首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark? 2022 年网络复原力法案》:物联网设备网络安全的银弹还是无用功?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-07-05 DOI: 10.1016/j.clsr.2024.106009
Mohammed Raiz Shaffique
<div><p>Internet of Things (IoT) is an ecosystem of interconnected devices (IoT devices) that is capable of intelligent decision making. IoT devices can include everyday objects such as televisions, cars and shoes. The interconnectedness brought forth by IoT has extended the need for cybersecurity beyond the information security realm into the physical security sphere. However, ensuring cybersecurity of IoT devices is far from straightforward because IoT devices have several cybersecurity challenges associated with them. Some of the pertinent cybersecurity challenges of IoT devices in this regard relate to: (i) Security During Manufacturing, (ii) Identification and Authentication, (iii) Lack of Encryption, (iv) Large Attack Surface, (v) Security During Updates, (vi) Lack of User Awareness and (vii) Diverging Standards and Regulations.</p><p>Against this background, the Cyber Resilience Act (CRA) has been proposed to complement the existing EU cybersecurity framework consisting of legislations such as the Cybersecurity Act and the NIS2 Directive. However, does the CRA provide a framework for effectively combating the cybersecurity challenges of IoT devices in the EU? The central crux of the CRA is to lay down and enforce the rules required to ensure cybersecurity of ‘products with digital elements’, which includes IoT devices. To this end, several obligations are imposed on manufacturers, importers and distributors of IoT devices. Manufacturers are mandated to ensure that the essential cybersecurity requirements prescribed by the CRA are met before placing IoT devices in the market. While the cybersecurity requirements mandated by the CRA are commendable, the CRA suffers from several ambiguities which can hamper its potential impact. For instance, the CRA could provide guidance to manufacturers on how to conduct cybersecurity risk assessment and could clarify the meanings of terms such as “<em>limit attack surfaces</em>” and “<em>without any known exploitable vulnerabilitie</em>s”.</p><p>When the fundamental themes of the CRA is analysed from the prism of the cybersecurity challenges of IoT devices, it becomes clear that the CRA does provide a foundation for effectively addressing the cybersecurity challenges of IoT devices. However, the expansive wording in various parts of the CRA, including in the Annex I Requirements, leaves scope for interpretation on several fronts. Consequently, the effectiveness of the CRA in tackling the Security During Manufacturing Challenge, Identification and Authentication Challenge, Large Attack Surface Challenge and Diverging Standards and Regulations Challenge would be largely contingent on how harmonised standards develop and how the industry adopts them. The CRA seems to be more effective, albeit not fully so, in significantly addressing the Lack of Encryption Challenge, Security During Updates Challenge and Lack of User Awareness Challenge of IoT devices. However, the manner in which the CRA addresses all these
物联网(IoT)是一个由相互连接的设备(物联网设备)组成的生态系统,能够进行智能决策。物联网设备包括电视机、汽车和鞋子等日常物品。物联网带来的互联性将网络安全需求从信息安全领域扩展到物理安全领域。然而,确保物联网设备的网络安全远非一蹴而就,因为物联网设备面临着一些相关的网络安全挑战。在这方面,物联网设备面临的一些相关网络安全挑战包括(i) 制造过程中的安全性,(ii) 识别和认证,(iii) 缺乏加密,(iv) 攻击面大,(v) 更新过程中的安全性,(vi) 缺乏用户意识,(vii) 标准和法规不统一。在此背景下,欧盟提出了《网络复原力法案》(CRA),以补充由《网络安全法案》和《NIS2 指令》等立法组成的现有网络安全框架。然而,《物联网复原力法》是否为欧盟有效应对物联网设备的网络安全挑战提供了一个框架?网络安全法》的核心是制定和实施必要的规则,以确保 "具有数字元素的产品"(包括物联网设备)的网络安全。为此,物联网设备的制造商、进口商和分销商必须履行多项义务。制造商在将物联网设备投放市场之前,必须确保满足《通信管理局》规定的基本网络安全要求。虽然《网络安全法》规定的网络安全要求值得称赞,但《网络安全法》存在一些模糊之处,可能会影响其潜在影响。例如,《网络安全法》可指导制造商如何进行网络安全风险评估,并可澄清 "限制攻击面 "和 "无任何已知可利用漏洞 "等术语的含义。从物联网设备的网络安全挑战的角度分析《网络安全法》的基本主题,就会发现《网络安全法》确实为有效应对物联网设备的网络安全挑战奠定了基础。然而,《网络安全法》各部分(包括附件一要求)的措辞过于宽泛,在多个方面留下了解释空间。因此,CRA 在应对 "制造过程中的安全挑战"、"识别和认证挑战"、"大攻击面挑战 "以及 "标准和法规分歧挑战 "方面的有效性在很大程度上取决于统一标准的制定和行业采用情况。物联网设备缺乏加密挑战、更新过程中的安全挑战和缺乏用户意识挑战,CRA 似乎能更有效地应对这些挑战,尽管并非完全有效。不过,如果赋予 ENISA 等机构法律授权,根据《网络安全法》制定详细的网络安全要求标准,《网络安全法》应对所有这些网络安全挑战的方式就会得到改进。
{"title":"Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark?","authors":"Mohammed Raiz Shaffique","doi":"10.1016/j.clsr.2024.106009","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106009","url":null,"abstract":"&lt;div&gt;&lt;p&gt;Internet of Things (IoT) is an ecosystem of interconnected devices (IoT devices) that is capable of intelligent decision making. IoT devices can include everyday objects such as televisions, cars and shoes. The interconnectedness brought forth by IoT has extended the need for cybersecurity beyond the information security realm into the physical security sphere. However, ensuring cybersecurity of IoT devices is far from straightforward because IoT devices have several cybersecurity challenges associated with them. Some of the pertinent cybersecurity challenges of IoT devices in this regard relate to: (i) Security During Manufacturing, (ii) Identification and Authentication, (iii) Lack of Encryption, (iv) Large Attack Surface, (v) Security During Updates, (vi) Lack of User Awareness and (vii) Diverging Standards and Regulations.&lt;/p&gt;&lt;p&gt;Against this background, the Cyber Resilience Act (CRA) has been proposed to complement the existing EU cybersecurity framework consisting of legislations such as the Cybersecurity Act and the NIS2 Directive. However, does the CRA provide a framework for effectively combating the cybersecurity challenges of IoT devices in the EU? The central crux of the CRA is to lay down and enforce the rules required to ensure cybersecurity of ‘products with digital elements’, which includes IoT devices. To this end, several obligations are imposed on manufacturers, importers and distributors of IoT devices. Manufacturers are mandated to ensure that the essential cybersecurity requirements prescribed by the CRA are met before placing IoT devices in the market. While the cybersecurity requirements mandated by the CRA are commendable, the CRA suffers from several ambiguities which can hamper its potential impact. For instance, the CRA could provide guidance to manufacturers on how to conduct cybersecurity risk assessment and could clarify the meanings of terms such as “&lt;em&gt;limit attack surfaces&lt;/em&gt;” and “&lt;em&gt;without any known exploitable vulnerabilitie&lt;/em&gt;s”.&lt;/p&gt;&lt;p&gt;When the fundamental themes of the CRA is analysed from the prism of the cybersecurity challenges of IoT devices, it becomes clear that the CRA does provide a foundation for effectively addressing the cybersecurity challenges of IoT devices. However, the expansive wording in various parts of the CRA, including in the Annex I Requirements, leaves scope for interpretation on several fronts. Consequently, the effectiveness of the CRA in tackling the Security During Manufacturing Challenge, Identification and Authentication Challenge, Large Attack Surface Challenge and Diverging Standards and Regulations Challenge would be largely contingent on how harmonised standards develop and how the industry adopts them. The CRA seems to be more effective, albeit not fully so, in significantly addressing the Lack of Encryption Challenge, Security During Updates Challenge and Lack of User Awareness Challenge of IoT devices. However, the manner in which the CRA addresses all these","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106009"},"PeriodicalIF":3.3,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000761/pdfft?md5=cffbcbbedc6e57f54e9b97ba7eead7ab&pid=1-s2.0-S0267364924000761-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta-Regulation: An ideal alternative to the primary responsibility as the regulatory model of generative AI in China 元监管:中国生成式人工智能监管模式的主要责任之外的理想选择
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-07-04 DOI: 10.1016/j.clsr.2024.106016
Huijuan Dong , Junkai Chen

