首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Evolving Threats, Emerging Laws: Poland's 2023 Answer to the Smishing Challenge 不断演变的威胁,新兴的法律:波兰 2023 年应对网络钓鱼挑战的对策
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-06-24 DOI: 10.1016/j.clsr.2024.106013
Sebastian Zieliński

In the face of rising cybersecurity threats like 'smishing'—SMS-based phishing attacks—this article examines how legislative efforts can effectively address these challenges. This article provides a comprehensive analysis of cybersecurity challenges, focusing on the still growing phenomenon of 'smishing', within the legislative context. In particular, it explores the legal landscape of cybercrime through the lens of Poland's recently enacted Act on Combating Abuses in Electronic Communication, as well as the European Union's Cybersecurity Strategy for the Digital Decade. The first one serves as a significant case study for examining legislative efforts aimed at mitigating cybersecurity risks in the field of electronic communications. The article describes the multi-layered, collaborative business-state approach of the Polish law, which can provide a solid framework for addressing current and future cyber security threats. The act stands as a promising tool for fortifying national cybersecurity infrastructure and could serve as a useful example for other jurisdictions grappling with similar issues. The law also engages citizens actively in its cybersecurity initiatives, promoting collective responsibility. In the broader European Union context, while the Polish Act undergoes scrutiny, this analysis also seeks to explore its alignment with the objectives outlined in the 2020′s European Union's Cybersecurity Strategy for the Digital Decade. This examination aims to evaluate the extent to which the Polish legislative framework resonates with the overarching goals set forth by the European Union, thereby contributing to a deeper understanding of the synergy between national initiatives and the broader European cybersecurity strategy context.

面对 "网络钓鱼"(基于短信的网络钓鱼攻击)等日益严重的网络安全威胁,本文探讨了立法工作如何才能有效应对这些挑战。本文从立法角度全面分析了网络安全挑战,重点关注仍在不断增长的 "网络钓鱼 "现象。特别是,文章从波兰最近颁布的《打击滥用电子通信法案》和欧盟的《数字十年网络安全战略》的角度,探讨了网络犯罪的法律前景。前者是研究旨在降低电子通信领域网络安全风险的立法工作的重要案例。文章介绍了波兰法律的多层次、企业与国家合作的方法,它可以为应对当前和未来的网络安全威胁提供一个坚实的框架。该法是加强国家网络安全基础设施的一个很有前途的工具,可为其他司法管辖区解决类似问题提供有益的范例。该法还让公民积极参与其网络安全倡议,促进集体责任。在更广泛的欧盟背景下,在对波兰法律进行审查的同时,本分析还试图探讨其与2020 年《欧盟数字十年网络安全战略》中概述的目标的一致性。本研究旨在评估波兰立法框架与欧盟提出的总体目标的共鸣程度,从而有助于更深入地理解国家倡议与更广泛的欧洲网络安全战略背景之间的协同作用。
{"title":"Evolving Threats, Emerging Laws: Poland's 2023 Answer to the Smishing Challenge","authors":"Sebastian Zieliński","doi":"10.1016/j.clsr.2024.106013","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106013","url":null,"abstract":"<div><p>In the face of rising cybersecurity threats like 'smishing'—SMS-based phishing attacks—this article examines how legislative efforts can effectively address these challenges. This article provides a comprehensive analysis of cybersecurity challenges, focusing on the still growing phenomenon of 'smishing', within the legislative context. In particular, it explores the legal landscape of cybercrime through the lens of Poland's recently enacted Act on Combating Abuses in Electronic Communication, as well as the European Union's Cybersecurity Strategy for the Digital Decade. The first one serves as a significant case study for examining legislative efforts aimed at mitigating cybersecurity risks in the field of electronic communications. The article describes the multi-layered, collaborative business-state approach of the Polish law, which can provide a solid framework for addressing current and future cyber security threats. The act stands as a promising tool for fortifying national cybersecurity infrastructure and could serve as a useful example for other jurisdictions grappling with similar issues. The law also engages citizens actively in its cybersecurity initiatives, promoting collective responsibility. In the broader European Union context, while the Polish Act undergoes scrutiny, this analysis also seeks to explore its alignment with the objectives outlined in the 2020′s European Union's Cybersecurity Strategy for the Digital Decade. This examination aims to evaluate the extent to which the Polish legislative framework resonates with the overarching goals set forth by the European Union, thereby contributing to a deeper understanding of the synergy between national initiatives and the broader European cybersecurity strategy context.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106013"},"PeriodicalIF":3.3,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141482975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EU sanctions in response to cyber-attacks as crime-based emergency measures 欧盟针对网络攻击的制裁是基于犯罪的紧急措施
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-06-21 DOI: 10.1016/j.clsr.2024.106010
Yuliya Miadzvetskaya

