An Excellent Point Lost in Execution

IF 1.3
Kendra Schaefer
{"title":"An Excellent Point Lost in Execution","authors":"Kendra Schaefer","doi":"10.1353/asp.2023.a903871","DOIUrl":null,"url":null,"abstract":"I n Trafficking Data: How China Is Winning the Battle for Digital Sovereignty, Aynne Kokas does what so many books addressing China’s data governance regime fail to do: she urges U.S. policymakers to “look to thine own house first.” This book’s key argument is that the failure of U.S. policymakers to pass federal, cross-sector legislation protecting the data of U.S. citizens leaves the door open for any malicious actor—state-sponsored or otherwise—to abuse and exfiltrate it. Without a federal data privacy law or a centralized, cross-agency, and cross-sector framework for oversight of data security, U.S. government bodies seeking to protect the privacy of their citizens from competing countries are left combating threats on a whack-a-mole, case-by-case basis, which is both ineffective and ultimately unsustainable. Trafficking Data successfully draws attention to these important issues and highlights a multitude of gaps in the current U.S. policy approach that are worthy of consideration by policymakers. However, Trafficking Data is less successful in accurately describing the nuances of China’s data and network policy, the mechanisms through which the Chinese state and private actors collect and employ data, and the structure and functions of the Chinese government. The result is that the specific nature of the threat presented by data trafficking may be misrepresented. One such misrepresentation made repeatedly is that China’s 2017 Cybersecurity Law requires “Chinese or foreign firms operating in China [to] legally store their data in Chinese government-run servers” (p. 4, also pp. 51 and 209). For example, the book notes:","PeriodicalId":53442,"journal":{"name":"Asia Policy","volume":"30 1","pages":"165 - 169"},"PeriodicalIF":1.3000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asia Policy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1353/asp.2023.a903871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

I n Trafficking Data: How China Is Winning the Battle for Digital Sovereignty, Aynne Kokas does what so many books addressing China’s data governance regime fail to do: she urges U.S. policymakers to “look to thine own house first.” This book’s key argument is that the failure of U.S. policymakers to pass federal, cross-sector legislation protecting the data of U.S. citizens leaves the door open for any malicious actor—state-sponsored or otherwise—to abuse and exfiltrate it. Without a federal data privacy law or a centralized, cross-agency, and cross-sector framework for oversight of data security, U.S. government bodies seeking to protect the privacy of their citizens from competing countries are left combating threats on a whack-a-mole, case-by-case basis, which is both ineffective and ultimately unsustainable. Trafficking Data successfully draws attention to these important issues and highlights a multitude of gaps in the current U.S. policy approach that are worthy of consideration by policymakers. However, Trafficking Data is less successful in accurately describing the nuances of China’s data and network policy, the mechanisms through which the Chinese state and private actors collect and employ data, and the structure and functions of the Chinese government. The result is that the specific nature of the threat presented by data trafficking may be misrepresented. One such misrepresentation made repeatedly is that China’s 2017 Cybersecurity Law requires “Chinese or foreign firms operating in China [to] legally store their data in Chinese government-run servers” (p. 4, also pp. 51 and 209). For example, the book notes:
在执行过程中失去了一个很好的点
在《贩运数据:中国如何赢得数字主权之战》一书中,Aynne Kokas做了许多关于中国数据治理制度的书所没有做的事情:她敦促美国政策制定者“先看看自己的房子”,保护美国公民数据的跨部门立法为任何恶意行为者——无论是国家支持的还是其他方面——滥用和泄露数据敞开了大门。如果没有联邦数据隐私法,也没有集中、跨机构和跨部门的数据安全监督框架,寻求保护其公民隐私免受竞争国家侵犯的美国政府机构只能根据具体情况与威胁作斗争,这既无效又最终不可持续。贩运数据成功地引起了人们对这些重要问题的关注,并突出了当前美国政策方法中值得决策者考虑的许多差距。然而,《贩运数据》在准确描述中国数据和网络政策的细微差别、中国国家和私人行为者收集和使用数据的机制以及中国政府的结构和职能方面并不成功。结果是,数据贩运带来的威胁的具体性质可能被歪曲。其中一个反复出现的虚假陈述是,中国2017年的《网络安全法》要求“在中国经营的中国或外国公司[合法]将其数据存储在中国政府运营的服务器中”(第4页,也是第51和209页)。例如,该书指出:
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Asia Policy
Asia Policy Arts and Humanities-History
CiteScore
0.80
自引率
0.00%
发文量
55
期刊介绍: Asia Policy is a peer-reviewed scholarly journal presenting policy-relevant academic research on the Asia-Pacific that draws clear and concise conclusions useful to today’s policymakers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信