Generative AI with stronger responsiveness and emergent abilities has triggered a global boom and is facing challenges such as data compliance risks during the pretraining process and risks of generating fake information, which has raised concerns among global regulatory authorities. The European Union, United States, United Kingdom, and other countries and regions are gradually establishing risk-based, scenario-based, and outcome-based governance models for generative AI. China recently introduced new regulations for the management of generative AI, which adopt a governance model focusing on generative AI service providers. It suggests that China is continuing the principle of primary responsibility in Internet governance, which encompasses legal responsibility, contractual obligations, and ethical responsibility. However, the governance model based on primary responsibility emphasizes the accountability of generative AI model service providers, with relatively limited regulation on other important entities such as users and large-scale dissemination platforms, which may not be conducive to achieving China's regulatory goals for the AI industry. In comparison, the Meta-Regulation model could be an ideal alternative for China. As a classic theory explaining the public-private relationship, the ‘Meta-Regulation’ aligns with the generative AI governance requirements. Based on the Meta-Regulation theory, the governance of generative AI in China should move towards a direction of emphasizing safety, transparency, collaborative governance, and accountability. In line with this, it is necessary to include users and large-scale dissemination platforms within the regulatory scope and establish overarching governance objectives that ensure the responsible distribution of duties among stakeholders, with regulatory authorities assuming ultimate oversight responsibility and technical coordination. At the level of specific improvement measures, it is possible to integrate the three stages of model development, usage, and content dissemination of generative AI. During the model development stage, generative AI providers have specific transparency obligations. In the usage stage, a self-regulatory system centered around platform autonomy should be constructed. In the content dissemination stage, the proactive notification obligations of the dissemination platforms should be clearly defined. Additionally, the enforcement of technical interoperability requirements is necessary, thereby promoting the orderly development of generative AI applications.