This contribution seeks to explore the growing use of administrative measures in response to cybercrimes by analysing the specific case of sanctions in response to cyber-attacks. They constitute a novel crime-based sanctions regime, laying the foundations of personalised deterrence with respect to malicious cyber actors and consist in asset freezes and visa bans. This article reflects on the hazy boundary between crime-based sanctions as administrative or criminal law measures. The paper argues that while crime-based sanctions in response to cyber-attacks present certain similarities with criminal law measures, they remain complementary crime prevention instruments. Their administrative nature allows for an emergency response to malicious cyber operations that would not be permissible if a more stringent evidentiary standard was required.

本文旨在通过分析针对网络攻击的制裁这一具体案例,探讨在应对网络犯罪时越来越多地使用行政措施的问题。它们构成了一种新型的基于犯罪的制裁制度,为针对恶意网络行为者的个性化威慑奠定了基础,包括资产冻结和签证禁令。本文对基于犯罪的制裁是行政措施还是刑法措施这一模糊界限进行了反思。本文认为,虽然针对网络攻击的犯罪制裁与刑法措施有某些相似之处,但它们仍然是互补的预防犯罪工具。它们的行政性质允许对恶意网络行动做出紧急反应,而如果要求更严格的证据标准,则不允许这样做。
{"title":"EU sanctions in response to cyber-attacks as crime-based emergency measures","authors":"Yuliya Miadzvetskaya","doi":"10.1016/j.clsr.2024.106010","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106010","url":null,"abstract":"<div><p>This contribution seeks to explore the growing use of administrative measures in response to cybercrimes by analysing the specific case of sanctions in response to cyber-attacks. They constitute a novel crime-based sanctions regime, laying the foundations of personalised deterrence with respect to malicious cyber actors and consist in asset freezes and visa bans. This article reflects on the hazy boundary between crime-based sanctions as administrative or criminal law measures. The paper argues that while crime-based sanctions in response to cyber-attacks present certain similarities with criminal law measures, they remain complementary crime prevention instruments. Their administrative nature allows for an emergency response to malicious cyber operations that would not be permissible if a more stringent evidentiary standard was required.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106010"},"PeriodicalIF":3.3,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141434316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The reform of consumer protection in mobile payment services in China: Legislation, regulation, and dispute resolution 中国移动支付服务的消费者保护改革:立法、监管和争议解决
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-14 DOI: 10.1016/j.clsr.2024.106007
Ningyao Ye , Zeyu Zhao

In China, mobile payment services, based on a rapid development of financial technology, have been playing an essential role in Chinese residents’ daily life, creating a cashless society. Unlike many advanced countries having a clear legal definition of financial consumers and incorporating consumers of mobile payment services into financial consumers, China, as one of the largest markets for mobile payment services, has not had a clear legal definition of financial consumers with no clarity regarding whether consumers of mobile payment services belong to financial consumers. This article not only provides a legal analysis of consumers of mobile payment services in China, but also outrightly explores the prospective reform of financial consumer protection with reference to other countries’ successful experience and standards. By the analysis, this article attempts to find out solution for the Chinese financial consumer protection scheme and argues that the Chinese financial consumer protection scheme has to be well designed to maintain a balance between consumers and mobile payment giants.

