU data protection law. The book provides pragmatic guidance for companies faced with data protection compliance issues. It includes extensive appendices, such as texts of the relevant directives, model contracts, and overviews of Member State implementations.
This book focuses on the PRC’s cross-border data transfer legislation in recent years, as well as the implications for international trade law. The book addresses the convergence of industries and technologies notably caused by digitization; the issue of conflicts between goods and services; and the General Agreement on Tariffs and Trade (GATT) and General Agreement on Trade in Services (GATS) as well as the difficulty of classifying service sectors under WTO members’ commitments. The book also examines the FTAs that entered into force after 2012 that regulate digital trade beyond the venue of the WTO and analyzes their rules of relevance for cross-border data flows and international trade. It asks whether and how these FTAs have deliberately reacted to the increasing importance of data flows as well as to the trouble of governing them in the context of global governance
Artificial intelligence (AI) technologies are transforming economies, societies, and geopolitics. Enabled by the exponential increase of data that is collected, transmitted, and processed transnationally, these changes have important implications for international economic law (IEL). This volume examines the dynamic interplay between AI and IEL by addressing an array of critical new questions, including: How to conceptualize, categorize, and analyze AI for purposes of IEL? How is AI affecting established concepts and rubrics of IEL? Is there a need to reconfigure IEL, and if so, how? Contributors also respond to other cross-cutting issues, including digital inequality, data protection, algorithms and ethics, the regulation of AI-use cases (autonomous vehicles), and systemic shifts in e-commerce (digital trade) and industrial production (fourth industrial revolution). This title is also available as Open Access on Cambridge Core.
This book brings together a series of contributions by leading scholars and practitioners to examine the main features of smart contracts, as well as the response of key stakeholders in technology, business, government and the law. It explores how this new technology interfaces with the goals and content of contract law, introducing and evaluating several mechanisms to improve the 'observability' and reduce the costs of verifying contractual obligations and performance. It also outlines various 'design patterns' that ensure that end users are protected from themselves, prevent cognitive accidents, and translate expectations and values into more user-oriented agreements. Furthermore, the chapters map the new risks associated with smart contracts, particularly for consumers, and consider how they might be alleviated. The book also discusses the challenge of integrating data protection and privacy concerns into the design of these agreements and the broad range of legal knowledge and skills required. The case for using smart contracts goes beyond 'contracts' narrowly defined, and they are increasingly used to disrupt traditional models of business organisation. The book discusses so-called decentralised autonomous organisations and decentralised finance as illustrations of this trend. This book is designed for those interested in looking to deepen their understanding of this game-changing new legal technology.
The Victorian Protective Data Security Framework (VPDSF) was established under Part 4 of Victoria's Privacy and Data Protection Act 2014 and provides direction to Victorian public sector agencies or bodies on their data security obligations. The VPDSF has been developed to monitor and assure the security of public sector information and information systems across the Victorian public sector (VPS). This document is primarily written to inform executives and designed to support information security practitioners across the VPS.