Data Localization Laws and Policy: The EU Data Protection International Transfers Restriction Through a Cloud Computing LensCountries are increasingly introducing data localization laws, threatening digital globalization and inhibiting cloud computing adoption despite its acknowledged benefits. This multi-disciplinary book analyzes the EU restriction (including the Privacy Shield and General Data Protection Regulation) through a cloud computing lens, covering historical objectives and practical problems, showing why the focus should move from physical data location to effective jurisdiction over those controlling access to intelligible data, and control of access to data through security. |
Contents
1 Background | 1 |
2 Legislative history and objectives | 24 |
3 The transfer concept | 69 |
4 Assumptions | 125 |
5 Mechanisms and derogations | 152 |
6 Compliance and enforcement | 226 |
Other editions - View all
Data Localization Laws and Policy: The EU Data Protection International ... W. Kuan Hon No preview available - 2017 |
Common terms and phrases
accessed 26 October adequate protection and/or APEC apply appropriate safeguards Available BCRs breaches cloud computing cloud providers cloud services CNIL Commission compliance comply considered contracts controller or processor Convention108 country or international country’s cross-border customers data flows data processing data protection laws data subjects data transfers data’s datacentres deletion derogations disclosure DPAs DPD Laws DPD’s Dropbox EEA controllers effective jurisdiction encryption enforcement ensure European European Parliament European Union Facebook GDPR Google Google Apps harborites hardware implement infrastructure intelligible access international organisation Internet Kuner level of protection Lindqvist mass surveillance Mechanisms Member Microsoft Millard non-EEA notified OECD OECD Guidelines onward transfers personal data location physical access Principles process personal data processing of personal recipient regarding Regulation relevant requirements Restriction’s risks Safe Harbour SCCs Schrems security measures servers Shield subprocessors subproviders territory third country third party transfer of personal transferred personal data unauthorized uploading