在中国,基于金融科技飞速发展的移动支付服务已经在中国居民的日常生活中发挥着不可或缺的作用,创造了一个无现金社会。与许多先进国家对金融消费者有明确的法律定义并将移动支付服务消费者纳入金融消费者不同,中国作为移动支付服务的最大市场之一,却一直没有明确的金融消费者法律定义,移动支付服务消费者是否属于金融消费者也不明确。本文不仅对中国移动支付服务消费者进行了法律分析,还在借鉴其他国家成功经验和标准的基础上,对金融消费者保护改革的前瞻性进行了深入探讨。通过分析,本文试图找出中国金融消费者保护制度的解决方案,并认为中国金融消费者保护制度必须设计完善,以保持消费者与移动支付巨头之间的平衡。
{"title":"The reform of consumer protection in mobile payment services in China: Legislation, regulation, and dispute resolution","authors":"Ningyao Ye ,&nbsp;Zeyu Zhao","doi":"10.1016/j.clsr.2024.106007","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106007","url":null,"abstract":"<div><p>In China, mobile payment services, based on a rapid development of financial technology, have been playing an essential role in Chinese residents’ daily life, creating a cashless society. Unlike many advanced countries having a clear legal definition of financial consumers and incorporating consumers of mobile payment services into financial consumers, China, as one of the largest markets for mobile payment services, has not had a clear legal definition of financial consumers with no clarity regarding whether consumers of mobile payment services belong to financial consumers. This article not only provides a legal analysis of consumers of mobile payment services in China, but also outrightly explores the prospective reform of financial consumer protection with reference to other countries’ successful experience and standards. By the analysis, this article attempts to find out solution for the Chinese financial consumer protection scheme and argues that the Chinese financial consumer protection scheme has to be well designed to maintain a balance between consumers and mobile payment giants.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106007"},"PeriodicalIF":2.9,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration 中国跨境数据传输监管方式的发展:放宽与整合
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-08 DOI: 10.1016/j.clsr.2024.105997
Meng Chen (Associate Professor)

This article illustrates the developing Chinese cross-border data flow regulation regime deriving from a holistic national security conception to its balance with personal information protection and digital economic development. Under the pressuring demand of digital economy development and an increasing appeal to global data governance, China is progressively improving and modifying its original government-led and restrictive cross-border data regulations. Subsequent practices and the publication of the Provisions on Promoting and Regulating Cross-border Data Transfer (PPR) in March 2024 deliver a clear sign of relaxation on restrictions on cross-border data flow, especially on the subject of personal information outbound transfer. Detailed comparison with data provisions in the Regional Comprehensive Economic Partnership (RCEP), the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and the Digital Economy Partnership Agreement (DEPA) demonstrates that global governance of cross-border data flows is unshaped but not unrealistic, even with current fragmented national approaches. China has established a complete personal information protection legal regime and is very close to integrating into transnational cooperation for a broader framework. In addition, by coordinating national provisions regarding cross-data transfer with international rules and piloting lenient cross-border data supervision mechanisms in numerous Pilot Free Trade Zone (PFTZ), China is ready to evolve its cross-border data flow regulations and contribute to global data governance step-by-step.

本文阐述了从整体国家安全观到兼顾个人信息保护与数字经济发展的中国跨境数据流动监管制度的发展历程。在数字经济发展和全球数据治理呼声日益高涨的压力下,中国正在逐步完善和修改原有的由政府主导的限制性跨境数据法规。随后的实践以及 2024 年 3 月《关于促进和规范跨境数据传输的若干规定》(PPR)的发布,都释放出对跨境数据流动,尤其是个人信息出境传输限制放宽的明显信号。与《区域全面经济伙伴关系协定》(RCEP)、《跨太平洋伙伴关系全面进步协定》(CPTPP)和《数字经济伙伴关系协定》(DEPA)中的数据条款进行详细比较后发现,即使目前各国的做法各自为政,跨境数据流动的全球治理也是不成形的,但并非不现实。中国已经建立了完整的个人信息保护法律体系,并即将融入跨国合作,建立更广泛的框架。此外,通过协调国家有关跨境数据传输的规定与国际规则,以及在众多自由贸易试验区(PFTZ)试点宽松的跨境数据监管机制,中国已做好准备,逐步发展跨境数据流动法规,为全球数据治理做出贡献。
{"title":"Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration","authors":"Meng Chen (Associate Professor)","doi":"10.1016/j.clsr.2024.105997","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105997","url":null,"abstract":"<div><p>This article illustrates the developing Chinese cross-border data flow regulation regime deriving from a holistic national security conception to its balance with personal information protection and digital economic development. Under the pressuring demand of digital economy development and an increasing appeal to global data governance, China is progressively improving and modifying its original government-led and restrictive cross-border data regulations. Subsequent practices and the publication of the Provisions on Promoting and Regulating Cross-border Data Transfer (PPR) in March 2024 deliver a clear sign of relaxation on restrictions on cross-border data flow, especially on the subject of personal information outbound transfer. Detailed comparison with data provisions in the Regional Comprehensive Economic Partnership (RCEP), the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and the Digital Economy Partnership Agreement (DEPA) demonstrates that global governance of cross-border data flows is unshaped but not unrealistic, even with current fragmented national approaches. China has established a complete personal information protection legal regime and is very close to integrating into transnational cooperation for a broader framework. In addition, by coordinating national provisions regarding cross-data transfer with international rules and piloting lenient cross-border data supervision mechanisms in numerous Pilot Free Trade Zone (PFTZ), China is ready to evolve its cross-border data flow regulations and contribute to global data governance step-by-step.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 105997"},"PeriodicalIF":2.9,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-fungible tokens, tokenization, and ownership 不可兑换代币、代币化和所有权
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-08 DOI: 10.1016/j.clsr.2024.105996
Janne Kaisto , Teemu Juutilainen , Joona Kauranen

