Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book provides an overview of the topics of data, sovereignty, and governance with respect to data and online activities through a legal lens and from a cybersecurity perspective. This first chapter explores the concepts of data, ownerships, and privacy with respect to digital media and content, before defining the intersection of sovereignty in law with application to data and digital media content. The authors delve into the issue of digital governance, as well as theories and systems of governance on a state level, national level, and corporate/organizational level. Chapter three jumps into the complex area of jurisdictional conflict of laws and the related issues regarding digital activities in international law, both public and private. Additionally, the book discusses the many technical complexities which underlay the evolution and creation of new law and governance strategies and structures. This includes socio-political, legal, and industrial technical complexities which can apply in these areas. The fifth chapter is a comparative examination of the legal strategies currently being explored by a variety of nations. The book concludes with a discussion about emerging topics which either influence, or are influenced by, data sovereignty and digital governance, such as indigenous data sovereignty, digital human rights and self-determination, artificial intelligence, and global digital social responsibility. 
Cumulatively, this book provides the full spectrum of information, from foundational principles underlining the described topics, through to the larger, more complex, evolving issues which we can foresee ahead of us.

Author(s): Melissa Lukings, Arash Habibi Lashkari
Series: Progress in IS
Publisher: Springer
Year: 2022

Language: English
Pages: 296
City: Cham

Preface
Introduction
Acknowledgement
Contents
About the Authors
List of Figures
List of Tables
Chapter 1: Data Sovereignty
1.1 Topic Overview
1.2 Defining Data in Context
1.2.1 Types and Features
1.2.2 Data as Property
1.2.3 Ownership and Interest
1.2.3.1 Example: United States
1.2.4 Data Privacy
1.2.4.1 Syntactic Data Protection Techniques
1.2.4.2 Semantic Data Protection Techniques
1.2.5 Data Security
1.2.6 Corporate Data/Media Content
1.3 Data Storage
1.3.1 Physical Storage Devices
1.3.1.1 Direct Data Storage
1.3.1.2 Network-Based Data Storage
1.3.2 Cloud Storage
1.3.3 Cloud Infrastructure: Benefits and Challenges
1.3.3.1 Benefits
Renewed Information Technology Infrastructure
Closure of Cyber Hygiene Gaps
Availability of Solutions
Digital Transformation
1.3.3.2 Challenges
Data Security
Data Residency
Data Sovereignty
1.4 Data Sovereignty
1.4.1 Sovereignty for Data
1.4.1.1 Example: Canada
1.4.2 Governmental Risks
1.4.2.1 Example: United States and Canada
1.4.3 Risk Mitigation Strategies
1.4.3.1 Limiting Categories
1.4.3.2 Encrypting Data
1.4.3.3 Using Standard Contract Clauses
1.5 Residency and Localisation
1.5.1 Data Residency
1.5.1.1 Data Residency-as-a-Service
1.5.2 Data Localisation
1.5.3 Localisation Models
1.5.3.1 Total Data Sovereignty
1.5.3.2 Select Data Sovereignty
1.5.3.3 Data Replication
1.5.3.4 Controlled Localisation
1.6 Legal Considerations
1.7 Summary
Chapter 2: Digital Governance
2.1 Topic Overview
2.2 Governance
2.2.1 Types of Governance
2.2.1.1 Good Governance
2.2.1.2 Bad Governance
Lack of Voice and Weak Accountability
Political Interference
Corruption
Poor Economic Growth
Failed State
Corruption
Solution: Transparency
Solution: Dealing with Corruption
Introduction of New Institutions and Laws
Target Vulnerable Services
Change Service at Grassroots Level
Principle 1: Repeal Laws that Facilitate the Collection of Bribes
Principle 2: Increase the Use of Objective Criteria for Deciding Eligibility for Recovering a Service
Principle 3: Use Computers to Reduce Contact with Public Officials
Principle 4: Monitor the Delivery of Services Electronically
Principle 5: Give Citizens Access to Public Records About Themselves
Principle 6: Match the Supply of Services to Entitlements and Obligations
Principle 7: Expand Choice
Principle 8: Legalise Some Public Service Payments
Principle 9: Align Public Laws and Informal Standards
2.2.1.3 Conceptualising Governance Strategy
2.3 Social Responsibility in Governance
2.3.1 Sustainability
2.3.1.1 Principles of Sustainable Development
2.3.2 Accountability
2.3.3 Transparency
2.3.4 The Social Contract
2.3.4.1 The Origins of the Social Contract
2.3.4.2 The Hobbesian Social Contract
2.3.4.3 The Social Contract According to Locke and Rousseau
2.3.4.4 The Raelsian Social Contract
2.3.4.5 The Social Contract Model
2.3.5 Comparative Provisions
2.3.5.1 Canada
2.3.5.2 United States
2.3.5.3 Australia
2.4 Digital Governance
2.4.1 Elements
2.4.2 Types of Electronic Governance
2.4.2.1 Government-to-Business (G2B)
2.4.2.2 Business-to-Government (B2G)
2.5 Corporate Governance
2.5.1 Corporate Social Responsibility
2.5.2 Objectives
2.5.2.1 Foundational Principles
2.5.2.2 Digital Corporate Social Responsibility
2.5.3 User-Generated/Earned Content
2.5.4 Legal Considerations
2.5.4.1 Example: MeTube: Creators, Consumers and Hosts
2.5.5 Digital UCG Stakeholders
2.6 Summary
Chapter 3: Conflicts of Law
3.1 Topic Overview
3.2 Jurisdictionality
3.2.1 Jurisdictional Authority
3.2.2 Determining Jurisdictional Authority
3.2.3 Personal Connecting Factors
3.2.3.1 Nationality
3.2.3.2 Domicile and Residence
What Is Residence?
