5.5 展望

5.5 展望

如何协调数据主权和数据跨境流动?需求很明确,但问题似乎难以解决。没有简单的短期解决方案。对大多数自由经济体而言,未来的道路似乎是通过政策趋同而令规则相容,形成不同程度的数据保护。目前尚不清楚此类规则如何(或能否)解决人权意义上的“自由流动”问题,此问题现在尚须在单独的、强制性较低的文书中加以解决。[142]代表世界很大一部分人口的部分国家而言,政治和文化阻力将为数据本地化提供支撑,成为日益阻碍潜在进展的一个锚点。

【注释】

[1]Mayer-Schoenberger,F.and David Lazer,eds.“Governance and Information Technology:From Electronic Government to Information Government”.Cambridge,MA:MIT Press,September 2007.Accessible at https://pdfs.semanticscholar.org/ea97/5e436d1174dcf3ea5011601bb979a1106551.pdf.

[2]Glen,C.(2014).“Internet Governance:Territorializing Cyberspace?”Politics&Policy,Vol.42,No.5(2014).Accessible at Wiley Online Publishing(fee)at https://onlinelibrary.wiley.com/doi/abs/10.1111/polp.12093 Accessed through Penn State University Library.

[3]Drake,W.(2016).“Background Paper for the Workshop on Data Localization and Barriers to Transborder Data Flows”.World Economic Forum,September 14-15,2016.Accessible at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=22&ved=2ahUKEwj QhJbpu_rhAh URwlk KHSedCxk4FBAWMAF6BAgBEAI&url=http%3A%2F%2Fwww3.weforum.org%2Fdocs%2FBackground_Paper_Forum_workshop%252009.2016.pdf&usg=AOv-Vaw0d Ya6dddeJGI1LCWkriqoE.

[4]Croxton,D.(1999).“The Peace of Westphalia of 1648 and the Origins of Sovereignty”.International History Review,Vol.21,No.3(Sep.1999).Accessible at https://www.tandfonline.com/doi/abs/10.1080/07075332.1999.9640869?journalCode=rinh20.

[5]Turner,S.(1997).“Transnational Corporations and the Question of Sovereignty:An Alternative Theoretical Framework for the Information Age”.Southeastern Political Review,Vol.25,No.2,June 1997.Accessed through Penn State Libraries from Wiley Library Online:https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1747-1346.1997.tb00841.x.

[6]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[7]Turner,S.(1997).“Transnational Corporations and the Question of Sovereignty:An Alternative Theoretical Framework for the Information Age”.Southeastern Political Review,Vol.25,No.2,June 1997.Accessed through Penn State Libraries from Wiley Library Online:https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1747-1346.1997.tb00841.x.

[8]Drake,W.(2016).“Background Paper for the Workshop on Data Localization and Barriers to Transborder Data Flows”.World Economic Forum,September 14-15,2016.Accessible at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=22&ved=2ah UKEwjQhJbpu_rh Ah URwlk KHSedCxk4FBAWMAF6BAgBEAI&url=http%3A%2F%2Fwww3.weforum.org%2Fdocs%2FBackground_Paper_Forum_workshop%252009.2016.pdf&usg=AOv Vaw0d Ya6dddeJGI1LCWkriqoE.

[9]Brown,R.(1984).“Economic and Trade Related Aspects of Transborder Data Flow:Elements of a Code for Transnational Commerce”.Perspectives,6 Nw.J.Int'l L.&Bus.1(1984-1985).Accessible at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ah UKEwi7mZyfz_rh AhWNjlk KHYhkDh YQFj AAegQIBRAB&url=http%3A%2F%2Fscholarlycommons.law.northwestern.edu%2Fcgi%2Fviewcontent.cgi%3Farticle%3D1167%26context%3Dnjilb&usg=AOv Vaw337Mbfx UfQayqEr UPp LCr_.

[10]Codding,G.(1952).The International Telecommunication Union:An Experiment in International Cooperation.Leiden:E.J.Brill,1952.

[11]Codding,G.(1952).The International Telecommunication Union:An Experiment in International Cooperation.Leiden:E.J.Brill,1952.

[12]International Telecommunications Union(2019).“The Earliest International Telegraph Agreements”.ITU portal,2019.Accessible at https://www.itu.int/en/history/Pages/pre1865agreements.aspx.

[13]International Telecommunications Union(2015).“Collection of the Basic Texts Adopted by the Plenipotentiary Conference 2015”.ITU,2015,Accessible at http://handle.itu.int/11.1004/020.1000/5.21.61.en.100.