The emergence of non-fungible tokens (NFTs) in the blockchain environment has prompted many intriguing questions for private law scholars around the world. A question as basic as whether NFTs can be owned has proven difficult in many countries. This is the first research question of our article, which focuses on NFTs created in the Ethereum system by utilizing standard ERC-721. Because these NFTs are identifiable and distinguishable from all other tokens, the notion of owning an NFT is not unthinkable. Yet no universal answer can be offered. Whether NFTs qualify as objects of ownership must be studied at the level of individual legal systems. We argue that NFTs can be owned under Finnish law, with the same probably applying to many other legal systems. Starting with this notion, we pose two further research questions. As the second research question, we ask what problems of a patrimonial law nature may arise in attempts to connect different kinds of rights, even irrevocably, to owning or holding an NFT. Creditor rights seem relatively easy in this respect because most legal systems allow prospective debtors to obligate themselves as they wish. We also study whether a limited liability company could issue an NFT as a share certificate with legal effects corresponding to those of a physical (paper) share certificate. While an affirmative answer could be justified in some legal systems, Finnish law makes it difficult to tokenize a company's shares other than in the framework of a settlement system within the meaning of the European Union's DLT Pilot Regulation. Even greater difficulties arise in attempts to connect the ownership of a (material) thing and of an NFT so that a person who owns a token also owns the thing. Our third and final research question addresses tokenization of digital art, which gives rise to some special questions. We ask what rights the transferee of an NFT can receive in connection with tokenization of digital art. Here, our main finding is that digital art can be meaningfully tokenized even though digital copies are not regarded as possible objects of ownership.