Leading Canadian Case: Thomson v Minister of Natural Revenue
Ordinarily Resident
Habitual Resident
Habitual Residence of the Child
Why Is Residence so Popular?
Domicile of Choice
Example: Foote v Foote Estate
Domicile of Children
Domicile of the Mentally Incapacitated
Domicile of Corporate Bodies
3.2.3.3 Jurisdiction Simpliciter
Defendants Within the Jurisdiction
Defendants Outside the Jurisdiction
Presumptive Factors for Real and Substantive Connection
Example: Moran v Pyle National (Canada)
Example: Court v Debaie
Example: Tamminga v Tamminga [2014 ONCA 478]
Class Actions
3.2.4 Subtypes of Jurisdiction
3.2.4.1 Juridical Jurisdiction
3.2.4.2 Personal vs Territorial vs Subject-Matter Jurisdiction
3.2.4.3 Exclusive vs Concurrent Jurisdiction
3.2.4.4 Original vs Appellate Jurisdiction
3.2.4.5 General vs Limited/Special Jurisdiction
3.2.4.6 Diversity Jurisdiction
3.2.4.7 Pecuniary Jurisdiction
3.2.4.8 Example: United States
3.3 International Law
3.3.1 Sources of International Law
3.3.1.1 Treaties and Conventions
3.3.1.2 The Rule of Law
3.3.1.3 Judicial Decisions and Teachings
3.3.2 Key Determinants in International Law
3.3.3 International Human Rights Laws
3.3.3.1 Domestic Law
3.3.3.2 International Treaties
3.4 International Legal Strategies
3.4.1 Silence
3.4.2 Existential Disagreements
3.4.3 Interpretive Questions
3.4.4 Attribution
3.4.5 Accountability
3.5 Interjurisdictional Sovereignty and Governance
3.5.1 Internet Jurisdiction
3.5.1.1 Example: People´s Republic of China
3.5.2 Global Costs and Fatal Consequences
3.5.3 Common Law Evolution of International Online Defamation
3.6 Summary
Chapter 4: Technical Complexities
4.1 Topic Overview
4.2 Current Challenges
4.2.1 Increased Legislation
4.2.1.1 Examples
4.2.2 Increased Data Awareness
4.2.3 Larger Data Vaults and Data Location
4.2.4 Metadata
4.2.5 Data Ownership and Control
4.2.6 Data Breaches
4.2.7 Cyber Exceptionalism
4.3 Internet Governance
4.3.1 Access
4.3.1.1 Examples
4.3.2 Censorship
4.3.2.1 Technical Censorship
Method One: Blacklist
Method Two: Points of Control
Method Three: Internet Protocol Address Blocking
Method Four: Domain Name System Filtering and Redirection
Method Five: Uniform Resource Locator (URL) Filtering
Method Six: Packet Filtering
Method Seven: Connection Reset
Method Eight: Network Disconnection
Method Nine: Portal Censorship and Search Result Removal
Method Ten: Computer Network Attacks
4.3.2.2 Non-Technical Censorship
4.3.2.3 Censorship of Users
Method One: Deplatforming
Method Two: Terms of Service Agreements
4.3.2.4 Circumvention
4.3.2.5 Primarily Targeted Groups/Themes
Politics and Power
Social Norms and Morals
Security Concerns
Existing Economic Interests and Copyrights
Network Tools
Individual Personal Information
4.3.2.6 Resilience
4.3.3 Digital Divide
4.3.3.1 Examples
4.3.4 Digital Rights
4.3.5 Freedom of Information
4.3.5.1 Racial Divide
4.3.5.2 Disability Divide
4.3.5.3 Gender Divide
4.3.5.4 Sexuality Divide
4.3.6 Net Neutrality and the Open Internet
4.3.6.1 United States
4.3.6.2 Canada
4.3.6.3 India
4.3.6.4 China
4.3.7 Privacy
4.3.7.1 Privacy Levels
4.3.7.2 Privacy Risks
4.3.7.3 Risks for Young People
4.3.7.4 Big Data
4.3.7.5 Other Privacy Risks
4.4 Resurgence of Sovereignty
4.4.1 Encryption and the Hybrid Cloud
4.4.1.1 Hybrid Cloud Security
Encrypting Data in Transmission
Encrypting Data at Rest/in Storage
Encrypting Data in Processing and Use
4.4.1.2 Transparency
4.4.1.3 Hybridisation
4.4.2 Data Localisation
4.4.3 Breach Prevention, Remediation, and Planning
4.4.3.1 Data Breach Prevention
4.4.3.2 Data Breach Remediation