具有更强响应能力和突现能力的生成式人工智能在全球掀起热潮,同时也面临着预训练过程中的数据合规风险和生成虚假信息的风险等挑战,引起了全球监管机构的关注。欧盟、美国、英国等国家和地区正在逐步建立基于风险、基于场景、基于结果的生成式人工智能治理模式。中国最近出台了新的生成式人工智能管理条例,采用了以生成式人工智能服务提供商为核心的治理模式。这表明中国在互联网治理中延续了主要责任原则,包括法律责任、合同义务和道德责任。然而,基于主体责任的治理模式强调的是对人工智能模型生成服务提供者的问责,对用户、大型传播平台等其他重要主体的监管相对有限,这可能不利于实现中国对人工智能产业的监管目标。相比之下,元监管模式可能是中国的理想选择。作为解释公私关系的经典理论,"元监管 "符合人工智能治理的生成性要求。基于 "元监管 "理论,中国的创生型人工智能治理应朝着强调安全、透明、协同治理和问责的方向发展。与此相适应,有必要将用户和大型传播平台纳入监管范围,确立总体治理目标,确保各利益相关方分工负责,监管部门承担最终的监督责任和技术协调。在具体改进措施层面,可以整合生成式人工智能的模型开发、使用和内容传播三个阶段。在模型开发阶段,生成式人工智能提供商有具体的透明度义务。在使用阶段,应构建以平台自治为核心的自律体系。在内容传播阶段,应明确规定传播平台的主动通知义务。此外,有必要执行技术互操作性要求,从而促进生成式人工智能应用的有序发展。
{"title":"Meta-Regulation: An ideal alternative to the primary responsibility as the regulatory model of generative AI in China","authors":"Huijuan Dong ,&nbsp;Junkai Chen","doi":"10.1016/j.clsr.2024.106016","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106016","url":null,"abstract":"<div><p>Generative AI with stronger responsiveness and emergent abilities has triggered a global boom and is facing challenges such as data compliance risks during the pretraining process and risks of generating fake information, which has raised concerns among global regulatory authorities. The European Union, United States, United Kingdom, and other countries and regions are gradually establishing risk-based, scenario-based, and outcome-based governance models for generative AI. China recently introduced new regulations for the management of generative AI, which adopt a governance model focusing on generative AI service providers. It suggests that China is continuing the principle of primary responsibility in Internet governance, which encompasses legal responsibility, contractual obligations, and ethical responsibility. However, the governance model based on primary responsibility emphasizes the accountability of generative AI model service providers, with relatively limited regulation on other important entities such as users and large-scale dissemination platforms, which may not be conducive to achieving China's regulatory goals for the AI industry. In comparison, the Meta-Regulation model could be an ideal alternative for China. As a classic theory explaining the public-private relationship, the ‘Meta-Regulation’ aligns with the generative AI governance requirements. Based on the Meta-Regulation theory, the governance of generative AI in China should move towards a direction of emphasizing safety, transparency, collaborative governance, and accountability. In line with this, it is necessary to include users and large-scale dissemination platforms within the regulatory scope and establish overarching governance objectives that ensure the responsible distribution of duties among stakeholders, with regulatory authorities assuming ultimate oversight responsibility and technical coordination. At the level of specific improvement measures, it is possible to integrate the three stages of model development, usage, and content dissemination of generative AI. During the model development stage, generative AI providers have specific transparency obligations. In the usage stage, a self-regulatory system centered around platform autonomy should be constructed. In the content dissemination stage, the proactive notification obligations of the dissemination platforms should be clearly defined. Additionally, the enforcement of technical interoperability requirements is necessary, thereby promoting the orderly development of generative AI applications.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106016"},"PeriodicalIF":3.3,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Will the GDPR Restrain Health Data Access Bodies Under the European Health Data Space (EHDS)? GDPR 是否会限制欧洲健康数据空间 (EHDS) 下的健康数据访问机构?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-07-02 DOI: 10.1016/j.clsr.2024.105993
Paul Quinn, Erika Ellyne, Cong Yao

The plans for a European Health Data Space (EHDS) envisage an ambitious and radical platform that will inter alia make the sharing of secondary health data easier. It will encourage the systematic sharing of health data and provide a legal framework for it to be shared by Health Data Access Bodies (HDABs) based in each of the Member States. Whilst this promises to bring about major benefits for research and innovation, it also raises serious questions given the intrinsic sensitivity of health data. Fears concerning privacy harms on the individual level and detrimental effects on the societal level have been raised. This article discusses two of the main protective pillars designed to allay such concerns. The first is that the proposal clearly outlines several contexts for which a Health Data Access Permit (HDAP) should and should not be granted. The second is that a request for an HDAP must also be compliant with the GDPR (inter alia requiring a valid legal basis and respecting data processing principles such as ‘minimization’ and ‘storage limitation’). As this article discusses, in some instances the need to have a valid legal basis under the GDPR may make it difficult to obtain a data access permit, in particular for some of the commercially orientated grounds outlined within the EHDS proposal. A further important issue concerns the ability of HDABs to analyse the compatibility permit requests under the GDPR and relevant national law at both speed and scale.

欧洲健康数据空间(EHDS)计划设想了一个雄心勃勃的激进平台,除其他外,该平台将使二级健康数据的共享更加容易。它将鼓励系统地共享健康数据,并为设在各成员国的健康数据访问机构(HDABs)共享健康数据提供法律框架。虽然这有望为研究和创新带来重大益处,但鉴于健康数据固有的敏感性,它也提出了严重的问题。人们担心个人隐私会受到损害,社会层面也会受到不利影响。本文讨论了旨在消除这些担忧的两个主要保护支柱。首先,该提案明确概述了应该和不应该获得健康数据访问许可(HDAP)的几种情况。其次,HDAP 申请还必须符合 GDPR 的规定(特别是要求有有效的法律依据,并遵守 "最小化 "和 "存储限制 "等数据处理原则)。正如本文所讨论的,在某些情况下,根据 GDPR 需要有有效的法律依据可能会导致难以获得数据访问许可,特别是对于 EHDS 建议中概述的一些商业导向的理由。另一个重要问题涉及 HDAB 根据 GDPR 和相关国家法律对兼容性许可申请进行快速和大规模分析的能力。
{"title":"Will the GDPR Restrain Health Data Access Bodies Under the European Health Data Space (EHDS)?","authors":"Paul Quinn,&nbsp;Erika Ellyne,&nbsp;Cong Yao","doi":"10.1016/j.clsr.2024.105993","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105993","url":null,"abstract":"<div><p>The plans for a European Health Data Space (EHDS) envisage an ambitious and radical platform that will inter alia make the sharing of secondary health data easier. It will encourage the systematic sharing of health data and provide a legal framework for it to be shared by Health Data Access Bodies (HDABs) based in each of the Member States. Whilst this promises to bring about major benefits for research and innovation, it also raises serious questions given the intrinsic sensitivity of health data. Fears concerning privacy harms on the individual level and detrimental effects on the societal level have been raised. This article discusses two of the main protective pillars designed to allay such concerns. The first is that the proposal clearly outlines several contexts for which a Health Data Access Permit (HDAP) should and should not be granted. The second is that a request for an HDAP must also be compliant with the GDPR (inter alia requiring a valid legal basis and respecting data processing principles such as ‘minimization’ and ‘storage limitation’). As this article discusses, in some instances the need to have a valid legal basis under the GDPR may make it difficult to obtain a data access permit, in particular for some of the commercially orientated grounds outlined within the EHDS proposal. A further important issue concerns the ability of HDABs to analyse the compatibility permit requests under the GDPR and relevant national law at both speed and scale.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 105993"},"PeriodicalIF":3.3,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141482974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ETIAS system and new proposals to advance the use of AI in public services ETIAS 系统和推动在公共服务中使用人工智能的新建议
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-07-02 DOI: 10.1016/j.clsr.2024.106015
Clara Isabel Velasco Rico , Migle Laukyte