区块链环境中出现的不可篡改代币(NFT)给世界各地的私法学者带来了许多引人入胜的问题。在许多国家,NFT 是否可以被拥有这样一个基本问题已被证明是个难题。这是我们这篇文章的第一个研究问题,它主要关注在以太坊系统中利用标准 ERC-721 创建的 NFT。由于这些 NFT 与其他所有代币都是可识别和可区分的,因此拥有 NFT 的概念并非不可想象。然而,我们无法给出一个普遍的答案。NFT 是否有资格成为所有权的客体,必须在个别法律制度的层面上进行研究。我们认为,根据芬兰法律,可以拥有 NFT,这可能同样适用于许多其他法律体系。从这一概念出发,我们提出了两个进一步的研究问题。作为第二个研究问题,我们要问的是,在试图将不同类型的权利(甚至是不可撤销的权利)与拥有或持有 NFT 联系起来时,可能会出现哪些继承法性质的问题。在这方面,债权人的权利似乎相对容易,因为大多数法律制度允许潜在债务人按照自己的意愿承担义务。我们还研究了有限责任公司是否可以将非流动资金作为股票发行,并具有与实物(纸质)股票相应的法律效力。虽然在某些法律体系中,肯定的答案是合理的,但芬兰法律规定,除了在欧盟 DLT 试点法规意义上的结算系统框架内,很难将公司股份代币化。如果试图将(物质)物品的所有权与 NFT 的所有权联系起来,使拥有代币的人也拥有该物品,则会遇到更大的困难。我们的第三个也是最后一个研究问题涉及数字艺术的代币化,这就产生了一些特殊的问题。我们要问的是,在数字艺术品的代币化过程中,NFT 的受让人可以获得哪些权利。在此,我们的主要发现是,即使数字副本不被视为所有权的可能客体,数字艺术也可以被有意义地标记化。
{"title":"Non-fungible tokens, tokenization, and ownership","authors":"Janne Kaisto ,&nbsp;Teemu Juutilainen ,&nbsp;Joona Kauranen","doi":"10.1016/j.clsr.2024.105996","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105996","url":null,"abstract":"<div><p>The emergence of non-fungible tokens (NFTs) in the blockchain environment has prompted many intriguing questions for private law scholars around the world. A question as basic as whether NFTs can be owned has proven difficult in many countries. This is the first research question of our article, which focuses on NFTs created in the Ethereum system by utilizing standard ERC-721. Because these NFTs are identifiable and distinguishable from all other tokens, the notion of owning an NFT is not unthinkable. Yet no universal answer can be offered. Whether NFTs qualify as objects of ownership must be studied at the level of individual legal systems. We argue that NFTs can be owned under Finnish law, with the same probably applying to many other legal systems. Starting with this notion, we pose two further research questions. As the second research question, we ask what problems of a patrimonial law nature may arise in attempts to connect different kinds of rights, even irrevocably, to owning or holding an NFT. Creditor rights seem relatively easy in this respect because most legal systems allow prospective debtors to obligate themselves as they wish. We also study whether a limited liability company could issue an NFT as a share certificate with legal effects corresponding to those of a physical (paper) share certificate. While an affirmative answer could be justified in some legal systems, Finnish law makes it difficult to tokenize a company's shares other than in the framework of a settlement system within the meaning of the European Union's DLT Pilot Regulation. Even greater difficulties arise in attempts to connect the ownership of a (material) thing and of an NFT so that a person who owns a token also owns the thing. Our third and final research question addresses tokenization of digital art, which gives rise to some special questions. We ask what rights the transferee of an NFT can receive in connection with tokenization of digital art. Here, our main finding is that digital art can be meaningfully tokenized even though digital copies are not regarded as possible objects of ownership.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 105996"},"PeriodicalIF":2.9,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000633/pdfft?md5=838d6e36f0dd3951b89091ec34f342ef&pid=1-s2.0-S0267364924000633-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China 从布鲁塞尔效应到重力助推:了解受 GDPR 启示的个人信息保护法在中国的发展历程
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-08 DOI: 10.1016/j.clsr.2024.105994
Wenlong Li , Jiahong Chen

This paper explores the evolution of China's Personal Information Protection Law (PIPL) and situates it within the context of global data protection development. It draws inspiration from the theory of ‘Brussels Effect’ and provides a critical account of its application in non-Western jurisdictions, taking China as a prime example. Our objective is not to provide a comparative commentary on China's legal development but to illuminate the intricate dynamics between the Chinese law and the EU's GDPR. We argue that the trajectory of China's Personal Information Protection Law calls into question the applicability of the Brussels Effect: while the GDPR's imprint on the PIPL is evident, a deeper analysis unveils China's nuanced, non-linear adoption that diverges from many assumptions of the Brussels Effect and similar theories. The evolution of the GDPR-inspired PIPL is not as a straightforward outcome of the Brussels Effect but as a nuanced, intricate interplay of external influence and domestic dynamics. We introduce a complementary theory of ‘gravity assist’, which portrays China's strategic instrumentalisation of the GDPR as a template to shape its unique data protection landscape. Our theoretical framework highlights how China navigates through a patchwork of internal considerations, international standards, and strategic choices, ultimately sculpting a data protection regime that has a similar appearance to the GDPR but aligns with its distinct political, cultural and legal landscape. With a detailed historical and policy analysis of the PIPL, coupled with reasonable speculations on its future avenues, our analysis presents a pragmatic, culturally congruent approach to legal development in China. It signals a trajectory that, while potentially converging at a principled level, is likely to diverge significantly in practice, driven by China's broader socio-political and economic agendas rather than the foundational premises of EU data protection law and its global aspirations. It thus indicates the inherent limitations of applying Brussels Effect and other theoretical frameworks to non-Western jurisdictions, highlighting the imperative for integrating complementary theories to more accurately navigate complex legal landscapes.

