您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[哈佛大学肯尼迪学院]:2021主权和数据本地化(英文) - 发现报告
当前位置:首页/其他报告/报告详情/

2021主权和数据本地化(英文)

2021主权和数据本地化(英文)

REPORTJULY 2021THE CYBER PROJECTSovereignty and Data LocalizationEmily Wu 行业研究报告,服务于财经领域,整合发布高质量的财经相关领域精品资讯,提供各行业研究报告和干货。我们以微信公众号为基础,覆盖第三方平台为财经相关领域从业群体提供高质量的免费资讯信息服务。 我们的优势: 高质量的内容生产模式、多平台覆盖的整合营销服务、超百余万的高净值人群粉丝、专业、稳定的管理与团队。 旗下的矩阵号: 行业研究资本、行研资本、行研君、IPO智囊团、IPO最前沿、并购大讲堂、科创板的韭菜花、海外投资政策、海外置业政策、海外留学政策、海外留学、全球海外移民政策、番国志。 扫码关注公众号: 行研君 IPO最前沿 全球海外移民政策 报告索取请加:report08 商务合作请加:report998 The Cyber Project Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138www.belfercenter.org/CyberStatements and views expressed in this report are solely those of the author and do not imply endorsement by Harvard University, Harvard Kennedy School, or the Belfer Center for Science and International Affairs.Design and layout by Andrew FaciniCopyright 2021, President and Fellows of Harvard College Printed in the United States of America REPORTJULY 2021THE CYBER PROJECTSovereignty and Data LocalizationEmily Wu iiiBelfer Center for Science and International Afiairs | Harvard Kennedy SchoolTable of ContentsExecutive Summary ..........................................................................................1Introduction .....................................................................................................3Data sovereignty and its importance in the emerging technology landscape ..........................................................................................................5Spotlight: Cloud computing .................................................................................................6Spotlight: 5G telecommunications ......................................................................................7Spotlight: Artificial Intelligence ............................................................................................8Data localization is used to assert data sovereignty .....................................9Types of Data Localization Policies ................................................................11Local-only storing, transmission, and processing ...........................................................11Local copy required ................................................................................................................12Narrower, conditional restrictions ......................................................................................13Reasons for Data Localization Policies .........................................................14Technical concerns .................................................................................................................14Value concerns .........................................................................................................................17How should policy makers respond? ............................................................19Conclusion ......................................................................................................22Bibliography .......................................................................................................................23 ivSovereignty and Data LocalizationAdobe Stock 1Belfer Center for Science and International Afiairs | Harvard Kennedy SchoolExecutive SummaryData localization policies impose obligations on businesses to store and process data locally, rather than in servers located overseas. The adoption of data localization laws has been increasing, driven by the fear that a nation’s sovereignty will be threatened by their inability to exert full control over data stored outside their borders. This is particularly relevant to the US given its dominance in many areas of the digital ecosystem including artificial intelligence and cloud computing. Unfortunately, data localization policies are causing more harm than good. They are ineffective at improving security, do little to simplify the regulatory landscape, and are causing economic harms to the markets where they are imposed. In order to move away from these policies, the fear of sovereignty dilution must be addressed by alterna-tive means. This will be achieved most effectively by focusing on both technical concerns and value concerns. To address technical concerns, the US should:1. Enact a federal national privacy law to reduce the fears that foreign nations have about the power of US tech companies. 2. Mandate privacy and security frameworks by industry to demonstrate the importance that US industry places on privacy and security, recognizing it as fundamental to their business success. 3. Increase investment in cybersecurity to ensure that in a com-petitive market, the US has the best offering in both customer experience and security assurance 4. Expand multi-lateral agreements under CLOUD Act to help alleviate the concerns that data stored by US companies will be inaccessible to foreign governments in relevant to a criminal investigation 2Sovereignty and Data LocalizationTo address value

你可能感兴趣

hot

主权和数据本地化(英)

信息技术
哈佛肯尼迪学院2021-07-01
hot

哈佛大学肯尼迪学院报告:主权和数据本地化

文化传媒
哈佛肯尼迪学院2021-07-07
hot

新曙光:重新思考主权ESG(英文)

信息技术
世界银行2021-06-01
hot

2023年主权财富基金报告-英文

金融
IE大学ICEX2023-11-11