Eu-LISA is launching the European Travel Information and Authorization System (ETIAS), which seems an example of a different, human rights-oriented approach to AI within the law enforcement. However, the reality is quite different: the usual problems of the use of AI—lack of transparency, bias, opacity, just to name a few—are still on board. This paper critically assesses these promises of ETIAS and argues that it has serious issues that have not been properly dealt with. So as to argue the need to address these issues, the paper addresses ETIAS within the wider context of human rights and solidarity-based data governance. In this respect, ETIAS is seen as a tool which uses data for high value purposes, such as EU safety and security, yet it also calls for serious risk mitigation measures. Indeed, the risks related to law enforcement on the borders and in migration management are extremely serious due to the vulnerability of people who escape from poverty, wars, regimes, and other disasters. In the third part of this article, we articulate three proposals of such risk mitigation measures. We argue in favour of strengthening critical general safeguards in ETIAS, then elaborate a principle that should guide AI-based public service development (P4P principle) and end with a few IPR-related requirements for private sector involvement in such services. Adopting these measures could contribute to reduce the risk of building EU AI expertise upon data coming from the most vulnerable social groups of our planet.

Eu-LISA 正在启动欧洲旅行信息和授权系统(ETIAS),这似乎是执法部门在人工智能方面采取不同的、以人权为导向的方法的一个范例。然而,现实情况却大相径庭:使用人工智能的常见问题--缺乏透明度、偏见、不透明等等--依然存在。本文对 ETIAS 的这些承诺进行了批判性评估,认为其存在严重问题,尚未得到妥善处理。为了论证解决这些问题的必要性,本文在人权和基于团结的数据管理的大背景下论述了 ETIAS。在这方面,ETIAS 被视为一种将数据用于欧盟安全和安保等高价值目的的工具,但它也要求采取严重的风险缓解措施。事实上,由于逃离贫困、战争、政权和其他灾难的人们的脆弱性,与边境执法和移民管理相关的风险极其严重。在本文的第三部分,我们将就此类风险缓解措施提出三项建议。我们主张加强 ETIAS 中关键的一般保障措施,然后阐述了一项指导人工智能公共服务发展的原则(P4P 原则),最后提出了私营部门参与此类服务的一些知识产权相关要求。采取这些措施有助于降低欧盟利用来自地球上最弱势社会群体的数据建立人工智能专业知识的风险。
{"title":"ETIAS system and new proposals to advance the use of AI in public services","authors":"Clara Isabel Velasco Rico ,&nbsp;Migle Laukyte","doi":"10.1016/j.clsr.2024.106015","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106015","url":null,"abstract":"<div><p>Eu-LISA is launching the European Travel Information and Authorization System (ETIAS), which seems an example of a different, human rights-oriented approach to AI within the law enforcement. However, the reality is quite different: the usual problems of the use of AI—lack of transparency, bias, opacity, just to name a few—are still on board. This paper critically assesses these promises of ETIAS and argues that it has serious issues that have not been properly dealt with. So as to argue the need to address these issues, the paper addresses ETIAS within the wider context of human rights and solidarity-based data governance. In this respect, ETIAS is seen as a tool which uses data for high value purposes, such as EU safety and security, yet it also calls for serious risk mitigation measures. Indeed, the risks related to law enforcement on the borders and in migration management are extremely serious due to the vulnerability of people who escape from poverty, wars, regimes, and other disasters. In the third part of this article, we articulate three proposals of such risk mitigation measures. We argue in favour of strengthening critical general safeguards in ETIAS, then elaborate a principle that should guide AI-based public service development (P4P principle) and end with a few IPR-related requirements for private sector involvement in such services. Adopting these measures could contribute to reduce the risk of building EU AI expertise upon data coming from the most vulnerable social groups of our planet.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106015"},"PeriodicalIF":3.3,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000815/pdfft?md5=49b2b58312c8697b7334418c2e13e052&pid=1-s2.0-S0267364924000815-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141482997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI liability in Europe: How does it complement risk regulation and deal with the problem of human oversight? 欧洲的人工智能责任:它如何补充风险监管并解决人为监督问题?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-06-29 DOI: 10.1016/j.clsr.2024.106012
Beatriz Botero Arcila

Who should compensate you if you get hit by a car in “autopilot” mode: the safety driver or the car manufacturer? What about if you find out you were unfairly discriminated against by an AI decision-making tool that was being supervised by an HR professional? Should the developer compensate you, the company that procured the software, or the (employer of the) HR professional that was “supervising” the system's output?