本文探讨了中国《个人信息保护法》(PIPL)的演变,并将其置于全球数据保护发展的背景之下。本文从 "布鲁塞尔效应 "理论中汲取灵感,以中国为例,对该理论在非西方司法管辖区的应用进行了批判性阐述。我们的目的不是对中国的法律发展进行比较评论,而是阐明中国法律与欧盟 GDPR 之间错综复杂的动态关系。我们认为,中国《个人信息保护法》的发展轨迹令人质疑布鲁塞尔效应的适用性:虽然 GDPR 对中国《个人信息保护法》的影响是显而易见的,但更深入的分析揭示了中国细微的、非线性的采纳情况,这与布鲁塞尔效应和类似理论的许多假设相背离。受 GDPR 启发的 PIPL 的演变并不是布鲁塞尔效应的直接结果,而是外部影响与国内动力之间微妙而复杂的相互作用。我们引入了 "重力辅助 "的补充理论,描绘了中国将 GDPR 作为模板,塑造其独特数据保护格局的战略工具。我们的理论框架强调了中国如何通过内部考虑、国际标准和战略选择的拼凑,最终塑造出一个与 GDPR 外形相似,但符合其独特的政治、文化和法律环境的数据保护制度。通过对 PIPL 的详细历史和政策分析,以及对其未来发展道路的合理推测,我们的分析为中国的法律发展提供了一种务实、与文化相一致的方法。这预示着,虽然在原则层面可能趋于一致,但在实践中可能会出现重大分歧,其驱动力是中国更广泛的社会政治和经济议程,而非欧盟数据保护法的基本前提及其全球抱负。因此,这表明将布鲁塞尔效应和其他理论框架应用于非西方司法管辖区存在固有的局限性,突出了整合互补理论以更准确地驾驭复杂法律环境的必要性。
{"title":"From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China","authors":"Wenlong Li ,&nbsp;Jiahong Chen","doi":"10.1016/j.clsr.2024.105994","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105994","url":null,"abstract":"<div><p>This paper explores the evolution of China's Personal Information Protection Law (PIPL) and situates it within the context of global data protection development. It draws inspiration from the theory of ‘Brussels Effect’ and provides a critical account of its application in non-Western jurisdictions, taking China as a prime example. Our objective is not to provide a comparative commentary on China's legal development but to illuminate the intricate dynamics between the Chinese law and the EU's GDPR. We argue that the trajectory of China's Personal Information Protection Law calls into question the applicability of the Brussels Effect: while the GDPR's imprint on the PIPL is evident, a deeper analysis unveils China's nuanced, non-linear adoption that diverges from many assumptions of the Brussels Effect and similar theories. The evolution of the GDPR-inspired PIPL is not as a straightforward outcome of the Brussels Effect but as a nuanced, intricate interplay of external influence and domestic dynamics. We introduce a complementary theory of ‘gravity assist’, which portrays China's strategic instrumentalisation of the GDPR as a template to shape its unique data protection landscape. Our theoretical framework highlights how China navigates through a patchwork of internal considerations, international standards, and strategic choices, ultimately sculpting a data protection regime that has a similar appearance to the GDPR but aligns with its distinct political, cultural and legal landscape. With a detailed historical and policy analysis of the PIPL, coupled with reasonable speculations on its future avenues, our analysis presents a pragmatic, culturally congruent approach to legal development in China. It signals a trajectory that, while potentially converging at a principled level, is likely to diverge significantly in practice, driven by China's broader socio-political and economic agendas rather than the foundational premises of EU data protection law and its global aspirations. It thus indicates the inherent limitations of applying Brussels Effect and other theoretical frameworks to non-Western jurisdictions, highlighting the imperative for integrating complementary theories to more accurately navigate complex legal landscapes.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 105994"},"PeriodicalIF":2.9,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S026736492400061X/pdfft?md5=9c7fcdd53bcd61a59b343d95a6550735&pid=1-s2.0-S026736492400061X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
European National News 欧洲国家新闻
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-05 DOI: 10.1016/j.clsr.2024.105998
Nick Pantlin

This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal’s feature articles and briefing notes by keeping readers abreast of what is currently happening "on the ground" at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.