[14]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[15]Zeng,J.,Tim Stevens and Yaru Chen(2017).“China's Solution to Global Cyber Governance:Unpacking the Domestic Discourse of‘Internet Sovereignty’”.Politics&Policy,Vol.45,No.3(2017).Accessible at https://www.researchgate.net/publication/317834062_China%27s_Solution_to_Global_Cyber_Governance_Unpacking_the_Domestic_Discourse_of_Internet_Sovereignty.

[16]Kelion,L.(2013).“Q&A:NSA's Prism internet surveillance scheme”.BBC.com,June 25,2013.Accessible at https://www.bbc.com/news/technology-23027764.

[17]Lenthang,M.(2019).“NSA is considering shutting down its once-secret PRISM phone surveillance program that was exposed by whistleblower Edward Snowden because it hasn't been used in six months”.Daily Mail,March 5,2019.Accessible at(https://www.dailymail.co.uk/news/article-6775813/NSA-phone-surveillance-program-shut-2019.html.

[18]Nakashima,E.(2019).“White House has signaled it may seek permanent renewal of controversial surveillance power”.The Washington Post,May 1,2019.Accessible at https://www.washingtonpost.com/world/national-security/white-house-has-signaled-it-may-seek-permanent-renewal-of-controversial-surveillance-power/2019/04/30/b4407af2-67a5-11e9-8985-4cf30147bdca_story.html?noredirect=on&utm_campaign=Newsletters&utm_medium=email&utm_source=sendgrid&utm_term=.c84c745f54ce.

[19]Cory,N.and Alan Mc Quinn(2018).“Will the US capitalize on its opportunity to stop data localization?”The Hill,Sept.9,2018.Accessible at https://thehill.com/opinion/cybersecurity/405422-will-the-us-capitalize-on-its-opportunity-to-stop-data-localization.

[20]Hill,J.and Matthew Noyes(2018).“Rethinking Data,Geography,and Jurisdiction:Towards a Common Framework for Harmonizing Global Data Flow Controls”.New America Foundation,February 2018.Accessible at https://newamerica.org/documents/2084/Rethinking_Data_Geography_Jurisdiction_2.21.pdf.

[21]Cory,N.and Alan McQuinn(2018).“Will the US capitalize on its opportunity to stop data localization?”The Hill,Sept.9,2018.Accessible at https://thehill.com/opinion/cybersecurity/405422-will-the-us-capitalize-on-its-opportunity-to-stop-data-localization.

[22]De Groot,J.(2019).“What is the General Data Protection Regulation?Understanding&Complying with GDPR Requirements in 2019”.Digitalguardian.com,May 15,2019.Accessible at https://digitalguardian.com/blog/whatgdpr-general-data-protection-regulation-understanding-and-complying-gdpr-data-protection.

[23]De Groot,J.(2019).“What is the General Data Protection Regulation?Understanding&Complying with GDPR Requirements in 2019”.Digitalguardian.com,May 15,2019.Accessible at https://digitalguardian.com/blog/whatgdpr-general-data-protection-regulation-understanding-and-complying-gdpr-data-protection.

[24]Reinsch,W.(2018).“A Data Localization Free-for-All?”Center for Strategic and International Studies,March 9,2018.Accessible at https://www.csis.org/blogs/future-digital-trade-policy-and-role-us-and-uk/data-localization-freeall.

[25]Wikipedia(2014).“Tempora”.Accessible at https://en.wikipedia.org/wiki/Tempora.

[26]Zeng,J.,Tim Stevens and Yaru Chen(2017).“China's Solution to Global Cyber Governance:Unpacking the Domestic Discourse of‘Internet Sovereignty’”.Politics&Policy,Vol.45,No.3(2017).Accessible at https://www.researchgate.net/publication/317834062_China%27s_Solution_to_Global_Cyber_Governance_Unpacking_the_Domestic_Discourse_of_Internet_Sovereignty.

[27]Schmitt,ed.(2013).“Tallinn Manual on the International Law Applicable to Cyber Warfare”.NATO,Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence.Accessible at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ah UKEwiZ-M6bob7iAh VKjlk KHXCAAkcQFj AAeg QIARAC&url=http%3A%2F%2Fcsef.ru%2Fmedia%2Farticles%2F3990%2F3990.pdf&usg=AOv Vaw3js2CeWl AYYXYd R2b F9ijP.

[28]Zeng,J.,Tim Stevens and Yaru Chen(2017).“China's Solution to Global Cyber Governance:Unpacking the Domestic Discourse of‘Internet Sovereignty’”.Politics&Policy,Vol.45,No.3(2017).Accessible at https://www.researchgate.net/publication/317834062_China%27s_Solution_to_Global_Cyber_Governance_Unpacking_the_Domestic_Discourse_of_Internet_Sovereignty.

