数据流与国家安全:一个评估GATS安全例外下数据流限制的概念框架

M. Ferracane
{"title":"数据流与国家安全:一个评估GATS安全例外下数据流限制的概念框架","authors":"M. Ferracane","doi":"10.2139/ssrn.3490193","DOIUrl":null,"url":null,"abstract":"This paper explores the national security implications of a potential for a WTO dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under GATS security exception. The paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments. If a case where to be brought before the WTO dispute settlement, there are certain national security concerns which can be considered essential and imminent, and that therefore the defender might bring up to support its case for invoking the security exception. These are: protection from cyber espionage, protection from cyber attacks on critical infrastructure, and access data in order to prevent terrorist threats. The paper presents both a legal and technical analysis of these three cases in order to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era. The paper finds that in the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. As a matter of fact, several studies claim that local processing requirements can have rather a detrimental impact on security. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyber attacks and terrorist threats.","PeriodicalId":378416,"journal":{"name":"International Economic Law eJournal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Data Flows & National Security: A Conceptual Framework to Assess Restrictions on Data Flows Under GATS Security Exception\",\"authors\":\"M. Ferracane\",\"doi\":\"10.2139/ssrn.3490193\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explores the national security implications of a potential for a WTO dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under GATS security exception. The paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments. If a case where to be brought before the WTO dispute settlement, there are certain national security concerns which can be considered essential and imminent, and that therefore the defender might bring up to support its case for invoking the security exception. These are: protection from cyber espionage, protection from cyber attacks on critical infrastructure, and access data in order to prevent terrorist threats. The paper presents both a legal and technical analysis of these three cases in order to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era. The paper finds that in the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. As a matter of fact, several studies claim that local processing requirements can have rather a detrimental impact on security. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyber attacks and terrorist threats.\",\"PeriodicalId\":378416,\"journal\":{\"name\":\"International Economic Law eJournal\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Economic Law eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3490193\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Economic Law eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3490193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文探讨了数据流限制在WTO争端中潜在的国家安全影响。提出了一个评估GATS安全例外下数据流限制的基本概念框架。这篇论文是对文献的贡献,因为它是第一篇系统地讨论服务贸易总协定争端背景下的数据流和国家安全问题的论文,而且因为它提供了一个独特的视角,既关注法律问题,也关注技术问题。如果一个案件要提交WTO争端解决,则存在某些国家安全问题,这些问题可以被认为是必不可少和迫在眉睫的,因此辩护人可能会提出支持其援引安全例外的案件。这些是:防止网络间谍活动,防止对关键基础设施的网络攻击,以及访问数据以防止恐怖主义威胁。本文提出了这三个案例的法律和技术分析,以评估关贸总协定安全例外下数据流限制的相关性。更广泛地说,这种分析可以为数字时代保护国家安全的辩论提供信息。论文发现,在这三个案例中,对被认为对国家安全至关重要的数据的限制可能会提高某些攻击的成本。然而,风险仍然普遍存在,国家安全不会在法律上和技术上得到显著加强。事实上,一些研究声称,本地处理需求可能对安全性产生相当有害的影响。实施良好的安全标准和加密技术似乎是确保更好地应对网络威胁的更有效方法。总而言之,重要的是要逐案调查该措施的范围(涵盖的部门和数据)是否被认为是相称的,以及该措施在实践中是否减少了该国遭受网络间谍活动、网络攻击和恐怖主义威胁的风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Data Flows & National Security: A Conceptual Framework to Assess Restrictions on Data Flows Under GATS Security Exception
This paper explores the national security implications of a potential for a WTO dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under GATS security exception. The paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments. If a case where to be brought before the WTO dispute settlement, there are certain national security concerns which can be considered essential and imminent, and that therefore the defender might bring up to support its case for invoking the security exception. These are: protection from cyber espionage, protection from cyber attacks on critical infrastructure, and access data in order to prevent terrorist threats. The paper presents both a legal and technical analysis of these three cases in order to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era. The paper finds that in the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. As a matter of fact, several studies claim that local processing requirements can have rather a detrimental impact on security. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyber attacks and terrorist threats.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信