Organise an Expert Response Team
Secure the Physical Area
Check Websites and Online Sources
Remove Vulnerabilities
Create a Communication Plan
4.5 Global Complexity
4.5.1 Global Internet Standards
4.5.1.1 Web Standards
4.5.1.2 Network Standards
4.5.1.3 Compliance Standards
4.5.2 Network Latency for Data Transmission
4.5.3 Cyberbalkanization
4.5.4 Internet Shutdowns
4.5.5 Media Freedom
4.5.5.1 Examples
4.5.6 Privacy and Encryption
4.6 Summary
Chapter 5: Comparative Legal Strategies
5.1 Topic Overview
5.2 National Data Strategies
5.2.1 Canada
5.2.2 China
5.2.3 Egypt
5.2.4 European Union
5.2.5 Germany
5.2.6 India
5.2.7 Indonesia
5.2.8 Japan
5.2.9 Kazakhstan
5.2.10 Kuwait
5.2.11 Malaysia
5.2.12 Russia
5.2.13 Saudi Arabia
5.2.14 Switzerland
5.2.15 Turkey
5.2.16 United Arab Emirates (UAE)
5.2.17 United States
5.2.18 Uzbekistan
5.2.19 Vietnam
5.3 Data Residency Comparative
5.4 Summary
Chapter 6: Emerging Topics in Data Sovereignty and Digital Governance
6.1 Topic Overview
6.2 Digital Rights
6.2.1 Moral/Human Rights
6.2.1.1 Right to Privacy
6.2.1.2 Freedom of Expression
6.2.1.3 Freedom of Assembly and Association
6.2.1.4 Right to (Digital) Access, Education, and Development
6.2.2 Legal Rights
6.2.2.1 Example: Canadian Legal Rights
Fundamental Freedoms
Democratic Rights
Mobility Rights
Legal Rights
Equality Rights
Official Language Rights
Minority Language Educational Rights
6.2.3 Indigenous Rights
6.2.3.1 Example: Indigenous Rights in Canada
6.2.3.2 United Nations Declaration on the Rights of Indigenous Peoples
6.3 Indigenous Data Sovereignty
6.3.1 Care Principles
6.3.2 Example: Indigenous Sovereignty in Canada
6.3.2.1 Resource Rights
6.3.2.2 Aboriginal Title
6.3.2.3 Rights to Self-Government
6.3.2.4 Rights Content
6.3.2.5 Duty to Consult
6.3.2.6 Indigenous Women´s Rights
6.3.2.7 Rights Extinguishment
6.3.2.8 Metis Rights
6.3.2.9 Inuit Rights
6.4 Data Centres and Data Mines
6.4.1 Functions
6.4.1.1 Classification
6.4.1.2 Predictions
6.4.1.3 Association Rules and Recommendation Systems
6.4.1.4 Data Reduction
6.4.2 Social Impact
6.4.2.1 Privacy
6.4.2.2 Profiling
6.4.2.3 Unauthorised Use
6.4.3 Environmental Impacts
6.4.4 Challenges
6.4.4.1 Efficiency and Scalability of Algorithms
6.4.4.2 Usefulness, Certainty, and Expressiveness of Results
6.4.4.3 Expression of Various Kinds of Results
6.4.4.4 Interactive Mining Knowledge at Multiple Levels
6.4.4.5 Mining Information from Different Sources of Data
6.5 Digital Self-Determination
6.5.1 Theories of Self-Determination
6.5.1.1 Example: Self Determination in Germany
6.5.2 Elements of Digital Self-Determination
6.5.2.1 Access
6.5.2.2 Literacy
6.5.2.3 Design
6.5.2.4 Representation
6.5.2.5 Regulation
6.6 Artificial Intelligence
6.6.1 Artificial Intelligence and Intellectual Property
6.6.1.1 Copyright
6.6.1.2 Patent
6.6.1.3 Trade Secret
6.6.1.4 Industrial Design
6.6.1.5 Trademark
6.6.1.6 Copyright: Ownership
Copyright Law Hypothetical
Facts
Questions
6.6.1.7 Patents: Knowledge
6.6.1.8 Trade Secrets: Accountability
6.6.2 Artificial Intelligence and Contract Law
6.6.3 Data Protection, Privacy, and Equality
6.6.3.1 Data Protection
6.6.3.2 Health Care
6.6.3.3 Equality by Design
6.6.4 Human Rights, Violence, and Legal Ethics
6.6.4.1 Technology-Facilitated Violence and Abuse
6.6.4.2 Legal Ethics and Judicial Decision-Making
6.7 Social Responsibility
6.7.1 Digital Colonialism
6.7.2 Digital Apartheid
6.7.2.1 Example: Digital Apartheid in India
6.7.3 Digital Redlining
6.7.4 Censorship, Shutdowns, and Blackouts
6.8 Relevance to our Collective Future
6.9 Summary
Conclusion
References