[29]Zeng,J.,Tim Stevens and Yaru Chen(2017).“China's Solution to Global Cyber Governance:Unpacking the Domestic Discourse of‘Internet Sovereignty’”.Politics&Policy,Vol.45,No.3(2017).Accessible at https://www.researchgate.net/publication/317834062_China%27s_Solution_to_Global_Cyber_Governance_Unpacking_the_Domestic_Discourse_of_Internet_Sovereignty.

[30]Zeng,J.,Tim Stevens and Yaru Chen(2017).“China's Solution to Global Cyber Governance:Unpacking the Domestic Discourse of‘Internet Sovereignty’”.Politics&Policy,Vol.45,No.3(2017).Accessible at https://www.researchgate.net/publication/317834062_China%27s_Solution_to_Global_Cyber_Governance_Unpacking_the_Domestic_Discourse_of_Internet_Sovereignty.

[31]Glen,C.(2014).“Internet Governance:Territorializing Cyberspace?”Politics&Policy,Vol.42,No.5(2014).Accessible at Wiley Online Publishing(fee)at https://onlinelibrary.wiley.com/doi/abs/10.1111/polp.12093 Accessed through Penn State University Library.

[32]Wikipedia(2019a).“Data Sovereignty”.Wikipedia.Accessible at https://en.wikipedia.org/wiki/Data_sovereignty.

[33]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[34]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[35]Kong,L.(2010).“Data Protection and Transborder Data Flow in the European and Global Context”.The European Journal of International Law,Vol.21 no.2,2010.Downloadable from http://www.ejil.org/pdfs/21/2/2007.pdf.

[36]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[37]Vaile,D.,Kevin Kalinich,Patrick Fair and Adrian Lawrence(2013).“Data Sovereignty and the Cloud”.Version 1.0,Cyberspace Law and Policy Center,University of New South Wales,July 2013.Accessible at http://www.bakercyberlawcentre.org/data_sovereignty/CLOUD_DataSovReport_Full.pdf.

[38]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[39]United Nations(1948).“Universal Declaration of Human Rights 1948”.Adopted and proclaimed by General Assembly resolution 217 A(Ⅲ)of 10 December 1948.Accessible at:https://www.un.org/en/universal-declaration-human-rights/.

[40]United Nations(1966).“International Covenant on Civil and Political Rights”.Resolution 2200A(XXI)of December 16,1966.Accessible at https://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx.

[41]De la Torre,L.(2018).“Data Protection Law:How it All Got Started”.Medium.com,Sept.19,2018.Accessible at https://medium.com/golden-data/data-protection-law-how-it-all-got-started-df9b82ef555e.

[42]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[43]DLA Piper(2019).“Data Protection Laws of the World”.DLA Piper Intelligence.Accessible at https://www.dlapiperdataprotection.com/.

[44]Kuner,C.(2011b).“Table of Data Protection and Privacy Law Instruments Regulating Transborder Data Flows”.Tilburg Institute for Law,Technology and Society,Tilburg University,the Netherlands.Accessible at:SSRN https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1783782_code1213479.pdf?abstractid=1783782&mirid=1.

[45]Wikipedia(2019b).“Data Localization”.Accessible at https://en.wikipedia.org/wiki/Data_localization.

[46]Black,E.(2019).“The Nazi Party:IBM&‘Death's Calculator’”.Jewish Virtual Library,website.Accessible at https://www.jewishvirtuallibrary.org/ibm-and-quot-death-s-calculator-quot-2.

[47]OECD(1985).“Declaration on Transborder Data Flows”.OECD website.Accessible at http://www.oecd.org/sti/ieconomy/declarationontransborderdataflows.htm.

[48]OECD(2013).“OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”.Accessible at http://oecd.org/sti/ieconomy/oecd_privacy_framework.pdf.

[49]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[50]United Nations Conference on Trade and Development(UNCTAD)(2017).“‘Culture clash'divides trade officials and Internet Experts”.Commentary on UNCTAD website,December 21,2017.Accessible at https://unctad.org/en/pages/newsdetails.aspx?Original VersionID=1648&Sitemap_x0020_Taxonomy=UNCTAD%20Home.

[51]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[52]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[53]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[54]Drake,W.(2017).“IGF 2017 WS#32 Data Localization and Barriers to Crossborder Data Flows:Toward a Multi-Track Approach”.Internet Governance Forum,2017.Accessible at https://www.intgovforum.org/multilingual/content/igf-2017-ws-32-data-localization-and-barriers-to-crossborder-data-flows-toward-a-multi-track.

[55]Aaronson,S.(2016).“At the Intersection of Cross-Border Information Flows and Human Rights:TPP as a Case Study”.HEP-WP-2016-12,Institute for International Economic Policy,Washington,D.C.,May 2016.Accessible at:https://www.researchgate.net/publication/305115467_AT_the_Intersection_Cross-Border_Information_Flows_Human_Rights_and_Internet_Governance.

