|
- 2017
数据跨境流动规制及其应对 ――对《网络安全法》第三十七条的讨论
|
Abstract:
《网络安全法》中关于数据跨境流动的内容引起了广泛的关注和讨论。实际上,许多国家和地区都对数据跨境流动采取了不同程度和形式的规制。基于此,分析了数据跨境流动的缘由,整理、对比和总结了不同国家、地区的相关规制和企业的实践经验。提出企业可以采取本地化、业务调整等策略来应对数据跨境流动规制,建议政府可以通过授权、分类管理等促进数据跨境流动规制目标的实现并降低其对经济的负面影响。
Regulations of cross-border flows in Cybersecurity Law obtained comprehensive attention and discussion, as a matter of fact, many countries and regions have already adopted regulations of cross-border data flows in different degrees and forms. By analyzing the reasons of these regulations, organizing, comparing and summarizing the regulations adopted by different countries or regions and the reactions by companies. We proposed that localization, business adjustment etc. could be strategies for enterprises to deal with regulations while suggested that the government could achieve the realization of regulations of coping with cross-border data flows and thus decrease the negative effects to economy through authorization, classification management etc
[1] | [1]UNCTC.Transnational Corporations and Transborder Data Flows[R].New York:United National Center on Transnational Corporations,1982:8. |
[2] | [2]OECD.Declaration on Transborder Data Flows (Adopted by the Governments of OECD Member countries on 11th April 1985)[EB/OL].[2016-08-17]. <a href="http://www.oecd.org/sti/ieconomy/declarationontransborderdataflows.htm">http://www.oecd.org/sti/ieconomy/declarationontransborderdataflows.htm</a>. |
[3] | [3]Congress of the U.S..International Barriers to Data Flows:Staff Background Report[R]. Washington:Government Printing Office,1982. |
[4] | [14]弓永钦,王健.APEC与欧盟个人数据跨境流动规则的研究[J].亚太经济,2015(5):9-13. |
[5] | [15]WATERS R.Google shuts Russia engineering office[N/OL].[2016-08-19].http://www.ft.com/cms/s/0/39d0ef66-81ab-11e4-b956-00144feabdc0.html. |
[6] | [7]GREENWALD G,MACASKILL E.NSA Prism program taps in to user data of Apple. Google and others[N]. The Guardian,2013-06-07. |
[7] | [4]SANGER D E.Obama Order Sped up Wave of Cyberattacks against Iran[N].The New York Times, 2012-06-01(A1). |
[8] | [5]SIBONI G,SIMAN-TOV D.Cyberspace Extortion:North Korea versus the United States[N].INSS Insight,2014-12-13. |
[9] | [6]陈左宁,王广益,胡苏太,等.大数据安全与自主可控[J].科学通报,2015(5):427-432. |
[10] | [8]BAKER L B,FINKLE J.Sony PlayStation suffers massive data breach[N/OL].[2011-04-26][2016-08-17]. <a href="http://www.reuters.com/article/us-sony-stoldendata-idUSTRE73P6WB20110426">http://www.reuters.com/article/us-sony-stoldendata-idUSTRE73P6WB20110426</a>. |
[11] | [9]USITC.Digital Trade in the U.S.and Global Economies[R].Washington:United States International Trade Commission,2014. |
[12] | [10]UNCTAD.Information Economy Report 2009:Trends and Outlook in Turbulent Times[R]. Switzerland:United Nations Conference on Trade and Development,2009. |
[13] | [11]CHANDER A,LE U P.Breaking the Web:Data Localization vs. the Global Internet[R].School of Law University of California, Davis,2014. |
[14] | [12]CASTRO D, MCQUINN A.Cross Border Data Flows Enable Growth in All Industries[J].Information Technology and Innovation Foundation,2015(2):1-21. |
[15] | [13]王?h.试论网络数据本地化立法的正当性[J].西安交通大学学报(社会科学版),2016(1):54-61. |
[16] | [16]WINGFIELD N,KANG C.Microsoft Wins Appeal on Overseas Data Searches[N].The New York Times, 2016-07-14. |
[17] | [17]BAUERM, LEE M H, VERSCHELDE B, et al.The Costs of Data Localization:Friendly Fire on Economic Recovery[R].Brussels:European Center for International Political Economy,2014. |
[18] | [18]高山行.试论大数据的法律保护[C]//西安交通大学中国管理问题研究中心.中国社会管理发展报告2014.北京:科学出版社,2014:263-275. |
[19] | [19]PILAT D,FUKASAKU Y.OECD principles and guidelines for access to research data from public funding[J].Data Science Journal,2007(6):OD4-OD11. |