本文跟踪欧洲主要国家在信息技术和通信领域的国家级发展,并提供重要国家发展的简明提示服务。它由赫伯特-斯密-弗里希尔斯律师事务所(Herbert Smith Freehills LLP)协调,并由欧洲各地的律师事务所撰稿。本专栏提供欧洲主要国家重要事态发展的简明提示服务。其部分目的是通过让读者了解目前在国家层面实施欧盟立法和国际公约及条约的 "实地 "情况,从而对《日刊》的专题文章和简报进行补充。如果某条欧洲国家新闻特别重要,CLSR 也可能在当期或后续版本中对其进行更详细的报道。
{"title":"European National News","authors":"Nick Pantlin","doi":"10.1016/j.clsr.2024.105998","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105998","url":null,"abstract":"<div><p>This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal’s feature articles and briefing notes by keeping readers abreast of what is currently happening \"on the ground\" at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"53 ","pages":"Article 105998"},"PeriodicalIF":2.9,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141249410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions 为加强欧洲(不)安全而前瞻性地实施人工智能:自动旅行授权决定的推理挑战
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-04 DOI: 10.1016/j.clsr.2024.105995
Erzsébet Csatlós

The European Travel Information and Authorisation System, along with the automated decision-making system for immigration filtering, is soon to become a guardian controlling entry into Europe. In the digital realm of issuing travel authorisations, a central question arises: does streamlining the process of using an authoritative decision through IT tools and artificial intelligence simplify administrative decision-making, or does it raise more profound legal issues? The pressing question is whether algorithms will ultimately determine human destinies, or if we have not reached that point yet. This paper examines the set of rules for making a decision on the refusal of a travel permit, considering the obligations tied to providing reasons for such decisions. It emphasizes that the rationale should be built upon a combination of factual and legal foundations, which would entail revealing data linked to profiling. While explicit rights for explanations might not be granted, having substantial information gives the ability to contest decisions. To ensure decisions are well-founded, the methodology used for profiling must support these determinations, as general system descriptions are inadequate for clarifying specific cases. Therefore, the paper concludes that the complex interaction between the ETIAS screening process, data protection laws, and national security concerns presents a challenging situation for procedural rights. Fundamental rights, such as accessing records and receiving decision explanations, clash with the necessity to safeguard national security and build a so-called security union for Europe, it establishes a feeling of insecurity about respect for EU values.

欧洲旅行信息和授权系统以及移民过滤自动决策系统很快将成为控制进入欧洲的监护人。在签发旅行授权的数字领域,一个核心问题出现了:通过信息技术工具和人工智能简化使用权威决定的过程,是简化了行政决策,还是引发了更深刻的法律问题?当务之急是,算法是否会最终决定人类的命运,或者我们是否还没有到那一步。本文研究了拒绝旅行许可决定的一系列规则,并考虑了为此类决定提供理由的相关义务。本文强调,理由应建立在事实和法律基础的结合之上,这就需要披露与特征分析有关的数据。虽然可能不会赋予明确的解释权,但掌握大量信息就有能力对决定提出质疑。为确保决定有理有据,貌相所使用的方法必须支持这些决定,因为一般的系统描述不足以澄清具体案件。因此,本文的结论是,ETIAS 筛选程序、数据保护法和国家安全关切之间复杂的互动关系给程序性权利带来了挑战。基本权利,如查阅记录和获得决定解释,与保障国家安全和建立所谓的欧洲安全联盟的必要性相冲突,这使人们对尊重欧盟价值观产生了不安全感。
{"title":"Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions","authors":"Erzsébet Csatlós","doi":"10.1016/j.clsr.2024.105995","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105995","url":null,"abstract":"<div><p>The <em>European Travel Information and Authorisation System</em>, along with the automated decision-making system for immigration filtering, is soon to become a guardian controlling entry into Europe. In the digital realm of issuing travel authorisations, a central question arises: does streamlining the process of using an authoritative decision through IT tools and artificial intelligence simplify administrative decision-making, or does it raise more profound legal issues? The pressing question is whether algorithms will ultimately determine human destinies, or if we have not reached that point yet. This paper examines the set of rules for making a decision on the refusal of a travel permit, considering the obligations tied to providing <em>reasons</em> for such decisions. It emphasizes that the rationale should be built upon a combination of factual and legal foundations, which would entail revealing data linked to profiling. While explicit rights for explanations might not be granted, having substantial information gives the ability to contest decisions. To ensure decisions are well-founded, the methodology used for profiling must support these determinations, as general system descriptions are inadequate for clarifying specific cases. Therefore, the paper concludes that the complex interaction between the ETIAS screening process, data protection laws, and national security concerns presents a challenging situation for procedural rights. Fundamental rights, such as accessing records and receiving decision explanations, clash with the necessity to safeguard national security and build a so-called security union for Europe, it establishes a feeling of insecurity about respect for EU values.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 105995"},"PeriodicalIF":2.9,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asia–Pacific developments 亚太地区的发展
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-03 DOI: 10.1016/j.clsr.2024.105991
Gabriela Kennedy