These questions do not have easy answers. In the European Union and elsewhere around the world, AI governance is turning towards risk regulation. Risk regulation alone is, however, rarely optimal. The situations above all involve the liability for harms that are caused by or with an AI system. While risk regulations like the AI Act regulate some aspects of these human and machine interactions, they do not offer those impacted by AI systems any rights and little avenues to seek redress. From a corrective justice perspective risk regulation must also be complemented by liability law because when harms do occur, harmed individuals should be compensated. From a risk-prevention perspective, risk regulation may still fall short of creating optimal incentives for all parties to take precautions.

Because risk regulation is not enough, scholars and regulators around the world have highlighted that AI regulations should be complemented by liability rules to address AI harms when they occur. Using a law and economics framework this Article examines how the recently proposed AI liability regime in the EU – a revision of the Product Liability Directive, and an AI Liability effectively complement the AI Act and how they address the particularities of AI-human interactions.

如果你被一辆处于 "自动驾驶 "模式的汽车撞了,谁应该赔偿你:是安全驾驶员还是汽车制造商?如果你发现自己受到由人力资源专业人士监督的人工智能决策工具的不公平歧视,该怎么办?开发商、采购软件的公司或 "监督 "系统输出的人力资源专业人员的(雇主)是否应该对你进行赔偿?在欧盟和世界其他地方,人工智能治理正转向风险监管。然而,仅靠风险监管很少能达到最佳效果。上述情况都涉及人工智能系统所造成或与之相关的伤害责任。虽然像《人工智能法》这样的风险法规对这些人机交互的某些方面进行了规范,但它们并没有为受到人工智能系统影响的人提供任何权利,也几乎没有寻求补救的途径。从矫正正义的角度来看,风险监管还必须辅之以责任法,因为当伤害发生时,受到伤害的个人应该得到赔偿。由于仅有风险监管是不够的,世界各地的学者和监管者都强调,人工智能法规应辅以责任规则,以应对人工智能损害的发生。本文采用法律和经济学框架,研究了欧盟最近提出的人工智能责任制度--《产品责任指令》修订版和人工智能责任如何有效补充《人工智能法》,以及它们如何解决人工智能与人类互动的特殊性。
{"title":"AI liability in Europe: How does it complement risk regulation and deal with the problem of human oversight?","authors":"Beatriz Botero Arcila","doi":"10.1016/j.clsr.2024.106012","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106012","url":null,"abstract":"<div><p>Who should compensate you if you get hit by a car in “autopilot” mode: the safety driver or the car manufacturer? What about if you find out you were unfairly discriminated against by an AI decision-making tool that was being supervised by an HR professional? Should the developer compensate you, the company that procured the software, or the (employer of the) HR professional that was “supervising” the system's output?</p><p>These questions do not have easy answers. In the European Union and elsewhere around the world, AI governance is turning towards risk regulation. Risk regulation alone is, however, rarely optimal. The situations above all involve the liability for harms that are caused by or with an AI system. While risk regulations like the AI Act regulate some aspects of these human and machine interactions, they do not offer those impacted by AI systems any rights and little avenues to seek redress. From a corrective justice perspective risk regulation must also be complemented by liability law because when harms do occur, harmed individuals should be compensated. From a risk-prevention perspective, risk regulation may still fall short of creating optimal incentives for all parties to take precautions.</p><p>Because risk regulation is not enough, scholars and regulators around the world have highlighted that AI regulations should be complemented by liability rules to address AI harms when they occur. Using a law and economics framework this Article examines how the recently proposed AI liability regime in the EU – a revision of the Product Liability Directive, and an AI Liability effectively complement the AI Act and how they address the particularities of AI-human interactions.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106012"},"PeriodicalIF":3.3,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000797/pdfft?md5=4672fdb50a5856a23c27094c7201b057&pid=1-s2.0-S0267364924000797-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141482996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stuxnet vs WannaCry and Albania: Cyber-attribution on trial Stuxnet vs WannaCry 和阿尔巴尼亚:网络攻击审判
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-06-28 DOI: 10.1016/j.clsr.2024.106008
Jakub Vostoupal

The cyber-attribution problem poses a significant challenge to the effective application of international law in cyberspace. Rooted in unclear standards of proof, evidence disclosure requirements, and deficiencies within the legal framework of the attribution procedure, this issue reflects the limitations of some traditional legal concepts in addressing the unique nature of cyberspace. Notably, the effective control test, introduced by the ICJ in 1986 and reaffirmed in 2007 to attribute the actions of non-state actors, does not adequately account for the distinctive dynamics of cyberspace, allowing states to use proxies to evade responsibility.

The legal impracticality and insufficiency of the attribution procedure not only give rise to the cyber-attribution problem but also compel states to develop new attribution tactics. This article explores the evolution of these cyber-attribution techniques to assess whether contemporary state practices align with the customary rules of attribution identified by the ICJ and codified by the ILC within ARSIWA, or whether new, cyber-specific rules might emerge. By analyzing two datasets on cyber incidents and three distinct cases – Stuxnet, WannaCry, and the 2022 cyberattacks against Albania – this article concludes that the effective control test cannot be conclusively identified as part of customary rules within cyberspace due to the insufficient support in state practice. Furthermore, it is apparent that the rules of attribution in the cyber-specific context are in a disarray, lacking consistent, widespread and representative practice to support a general custom. However, emerging state practice shows some degree of unification and development, suggesting the potential for the future establishment of cyber-specific rules of attribution.