[56]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[57]Aaronson,S.(2015).“Why Trade Agreements are not Setting Information Free:The Lost History and Reinvigorated Debate over Cross-Border Data Flows,Human Rights,and National Security?”World Trade Review,October,2015.Accessed through Penn State Libraries/Pro Quest,May 1,2019.

[58]Aaronson,S.(2016).“At the Intersection of Cross-Border Information Flows and Human Rights:TPP as a Case Study”.HEP-WP-2016-12,Institute for International Economic Policy,Washington,D.C.,May 2016.Accessible at:https://www.researchgate.net/publication/305115467_AT_the_Intersection_Cross-Border_Information_Flows_Human_Rights_and_Internet_Governance.

[59]Aaronson,S.(2016).“At the Intersection of Cross-Border Information Flows and Human Rights:TPP as a Case Study”.HEP-WP-2016-12,Institute for International Economic Policy,Washington,D.C.,May 2016.Accessible at:https://www.researchgate.net/publication/305115467_AT_the_Intersection_Cross-Border_Information_Flows_Human_Rights_and_Internet_Governance.

[60]Aaronson,S.(2015).“Why Trade Agreements are not Setting Information Free:The Lost History and Reinvigorated Debate over Cross-Border Data Flows,Human Rights,and National Security?”World Trade Review,October,2015.Accessed through Penn State Libraries/Pro Quest,May 1,2019.

[61]Hill,J.and Matthew Noyes(2018).“Rethinking Data,Geography,and Jurisdiction:Towards a Common Framework for Harmonizing Global Data Flow Controls”.New America Foundation,February 2018.Accessible at https://newamerica.org/documents/2084/Rethinking_Data_Geography_Jurisdiction_2.21.pdf.

[62]United Nations Conference on Trade and Development(UNCTAD)(2017).“‘Culture clash’divides trade officials and Internet Experts”.Commentary on UNCTAD website,December 21,2017.Accessible at https://unctad.org/en/pages/newsdetails.aspx?Original VersionID=1648&Sitemap_x0020_Taxonomy=UNCTAD%20Home.

[63]Aaronson,S.A.and M Townes(2014).“Can Trade Policy Set Information Free:Trade Agreements,Internet Governance and Internet Freedom.Policy Brief,Institute for International Economic Policy,June 2014.Accessible at http://www.gwu.edu/~iiep/governance/taig/Can TradePolicySetInformation FreeFINAL.pdf.Google Scholar.

[64]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[65]Morar,D.(2017).“Data Localization and Barriers to Cross-Border Data Flows”.Digital Watch Observatory,June 12,2017.Accessible at https://dig.watch/sessions/data-localization-and-barriers-cross-border-data-flows.

[66]Aaronson,S.(2015).“Why Trade Agreements are not Setting Information Free:The Lost History and Reinvigorated Debate over Cross-Border Data Flows,Human Rights,and National Security?”World Trade Review,October,2015.Accessed through Penn State Libraries/ProQuest,May 1,2019.

[67]Business Roundtable(2015).“Putting Data to Work:Maximizing the Value of Information in an Interconnected World”.Business Round Table.Accessible at http://brt.org/resources/putting-data-work-maximizing-value-information-interconnect-world.

[68]Leinwand,A.(2017a).“3 things companies must know about data sovereignty when moving to the cloud”.Enterpriser Project,February 20,2017.Accessible at https://enterprisersproject.com/article/2017/1/three-things-companies-must-know-about-data-sovereignty-when-moving-cloud.

[69]Kuner,C.(2011a).“Regulation of Transborder Data Flows Under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[70]Vaile,D.,Kevin Kalinich,Patrick Fair and Adrian Lawrence(2013).“Data Sovereignty and the Cloud”.Version 1.0,Cyberspace Law and Policy Center,University of New South Wales,July 2013.Accessible at http://www.bakercyberlawcentre.org/data_sovereignty/CLOUD_DataSov Report_Full.pdf.

[71]Aaronson,S.(2015).“Why Trade Agreements are not Setting Information Free:The Lost History and Reinvigorated Debate over Cross-Border Data Flows,Human Rights,and National Security?”World Trade Review,October,2015.Accessed through Penn State Libraries/ProQuest,May 1,2019.

[72]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[73]Cory,N.(2017).“Cross-Border Data Flows:Where Are the Barriers,and What do they Cost?”Information Technology and Innovation Foundation,May 2017.Accessible(.pdf)at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=2ah UKEwiAnPLcnIjk Ah UPy Fk KHTeBQAQFj AAeg QIARAB&url=https%3A%2F%2Fitif.org%2Fpublications%2F2017%2F05%2F01%2Fcross-borderdata-flows-where-are-barriers-and-what-do-they-cost&usg=AOv Vaw1w-x G3FjO1QJAPb7LvvPPi.