This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.

本专栏逐国分析亚太地区主要司法管辖区与 IT、媒体和电信行业相关的最新法律发展、案例和问题。本专栏中出现的文章旨在作为 "提醒",而不是作为案件或法律发展的详细分析提交。
{"title":"Asia–Pacific developments","authors":"Gabriela Kennedy","doi":"10.1016/j.clsr.2024.105991","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105991","url":null,"abstract":"<div><p>This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"53 ","pages":"Article 105991"},"PeriodicalIF":2.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond 网络安全漏洞披露的法律问题:《国家信息安全计划 2》及其他
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-03 DOI: 10.1016/j.clsr.2024.105988
Jakub Vostoupal , Václav Stupka , Jakub Harašta , František Kasl , Pavel Loutocký , Kamil Malinka

This paper focuses on the legal aspects of responsible vulnerability disclosure, bug bounty programs and legal risks associated with their implementation in the Czech Republic. Firstly, the authors introduce the basics of vulnerability disclosure procedures, identify different organisational models, and identify risks that may arise on the part of the organisation launching the bug bounty program or the hackers participating in it. The identified risks are divided into those arising from civil law, administrative law, and criminal law. For each identified risk, the authors then propose appropriate technical, organisation or legal solutions that can be applied to eliminate or reduce these risks. Nevertheless, the authors identified two areas that cannot be sufficiently mitigated through existing tools and laws and are likely to require legislative intervention – the matter of safeguarding the anonymity of reporters through confidentiality, and the problematic ability to consent to the testing procedures by the public bodies.

本文重点探讨了负责任的漏洞披露、漏洞悬赏计划的法律问题以及在捷克共和国实施漏洞悬赏计划的相关法律风险。首先,作者介绍了漏洞披露程序的基本原理,确定了不同的组织模式,并指出了发起漏洞悬赏计划的组织或参与计划的黑客可能面临的风险。所确定的风险分为民法、行政法和刑法引起的风险。然后,作者针对每项确定的风险提出了适当的技术、组织或法律解决方案,以消除或降低这些风险。不过,作者发现有两个领域无法通过现有工具和法律充分降低风险,可能需要立法干预--即通过保密来保护报告人的匿名性问题,以及公共机构同意测试程序的能力问题。
{"title":"The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond","authors":"Jakub Vostoupal ,&nbsp;Václav Stupka ,&nbsp;Jakub Harašta ,&nbsp;František Kasl ,&nbsp;Pavel Loutocký ,&nbsp;Kamil Malinka","doi":"10.1016/j.clsr.2024.105988","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105988","url":null,"abstract":"<div><p>This paper focuses on the legal aspects of responsible vulnerability disclosure, bug bounty programs and legal risks associated with their implementation in the Czech Republic. Firstly, the authors introduce the basics of vulnerability disclosure procedures, identify different organisational models, and identify risks that may arise on the part of the organisation launching the bug bounty program or the hackers participating in it. The identified risks are divided into those arising from civil law, administrative law, and criminal law. For each identified risk, the authors then propose appropriate technical, organisation or legal solutions that can be applied to eliminate or reduce these risks. Nevertheless, the authors identified two areas that cannot be sufficiently mitigated through existing tools and laws and are likely to require legislative intervention – the matter of safeguarding the anonymity of reporters through confidentiality, and the problematic ability to consent to the testing procedures by the public bodies.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"53 ","pages":"Article 105988"},"PeriodicalIF":2.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1