Skip to main content

Currently Skimming:

Borders, Cyber Resilience, and the Implications of Data Localization: Proceedings of a Workshop - in Brief
Pages 1-12

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... Although the legal CJEU decision, provided perspectives on its policy context protections were very strict on paper, Swire observed that and implications, discussed historical antecedents and there was a low level of compliance or enforcement. broader issues surrounding digital trade, and considered the technology and cybersecurity implications of this and A decade and a half later, in October 2015, the CJEU other data localization regulations.
From page 2...
... This Swire recounted debating Schrems in Brussels in will spur considerable litigation in the European Union 2016. During the debate, Swire highlighted that many and foster a growing awareness of the seriousness of the countries have no laws governing surveillance practices situation, which is documented by research at the Cross and emphasized the practical impacts of the decision to Border Data Forum on the effects of data localization.
From page 3...
... example, to monitor potentially fraudulent transactions. Swire pointed out that only 11 countries meet current Other sectors, such as cloud computing services, European standards for "adequate," which could lead pharmaceutical research, travel, and e-commerce, rely to the EU courts stopping companies from transferring heavily and fundamentally on cross-border data flows.
From page 4...
... Irwin noted that we are at an interesting inflection point in terms of the direction of globalization, FIGURE 1 Trade openness index broken into globalization over five centuries, defined as the which is referred to as "slowbalisation."2 Since the global sum of world exports and imports divided by world gross domestic product, and describing financial crisis in 2008, economists have seen curtailed cross-border flows in trading goods. Shown here are data for 1872–2016.
From page 5...
... The Great Depression was catastrophic for was countries opening their economies to the rest of the national economies and world trade, and the recovery world. Previously, these were countries like China and was also very slow.
From page 6...
... ; and (5) more could be temporary in terms of its impact on world trade, cross-border data flows, which underpin all digital trade its impact on the attitudes toward trade among policy transactions, but raise new issues.
From page 7...
... Physically Goods Delivered Government OECD looked at the idea of tariff revenue reductions Regulatory Environment Data flow regulation because even though the OECD countries by and large Interoperability Data Flows have very low tariffs, this is not the same for other countries outside OECD. Especially in many developing FIGURE 2 Categorizing data flows within digital trade.
From page 8...
... Payment Systems • Discriminatory access to payment The pervasive exchange of data itself has fueled concerns settlement methods about the use and misuse of data, leading to new • National payment security standards deviate from international standards data policies. These new data policies have included a • Restrictions on Internet banking or tremendous increase in the regulations surrounding insurance data flows and mainly fall under two categories: data 4.
From page 9...
... However, Stone highlighted that with the Grosse referenced a 2017 Lawfare article by Dillon growing digital trade and tangential issues on digital Reisman, "Where Is Your Data, Really? : The Technical tax, many countries are finding this problematic and are Case Against Data Localization."14 He noted that the worried about revenue implications.
From page 10...
... While a person may put There are also some legal interpretations of the EDPB additional security on the data that crosses borders, most November recommendations, which Swire referred to people do not do that, and when encryption is broken on in his introduction. It says that total data localization is a device or a data flow, there is no way to know what else not considered legally adequate with this rare exception has been tampered with.
From page 11...
... There may be better ways to convey someone's data may get turned over to some law firm. that there are consequences to these rules about crossThat law firm's information technology systems can be border data flows because, as Swire indicated, it seems easily hacked, which means that data are not private like companies are too scared to say anything about the in any useful sense, and because of gag orders, the consequences.
From page 12...
... 2023. Borders, Cyber Resilience, and the Implications of Data Localization: Proceedings of a Workshop -- in Brief.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.