网络归属问题对国际法在网络空间的有效应用提出了重大挑战。这一问题的根源在于举证标准不明确、证据披露要求以及归属程序法律框架内的缺陷,它反映了一些传统法律概念在处理网络空间独特性质方面的局限性。值得注意的是,1986 年由国际法院引入并在 2007 年得到重申的有效控制检验标准(用于对非国家行为者的行为进行归属)并没有充分考虑到网络空间的独特动态,使得国家可以利用代理人来逃避责任。法律上的不切实际和归属程序的不足不仅导致了网络归属问题,还迫使国家开发新的归属策略。本文探讨了这些网络归责技术的演变,以评估当代国家的做法是否符合由国际法院确定并由国际法委员会编入 ARSIWA 的归责习惯规则,或者是否可能出现新的网络特定规则。通过分析两个网络事件数据集和三个不同的案例--Stuxnet、WannaCry 和 2022 年针对阿尔巴尼亚的网络攻击--本文得出结论,由于国家实践中的支持不足,有效控制测试不能被最终确定为网络空间中习惯规则的一部分。此外,网络特定背景下的归属规则显然处于混乱状态,缺乏一致、广泛和有代表性的实践来支持一般习惯。不过,新出现的国家实践显示出一定程度的统一和发展,表明未来有可能建立网络特定的归属规则。
{"title":"Stuxnet vs WannaCry and Albania: Cyber-attribution on trial","authors":"Jakub Vostoupal","doi":"10.1016/j.clsr.2024.106008","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106008","url":null,"abstract":"<div><p>The cyber-attribution problem poses a significant challenge to the effective application of international law in cyberspace. Rooted in unclear standards of proof, evidence disclosure requirements, and deficiencies within the legal framework of the attribution procedure, this issue reflects the limitations of some traditional legal concepts in addressing the unique nature of cyberspace. Notably, the <em>effective control test</em>, introduced by the ICJ in 1986 and reaffirmed in 2007 to attribute the actions of non-state actors, does not adequately account for the distinctive dynamics of cyberspace, allowing states to use proxies to evade responsibility.</p><p>The legal impracticality and insufficiency of the attribution procedure not only give rise to the cyber-attribution problem but also compel states to develop new attribution tactics. This article explores the evolution of these cyber-attribution techniques to assess whether contemporary state practices align with the customary rules of attribution identified by the ICJ and codified by the ILC within ARSIWA, or whether new, cyber-specific rules might emerge. By analyzing two datasets on cyber incidents and three distinct cases – Stuxnet, WannaCry, and the 2022 cyberattacks against Albania – this article concludes that the <em>effective control test</em> cannot be conclusively identified as part of customary rules within cyberspace due to the insufficient support in state practice. Furthermore, it is apparent that the rules of attribution in the cyber-specific context are in a disarray, lacking consistent, widespread and representative practice to support a general custom. However, emerging state practice shows some degree of unification and development, suggesting the potential for the future establishment of cyber-specific rules of attribution.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106008"},"PeriodicalIF":3.3,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141482976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolving Threats, Emerging Laws: Poland's 2023 Answer to the Smishing Challenge 不断演变的威胁,新兴的法律:波兰 2023 年应对网络钓鱼挑战的对策
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-06-24 DOI: 10.1016/j.clsr.2024.106013
Sebastian Zieliński

In the face of rising cybersecurity threats like 'smishing'—SMS-based phishing attacks—this article examines how legislative efforts can effectively address these challenges. This article provides a comprehensive analysis of cybersecurity challenges, focusing on the still growing phenomenon of 'smishing', within the legislative context. In particular, it explores the legal landscape of cybercrime through the lens of Poland's recently enacted Act on Combating Abuses in Electronic Communication, as well as the European Union's Cybersecurity Strategy for the Digital Decade. The first one serves as a significant case study for examining legislative efforts aimed at mitigating cybersecurity risks in the field of electronic communications. The article describes the multi-layered, collaborative business-state approach of the Polish law, which can provide a solid framework for addressing current and future cyber security threats. The act stands as a promising tool for fortifying national cybersecurity infrastructure and could serve as a useful example for other jurisdictions grappling with similar issues. The law also engages citizens actively in its cybersecurity initiatives, promoting collective responsibility. In the broader European Union context, while the Polish Act undergoes scrutiny, this analysis also seeks to explore its alignment with the objectives outlined in the 2020′s European Union's Cybersecurity Strategy for the Digital Decade. This examination aims to evaluate the extent to which the Polish legislative framework resonates with the overarching goals set forth by the European Union, thereby contributing to a deeper understanding of the synergy between national initiatives and the broader European cybersecurity strategy context.