[74]Drake,W.(2016).“Background Paper for the Workshop on Data Localization and Barriers to Transborder Data Flows”.World Economic Forum,September 14-15,2016.Accessible at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=22&ved=2ah UKEwjQhJbpu_rh Ah URwlk KHSedCxk4FBAWMAF6BAgBEAI&url=http%3A%2F%2Fwww3.weforum.org%2Fdocs%2FBackground_Paper_Forum_workshop%252009.2016.pdf&usg=AOv Vaw0d Ya6dddeJGI1LCWkriqoE.

[75]Aaronson,S.(2016).“At the Intersection of Cross-Border Information Flows and Human Rights:TPP as a Case Study”.HEP-WP-2016-12,Institute for International Economic Policy,Washington,D.C.,May 2016.Accessible at:https://www.researchgate.net/publication/305115467_AT_the_Intersection_Cross-Border_Information_Flows_Human_Rights_and_Internet_Governance.

[76]Cory,N.(2017).“Cross-Border Data Flows:Where Are the Barriers,and What do they Cost?”Information Technology and Innovation Foundation,May 2017.Accessible(.pdf)at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=2ah UKEwiAnPLcnIjk Ah UPy Fk KHTeBQAQFj AAegQIARAB&url=https%3A%2F%2Fitif.org%2Fpublications%2F2017%2F05%2F01%2Fcross-borderdata-flows-where-are-barriers-and-what-do-they-cost&usg=AOv Vaw1w-x G3FjO1QJAPb7LvvPPi.

[77]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[78]Shashidhr,K.J.(2019).“India's draft e-commerce policy:A need to look beyond data as the new oil”.Observer Research Foundation,March 30,2019.Accessible at https://www.orfonline.org/expert-speak/indias-draft-e-commerce-policy-a-need-to-look-beyond-data-as-the-new-oil-49413/.

[79]Drake,W.(2016).“Background Paper for the Workshop on Data Localization and Barriers to Transborder Data Flows”.World Economic Forum,September 14-15,2016.Accessible at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=22&ved=2ah UKEwjQhJbpu_rh Ah URwlk KHSedCxk4FBAWMAF6BAgBEAI&url=http%3A%2F%2Fwww3.weforum.org%2Fdocs%2FBackground_Paper_Forum_workshop%252009.2016.pdf&usg=AOv Vaw0d Ya6dddeJGI1LCWkriqoE.

[80]Crichton,D.(2018).“GDPR,China and data sovereignty are Ultimately Wins for Amazon and Google”.Techcrunch,May 29,2018.Accessible at https://techcrunch.com/2018/05/29/gdpr-and-the-cloud-winners/.

[81]Bowman,C.(2017).“Data Localization Laws:An Emerging Global Trend”.Jurist.org,January 6,2017.Accessible at https://www.jurist.org/commentary/2017/01/Courtney-Bowman-data-localization.

[82]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[83]Aaronson,S.(2016).“At the Intersection of Cross-Border Information Flows and Human Rights:TPP as a Case Study”.HEP-WP-2016-12,Institute for International Economic Policy,Washington,D.C.,May 2016.Accessible at:https://www.researchgate.net/publication/305115467_AT_the_Intersection_Cross-Border_Information_Flows_Human_Rights_and_Internet_Governance.

[84]Ryan,P.,S.Falvey and R.Merchant(2013).“When the Cloud Goes Local:The Global Problem with Data Localization”.Computer,46(12):54-59,http://ssrn.com/abstract=2370850.

[85]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[86]Hill,J.and Matthew Noyes(2018).“Rethinking Data,Geography,and Jurisdiction:Towards a Common Framework for Harmonizing Global Data Flow Controls”.New America Foundation,February 2018.Accessible at https://newamerica.org/documents/2084/Rethinking_Data_Geography_Jurisdiction_2.21.pdf.

[87]Ryan,P.,S.Falvey and R.Merchant(2013).“When the Cloud Goes Local:The Global Problem with Data Localization”.Computer,46(12):54-59,http://ssrn.com/abstract=2370850.

[88]Ryan,P.,S.Falvey and R.Merchant(2013).“When the Cloud Goes Local:The Global Problem with Data Localization”.Computer,46(12):54-59,http://ssrn.com/abstract=2370850.

[89]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[90]Aaronson,S.(2015).“Why Trade Agreements are not Setting Information Free:The Lost History and Reinvigorated Debate over Cross-Border Data Flows,Human Rights,and National Security?”World Trade Review,October,2015.Accessed through Penn State Libraries/Pro Quest,May 1,2019.

