Show Less
You do not have access to this content

Information Sovereignty

Data Privacy, Sovereign Powers and the Rule of Law

Radim Polcak and Dan J.B. Svantesson

This thought-provoking work elaborates on the assumption that information privacy is, in its essence, comparable to information sovereignty. This seemingly rudimentary observation serves as the basis for an analysis of various information instruments in domestic and international law. It also provides for the method to resolve situations where informational domains of individuals and/or states collide. Information Sovereignty combines a philosophical and methodological analysis of the phenomena of information, sovereignty and privacy. It also encompasses more practical discussions of cybersecurity and cross-border processing of personal data, including in the context of cross-border discovery of digital evidence.
Show Summary Details
This content is available to you

Contents

Data Privacy, Sovereign Powers and the Rule of Law

Radim Polcak and Dan J.B. Svantesson

Foreword

Acknowledgements

List of abbreviations

Table of authorities

1    Introduction

1.1    Introduction

1.2    A developing area of great importance

1.3    User guide (how to read this book)

2    Potemkin’s laws

2.1    Catherine’s ‘ought’

2.2    Wiener’s ‘is’

2.3    Good rules

2.4    Good facts

2.5    Commanding sunsets

2.6    The spatial paradigm

2.7    Commanding data

2.8    Conclusion – a negative ontology of information law

3    International information sovereignty

3.1    Introduction

3.2    To regulate or not to regulate, that was the question

3.3    The international legal system: public, and private, international law

3.4    Jurisdiction

3.5    Drawing upon analogies and metaphors from the offline world

3.6    Territoriality and extraterritoriality

3.7    Sovereignty

3.8    Sovereignty, sovereign states and their ‘gods’

3.9    The duty of non-intervention

3.10    Comity

3.11    Due diligence and no harm

3.12    Consent – not the central concept it is assumed to be

3.13    Where does this leave us?

4    Private information sovereignty

4.1    The century of privacy

4.2    Being left to one’s self

4.3    Right to peace

4.4    The limits to privacy89

4.5    Information privacy and information sovereignty

4.6    First implication – independent existence of privacy

4.7    Second implication – limitation or justified infringement

4.8    Third implication – carving one out of another

4.9    Fourth implication – consent

4.10    No implication – personal data

5    The legal culture of the horse

5.1    Lex informatica vel lex nulla

5.2    A new legal tradition

5.3    End of the law as we know it

5.4    Efficiency spoiled by lawyers

5.5    No hierarchy needed

5.6    Floyd’s way forward

5.7    Methodological dilemma

6    A possible method for solving sovereignty clashes

6.1    Introduction

6.2    Legitimate interest and substantial connection – their common origin and similarity

6.3    Substantial connection

6.4    Legitimate interest

6.5    Interest balancing

6.6    The proposed framework applied to data privacy

6.7    Concluding remarks

7    Cybersecurity for hedgehogs

7.1    Virtualized security

7.2    Privatized security

7.3    Delocalized security

7.4    Home or abroad

7.5    No direct link between territory and data

7.6    Object or procedure

7.7    Diligent sovereigns

7.8    Choosing the information sovereign

7.9    Due diligence

7.10    Foxes and hedgehogs

8    Law enforcement for hedgehogs

8.1    Introduction

8.2    The characteristics of the current landscape

8.3    Jurisdiction, but what type and over what?

8.4    An unhelpful obsession with single-factor tests

8.5    The stranglehold of territoriality

8.6    Applying the framework to law enforcement access to data

8.7    Achieving change – a task for us all

9    Cross-border data transfers for hedgehogs

9.1    Introduction

9.2    How data privacy law deals with cross-border data flows

9.3    European data colonization through global delisting orders

9.4    Concluding remarks

10    Conclusions

Bibliography

Index