面对 "网络钓鱼"(基于短信的网络钓鱼攻击)等日益严重的网络安全威胁,本文探讨了立法工作如何才能有效应对这些挑战。本文从立法角度全面分析了网络安全挑战,重点关注仍在不断增长的 "网络钓鱼 "现象。特别是,文章从波兰最近颁布的《打击滥用电子通信法案》和欧盟的《数字十年网络安全战略》的角度,探讨了网络犯罪的法律前景。前者是研究旨在降低电子通信领域网络安全风险的立法工作的重要案例。文章介绍了波兰法律的多层次、企业与国家合作的方法,它可以为应对当前和未来的网络安全威胁提供一个坚实的框架。该法是加强国家网络安全基础设施的一个很有前途的工具,可为其他司法管辖区解决类似问题提供有益的范例。该法还让公民积极参与其网络安全倡议,促进集体责任。在更广泛的欧盟背景下,在对波兰法律进行审查的同时,本分析还试图探讨其与2020 年《欧盟数字十年网络安全战略》中概述的目标的一致性。本研究旨在评估波兰立法框架与欧盟提出的总体目标的共鸣程度,从而有助于更深入地理解国家倡议与更广泛的欧洲网络安全战略背景之间的协同作用。
{"title":"Evolving Threats, Emerging Laws: Poland's 2023 Answer to the Smishing Challenge","authors":"Sebastian Zieliński","doi":"10.1016/j.clsr.2024.106013","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106013","url":null,"abstract":"<div><p>In the face of rising cybersecurity threats like 'smishing'—SMS-based phishing attacks—this article examines how legislative efforts can effectively address these challenges. This article provides a comprehensive analysis of cybersecurity challenges, focusing on the still growing phenomenon of 'smishing', within the legislative context. In particular, it explores the legal landscape of cybercrime through the lens of Poland's recently enacted Act on Combating Abuses in Electronic Communication, as well as the European Union's Cybersecurity Strategy for the Digital Decade. The first one serves as a significant case study for examining legislative efforts aimed at mitigating cybersecurity risks in the field of electronic communications. The article describes the multi-layered, collaborative business-state approach of the Polish law, which can provide a solid framework for addressing current and future cyber security threats. The act stands as a promising tool for fortifying national cybersecurity infrastructure and could serve as a useful example for other jurisdictions grappling with similar issues. The law also engages citizens actively in its cybersecurity initiatives, promoting collective responsibility. In the broader European Union context, while the Polish Act undergoes scrutiny, this analysis also seeks to explore its alignment with the objectives outlined in the 2020′s European Union's Cybersecurity Strategy for the Digital Decade. This examination aims to evaluate the extent to which the Polish legislative framework resonates with the overarching goals set forth by the European Union, thereby contributing to a deeper understanding of the synergy between national initiatives and the broader European cybersecurity strategy context.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106013"},"PeriodicalIF":3.3,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141482975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EU sanctions in response to cyber-attacks as crime-based emergency measures 欧盟针对网络攻击的制裁是基于犯罪的紧急措施
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-06-21 DOI: 10.1016/j.clsr.2024.106010
Yuliya Miadzvetskaya

This contribution seeks to explore the growing use of administrative measures in response to cybercrimes by analysing the specific case of sanctions in response to cyber-attacks. They constitute a novel crime-based sanctions regime, laying the foundations of personalised deterrence with respect to malicious cyber actors and consist in asset freezes and visa bans. This article reflects on the hazy boundary between crime-based sanctions as administrative or criminal law measures. The paper argues that while crime-based sanctions in response to cyber-attacks present certain similarities with criminal law measures, they remain complementary crime prevention instruments. Their administrative nature allows for an emergency response to malicious cyber operations that would not be permissible if a more stringent evidentiary standard was required.

本文旨在通过分析针对网络攻击的制裁这一具体案例,探讨在应对网络犯罪时越来越多地使用行政措施的问题。它们构成了一种新型的基于犯罪的制裁制度,为针对恶意网络行为者的个性化威慑奠定了基础,包括资产冻结和签证禁令。本文对基于犯罪的制裁是行政措施还是刑法措施这一模糊界限进行了反思。本文认为,虽然针对网络攻击的犯罪制裁与刑法措施有某些相似之处,但它们仍然是互补的预防犯罪工具。它们的行政性质允许对恶意网络行动做出紧急反应,而如果要求更严格的证据标准,则不允许这样做。
{"title":"EU sanctions in response to cyber-attacks as crime-based emergency measures","authors":"Yuliya Miadzvetskaya","doi":"10.1016/j.clsr.2024.106010","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106010","url":null,"abstract":"<div><p>This contribution seeks to explore the growing use of administrative measures in response to cybercrimes by analysing the specific case of sanctions in response to cyber-attacks. They constitute a novel crime-based sanctions regime, laying the foundations of personalised deterrence with respect to malicious cyber actors and consist in asset freezes and visa bans. This article reflects on the hazy boundary between crime-based sanctions as administrative or criminal law measures. The paper argues that while crime-based sanctions in response to cyber-attacks present certain similarities with criminal law measures, they remain complementary crime prevention instruments. Their administrative nature allows for an emergency response to malicious cyber operations that would not be permissible if a more stringent evidentiary standard was required.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106010"},"PeriodicalIF":3.3,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141434316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The reform of consumer protection in mobile payment services in China: Legislation, regulation, and dispute resolution 中国移动支付服务的消费者保护改革:立法、监管和争议解决
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-14 DOI: 10.1016/j.clsr.2024.106007
Ningyao Ye , Zeyu Zhao

In China, mobile payment services, based on a rapid development of financial technology, have been playing an essential role in Chinese residents’ daily life, creating a cashless society. Unlike many advanced countries having a clear legal definition of financial consumers and incorporating consumers of mobile payment services into financial consumers, China, as one of the largest markets for mobile payment services, has not had a clear legal definition of financial consumers with no clarity regarding whether consumers of mobile payment services belong to financial consumers. This article not only provides a legal analysis of consumers of mobile payment services in China, but also outrightly explores the prospective reform of financial consumer protection with reference to other countries’ successful experience and standards. By the analysis, this article attempts to find out solution for the Chinese financial consumer protection scheme and argues that the Chinese financial consumer protection scheme has to be well designed to maintain a balance between consumers and mobile payment giants.