[91]Maisog,M.(2015).“Making the Case Against Data Localization in China”.International Association of Privacy Professionals,April 20,2015.Accessible at https://iapp.org/news/a/making-the-case-against-data-localization-inchina/.

[92]Mallory,R.(2018).“How Data Sovereignty Will Affect IT in 2018”.Data Center Knowledge,January 10,2018.Accessible at https://www.datacenterknowledge.com/industry-perspectives/how-data-sovereignty-will-affect-it-2018.

[93]AmCham China(2015).“Protecting Data Flows in the US-China Bilateral Investment Treaty”.AmCham China,2015 Policy Spotlight Series.Accessible at https://www.amchamchina.org/policy-advocacy/policy-priorities/download/file/policy_spotlight/5/e242ff078dbfcd38cfd5d601318aaf6cfc5821aa.pdf.

[94]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[95]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[96]Business Roundtable(2015).“Putting Data to Work:Maximizing the Value of Information in an Interconnected World”.Business Round Table.Accessible at http://brt.org/resources/putting-data-work-maximizing-value-information-interconnect-world.

[97]Przewloka,M.(2018).“Data Sovereignty:Does the Use of My Data Always Require My Consent?”Dotmagazine,September 2018.Accessible at https://www.dotmagazine.online/issues/self-regulation-for-a-better-internet/doesself-regulation-empower-industry/data-sovereignty-and-consent.

[98]Business Roundtable(2015).“Putting Data to Work:Maximizing the Value of Information in an Interconnected World”.Business Round Table.Accessible at http://brt.org/resources/putting-data-work-maximizing-value-information-interconnect-world.

[99]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[100]Rizvi,K.(2018).“The Importance of Data in Artificial Intelligence:For us to allow AI to progress we need to encourage easier access to cross-border data flows”.Entrepreneur India,December 5,2018.Accessible at:https://www.entrepreneur.com/article/324344.

[101]Meltzer,J.(2018).“The impact of artificial intelligence on international trade”.Brookings,December 13,2018.https://www.brookings.edu/research/the-impact-of-artificial-intelligence-on-international-trade/.

[102]DLA Piper(2019).“Data Protection Laws of the World”.DLA Piper Intelligence.Accessible at https://www.dlapiperdataprotection.com/.

[103]Legal Services Commission of South Australia(2017).“Australian Privacy Principles”.Law Handbook,January 5,2017.Accessible at https://lawhandbook.sa.gov.au/ch34s01s03s01.php.

[104]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[105]Beeby,D.(2017).“Secret Government of Canada data stored on U.S.servers?Memo raises possibility”.CBC News,Sept.8,2017.Accessible at https://www.cbc.ca/news/politics/storage-data-cloud-government-canadian-sharedservices-microsoft-secret-1.4277836.

[106]Morgan,C.(2017).“Data Protected-Canada”.Linklaters,2017.Available at https://www.linklaters.com/en-us/insights/data-protected/data-protected—canada.

[107]Doffman,Z.(2019).“Putin Signs‘Russian Internet Law’to Disconnect Russia from the World Wide Web”.Forbes,May 1,2019.Accessible at https://www.forbes.com/sites/zakdoffman/2019/05/01/putin-signs-russian-internet-law-to-disconnect-the-country-from-the-world-wide-web/#5da76d331bf1.

[108]Doffman,Z.(2019).“Putin Signs‘Russian Internet Law’to Disconnect Russia from the World Wide Web”.Forbes,May 1,2019.Accessible at https://www.forbes.com/sites/zakdoffman/2019/05/01/putin-signs-russian-internet-law-to-disconnect-the-country-from-the-world-wide-web/#5da76d331bf1.

[109]Meyer,D.(2019).“Russia:No we don't want to curb online freedoms-we want to protect our Internet”.ZDNet,March 11,2019.Accessible at https://www.zdnet.com/article/russia-no-we-dont-want-to-curb-online-freedomswe-want-to-protect-internet/.

[110]Cory,N.(2017).“Cross-Border Data Flows:Where Are the Barriers,and What do they Cost?”Information Technology and Innovation Foundation,May 2017.Accessible(.pdf)at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=2ah UKEwiAnPLcnIjk Ah UPy Fk KHTeBQAQFj AAeg QIARAB&url=https%3A%2F%2Fitif.org%2Fpublications%2F2017%2F05%2F01%2Fcross-borderdata-flows-where-are-barriers-and-what-do-they-cost&usg=AOv Vaw1w-x G3FjO1QJAPb7LvvPPi.

[111]Cory,N.(2017).“Cross-Border Data Flows:Where Are the Barriers,and What do they Cost?”Information Technology and Innovation Foundation,May 2017.Accessible(.pdf)at https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=2ah UKEwiAnPLcnIjk Ah UPy Fk KHTeBQAQFj AAegQIARAB&url=https%3A%2F%2Fitif.org%2Fpublications%2F2017%2F05%2F01%2Fcross-borderdata-flows-where-are-barriers-and-what-do-they-cost&usg=AOv Vaw1w-x G3FjO1QJAPb7LvvPPi.

[112]Shashidhr,K.J.(2019).“India's draft e-commerce policy:A need to look beyond data as the new oil”.Observer Research Foundation,March 30,2019.Accessible at https://www.orfonline.org/expert-speak/indias-draft-e-commerce-policy-a-need-to-look-beyond-data-as-the-new-oil-49413/.

[113]Charles,Ammu(2019).“Highlights of Draft E-Commerce Policy”.LiveLaw.in,February 27,2019.Accessible at https://www.livelaw.in/columns/highlights-of-draft-e-commerce-policy-143201.

[114]Shashidhr,K.J.(2019).“India's draft e-commerce policy:A need to look beyond data as the new oil”.Observer Research Foundation,March 30,2019.Accessible at https://www.orfonline.org/expert-speak/indias-draft-e-commerce-policy-a-need-to-look-beyond-data-as-the-new-oil-49413/.

[115]Charles,Ammu(2019).“Highlights of Draft E-Commerce Policy”.LiveLaw.in,February 27,2019.Accessible at https://www.livelaw.in/columns/highlights-of-draft-e-commerce-policy-143201.

[116]Kong,L.(2010).“Data Protection and Transborder Data Flow in the European and Global Context”.The European Journal of International Law,Vol.21 no.2,2010.Downloadable from http://www.ejil.org/pdfs/21/2/2007.pdf.

[117]Aaronson,S.A.and M Townes(2014).“Can Trade Policy Set Information Free:Trade Agreements,Internet Governance and Internet Freedom.Policy Brief,Institute for International Economic Policy,June 2014.Accessible at http://www.gwu.edu/~iiep/governance/taig/Can TradePolicySetInformationFreeFINAL.pdf.Google Scholar.

[118]Aaronson,S.(2015).“Why Trade Agreements are not Setting Information Free:The Lost History and Reinvigorated Debate over Cross-Border Data Flows,Human Rights,and National Security?”World Trade Review,October,2015.Accessed through Penn State Libraries/ProQuest,May 1,2019.

[119]Drake,W.(2017).“IGF 2017 WS#32 Data Localization and Barriers to Crossborder Data Flows:Toward a Multi-Track Approach”.Internet Governance Forum,2017.Accessible at https://www.intgovforum.org/multilingual/content/igf-2017-ws-32-data-localization-and-barriers-to-crossborder-data-flows-toward-a-multi-track.

[120]Kuner,C.(2011).“Regulation of Transborder Data Flows under Data Protection and Privacy Law:Past,Present and Future”.OECD Digital Economy Papers No.187”.OECD Publishing,2011.Downloadable from http://www.kuner.com/my-publications-and-writing/untitled/kuner-oecd-tbdf-paper.pdf.

[121]Chander,A.and U.P.Le(2014).“Breaking the Web:Data Localization vs.the Global Internet”.Legal Studies Research Paper(2014-1),Emory Law Journal,UC Davis Legal Studies Research Paper No.378,http://ssrn.com/abstract=2407858 or http://dx.doi.org/10.2139/ssrn.2407858.

[122]Hill,J.and Matthew Noyes(2018).“Rethinking Data,Geography,and Jurisdiction:Towards a Common Framework for Harmonizing Global Data Flow Controls”.New America Foundation,February 2018.Accessible at https://newamerica.org/documents/2084/Rethinking_Data_Geography_Jurisdiction_2.21.pdf.

[123]Business Roundtable(2015).“Putting Data to Work:Maximizing the Value of Information in an Interconnected World”.Business Round Table.Accessible at http://brt.org/resources/putting-data-work-maximizing-value-information-interconnect-world.

[124]Cory,N.,Robert Atkinson and Daniel Castro(2019a).“Principles and Policies for“Data Free Flow with Trust”.Information Technology and Innovation Foundation,May 2019.Accessible at https://itif.org/printpdf/8517.

[125]Glen,C.(2014).“Internet Governance:Territorializing Cyberspace?”Politics&Policy,Vol.42,No.5(2014).Accessible at Wiley Online Publishing(fee)at https://onlinelibrary.wiley.com/doi/abs/10.1111/polp.12093 Accessed through Penn State University Library.

[126]Irion,K.(2012).“Government Cloud Computing and National Data Sovereignty”.Policy&Internet,Vol.4,Issue 3-4,pages 40-71.Accessible at https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.10.