在中国,基于金融科技飞速发展的移动支付服务已经在中国居民的日常生活中发挥着不可或缺的作用,创造了一个无现金社会。与许多先进国家对金融消费者有明确的法律定义并将移动支付服务消费者纳入金融消费者不同,中国作为移动支付服务的最大市场之一,却一直没有明确的金融消费者法律定义,移动支付服务消费者是否属于金融消费者也不明确。本文不仅对中国移动支付服务消费者进行了法律分析,还在借鉴其他国家成功经验和标准的基础上,对金融消费者保护改革的前瞻性进行了深入探讨。通过分析,本文试图找出中国金融消费者保护制度的解决方案,并认为中国金融消费者保护制度必须设计完善,以保持消费者与移动支付巨头之间的平衡。
{"title":"The reform of consumer protection in mobile payment services in China: Legislation, regulation, and dispute resolution","authors":"Ningyao Ye ,&nbsp;Zeyu Zhao","doi":"10.1016/j.clsr.2024.106007","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.106007","url":null,"abstract":"<div><p>In China, mobile payment services, based on a rapid development of financial technology, have been playing an essential role in Chinese residents’ daily life, creating a cashless society. Unlike many advanced countries having a clear legal definition of financial consumers and incorporating consumers of mobile payment services into financial consumers, China, as one of the largest markets for mobile payment services, has not had a clear legal definition of financial consumers with no clarity regarding whether consumers of mobile payment services belong to financial consumers. This article not only provides a legal analysis of consumers of mobile payment services in China, but also outrightly explores the prospective reform of financial consumer protection with reference to other countries’ successful experience and standards. By the analysis, this article attempts to find out solution for the Chinese financial consumer protection scheme and argues that the Chinese financial consumer protection scheme has to be well designed to maintain a balance between consumers and mobile payment giants.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106007"},"PeriodicalIF":2.9,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration 中国跨境数据传输监管方式的发展:放宽与整合
IF 2.9 3区 社会学 Q1 LAW Pub Date : 2024-06-08 DOI: 10.1016/j.clsr.2024.105997
Meng Chen (Associate Professor)

This article illustrates the developing Chinese cross-border data flow regulation regime deriving from a holistic national security conception to its balance with personal information protection and digital economic development. Under the pressuring demand of digital economy development and an increasing appeal to global data governance, China is progressively improving and modifying its original government-led and restrictive cross-border data regulations. Subsequent practices and the publication of the Provisions on Promoting and Regulating Cross-border Data Transfer (PPR) in March 2024 deliver a clear sign of relaxation on restrictions on cross-border data flow, especially on the subject of personal information outbound transfer. Detailed comparison with data provisions in the Regional Comprehensive Economic Partnership (RCEP), the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and the Digital Economy Partnership Agreement (DEPA) demonstrates that global governance of cross-border data flows is unshaped but not unrealistic, even with current fragmented national approaches. China has established a complete personal information protection legal regime and is very close to integrating into transnational cooperation for a broader framework. In addition, by coordinating national provisions regarding cross-data transfer with international rules and piloting lenient cross-border data supervision mechanisms in numerous Pilot Free Trade Zone (PFTZ), China is ready to evolve its cross-border data flow regulations and contribute to global data governance step-by-step.

本文阐述了从整体国家安全观到兼顾个人信息保护与数字经济发展的中国跨境数据流动监管制度的发展历程。在数字经济发展和全球数据治理呼声日益高涨的压力下,中国正在逐步完善和修改原有的由政府主导的限制性跨境数据法规。随后的实践以及 2024 年 3 月《关于促进和规范跨境数据传输的若干规定》(PPR)的发布,都释放出对跨境数据流动,尤其是个人信息出境传输限制放宽的明显信号。与《区域全面经济伙伴关系协定》(RCEP)、《跨太平洋伙伴关系全面进步协定》(CPTPP)和《数字经济伙伴关系协定》(DEPA)中的数据条款进行详细比较后发现,即使目前各国的做法各自为政,跨境数据流动的全球治理也是不成形的,但并非不现实。中国已经建立了完整的个人信息保护法律体系,并即将融入跨国合作,建立更广泛的框架。此外,通过协调国家有关跨境数据传输的规定与国际规则,以及在众多自由贸易试验区(PFTZ)试点宽松的跨境数据监管机制,中国已做好准备,逐步发展跨境数据流动法规,为全球数据治理做出贡献。
{"title":"Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration","authors":"Meng Chen (Associate Professor)","doi":"10.1016/j.clsr.2024.105997","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105997","url":null,"abstract":"<div><p>This article illustrates the developing Chinese cross-border data flow regulation regime deriving from a holistic national security conception to its balance with personal information protection and digital economic development. Under the pressuring demand of digital economy development and an increasing appeal to global data governance, China is progressively improving and modifying its original government-led and restrictive cross-border data regulations. Subsequent practices and the publication of the Provisions on Promoting and Regulating Cross-border Data Transfer (PPR) in March 2024 deliver a clear sign of relaxation on restrictions on cross-border data flow, especially on the subject of personal information outbound transfer. Detailed comparison with data provisions in the Regional Comprehensive Economic Partnership (RCEP), the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and the Digital Economy Partnership Agreement (DEPA) demonstrates that global governance of cross-border data flows is unshaped but not unrealistic, even with current fragmented national approaches. China has established a complete personal information protection legal regime and is very close to integrating into transnational cooperation for a broader framework. In addition, by coordinating national provisions regarding cross-data transfer with international rules and piloting lenient cross-border data supervision mechanisms in numerous Pilot Free Trade Zone (PFTZ), China is ready to evolve its cross-border data flow regulations and contribute to global data governance step-by-step.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 105997"},"PeriodicalIF":2.9,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1