[127]Weber,R.(2013).“Transborder data transfers:concepts,regulatory approaches and new legislative initiatives”.International Data Privacy Law,2013,Vol.3,No.2,pp.117-130.Accessible on request(.pdf)at https://www.researchgate.net/publication/273026361_Transborder_data_transfers_concepts_regulatory_approaches_and_new_legislative_initiatives.

[128]Hill,J.and Matthew Noyes(2018).“Rethinking Data,Geography,and Jurisdiction:Towards a Common Framework for Harmonizing Global Data Flow Controls”.New America Foundation,February 2018.Accessible at https://newamerica.org/documents/2084/Rethinking_Data_Geography_Jurisdiction_2.21.pdf.

[129]United Nations(1948).“Universal Declaration of Human Rights 1948”.Adopted and proclaimed by General Assembly resolution 217 A(III)of 10 December 1948.Accessible at:https://www.un.org/en/universal-declaration-human-rights/.

[130]United Nations(1948).“Universal Declaration of Human Rights 1948”.Adopted and proclaimed by General Assembly resolution 217 A(III)of 10 December 1948.Accessible at:https://www.un.org/en/universal-declaration-human-rights/.

[131]Estadella-Yuste,O.(1991).“Transborder Data Flows and the Sources of Public International Law”.16 N.C.J.Int'l L.&Com.Reg.379(1991).Accessible at:http://scholarship.law.unc.edu/ncilj/vol16/iss2/8.

[132]Damon,L.(1986).“Freedom of Information vs.National Sovereignty:The Need for a New Global Forum for the Resolution of Transborder Data Flow Problems”.Fordham International Law Journal,Vol.10,Issue 2,1986.Accessible at:https://ir.lawnet.fordham.edu/ilj/vol10/iss2/4/.

[133]Feldman,M.(1983).“Commercial Speech,Transborder Data Flows and the Right to Communicate Under International Law”.American Bar Association,International Lawyer,Vol.17,No.1(Winter 1983),pp.87-95.Accessed through Penn State Libraries in JSTOR at https://www.jstor.org/stable/40705414.

[134]Bothe,M.(1989).“Transborder Data Flows:Do We Mean Freedom or Business?”10 Mich.J.Int'l L.333(1989).Accessible at https://repository.law.umich.edu/mjil/vol10/iss2/1/.

[135]Aaronson,S.(2016).“At the Intersection of Cross-Border Information Flows and Human Rights:TPP as a Case Study”.HEP-WP-2016-12,Institute for International Economic Policy,Washington,D.C.,May 2016.Accessible at:https://www.researchgate.net/publication/305115467_AT_the_Intersection_Cross-Border_Information_Flows_Human_Rights_and_Internet_Governance.

[136]Aaronson,S.A.and M Townes(2014).“Can Trade Policy Set Information Free:Trade Agreements,Internet Governance and Internet Freedom.Policy Brief,Institute for International Economic Policy,June 2014.Accessible at http://www.gwu.edu/~iiep/governance/taig/Can TradePolicySetInformation FreeFINAL.pdf.Google Scholar.

[137]Aaronson,S.(2016).“At the Intersection of Cross-Border Information Flows and Human Rights:TPP as a Case Study”.HEP-WP-2016-12,Institute for International Economic Policy,Washington,D.C.,May 2016.Accessible at:https://www.researchgate.net/publication/305115467_AT_the_Intersection_Cross-Border_Information_Flows_Human_Rights_and_Internet_Governance.

[138]Hemingway,C.(2017).“What is Data Sovereignty?”Legalvision,December 14,2017.Accessible at https://legalvision.com.au/what-is-data-sovereignty/.

[139]Mallory,R.(2018).“How Data Sovereignty Will Affect IT in 2018”.Data Center Knowledge,January 10,2018.Accessible at https://www.datacenterknowledge.com/industry-perspectives/how-data-sovereignty-will-affect-it-2018.

[140]Lomas,N.(2018a).“Europe is drawing fresh battle lines around the ethics of big data”.Techcrunch,October 3,2018.Accessible at https://techcrunch.com/2018/10/03/europe-is-drawing-fresh-battle-lines-around-the-ethics-ofbig-data/.

[141]Lomas,N.(2018b).“ePrivacy:An overview of Europe's other big privacy rule change”.Techcrunch,October 7,2018.Accessible at https://techcrunch.com/2018/10/07/eprivacy-an-overview-of-europes-other-big-privacy-rulechange/.

[142]Kong,L.(2010).“Data Protection and Transborder Data Flow in the European and Global Context”.The European Journal of International Law,Vol.21 no.2,2010.Downloadable from http://www.ejil.org/pdfs/21/2/2007.pdf.