Skip to Main Content
Book cover for Data Sovereignty: From the Digital Silk Road to the Return of the State Data Sovereignty: From the Digital Silk Road to the Return of the State

Contents

Sovereignty is, paradoxically, one of the most important yet misunderstood terms in international law. This is especially true in the international trade law area, where sovereignty and international obligations are often pitted against each other when countries try to enforce binding legal obligations through compulsory dispute settlement systems. This led to the Great 1994 Sovereignty Debate in 1994,1 when the World Trade Organization (WTO) was coming into being. Some 20 years later, it became a hot issue again when the U.S. administration led by President Trump tried to cite sovereignty as the justification for many of its WTO-inconsistent measures, especially those ostensibly grounded on “national security.” Due to space constraints, this chapter does not unpack the many challenges posed to international trade law by sovereignty. Instead, it focuses on an emerging area: data regulation in trade agreements, which best illustrates the conflict between international trade regulation and sovereignty in the digital era.

The chapter starts with an in-depth analysis of the elusive concept of data sovereignty, by trying to blend the classical definitions of canonical authors with the unique features of the data economy. It then conducts an empirical examination on the current approaches to data sovereignty in trade agreements by the three leading players, that is, the United States, China, and the EU. While noting the divergent approaches taken by the three, the chapter also concludes with observations on possible future convergence of the three approaches.

Sovereignty is one of the most fundamental concepts in modern international law. At the same time, however, it is also one of the most “controversial”2 concepts with a “long and troubled history.”3 Despite their disagreements on the exact meaning of the term, most international lawyers seem to agree that sovereignty has a “well established” status as either a “highly ambiguous”4 or “notoriously amorphous” concept.5 Indeed, the concept is so contested that even many leading international lawyers deem it better to just give up the term, which, called the “S word”6 by Louis Henkin, is “a mistake, an illegitimate offspring”7 that is “largely unnecessary and better avoided.”8

Nonetheless, I am still of the view that we should try to fathom the meaning of sovereignty, as it is “one of those powerful words which has its own existence as an active force within social consciousness” that can not only “represent reality,” but also “play a leading part in creating and transforming reality.”9 This is most evident in the repeated reference to sovereignty by national governments in various settings even in the digital age. Thus, without pinning down its meaning, it would not be possible to understand some of the key contentions and approaches in data governance and trade regulation.

In this regard, I will start with classical authors. While the concept of sovereignty has long been used in Europe, Jean Boden is commonly accepted as the “father” of the modern usage of the concept “sovereignty”10 as he engaged in “the first systematic discussion of the nature” of the concept.11 In his book Les six Livres de la Republique, Bodin defines sovereignty as “the absolute & perpetual power in a Republic.”12 This definition focuses on the internal paradigm of the domestic pyramid of power by placing sovereignty as “the most supreme power in the hierarchical organizational structure of society, that is, the highest unified power—as opposed to a subordinate decentralized one—free from any temporal authority.”13

While this definition does provide a good explanation of sovereignty in the domestic context, it might run into difficulty at the international level, where all states are regarded as equal sovereigns in principle, yet in reality countries do differ in their relative powers depending on their military or economic might. The solution to this problem was provided by Emer de Vattel, who transposed the concept of sovereignty from the national level onto the international plane.14 In contrast to the internal paradigm of Rodin, Vattel shifted to the external dimension by defining sovereignty as the “exclusivity of power without,” that is, “a political body which is the sole representative of the people externally and which is not submitted to any foreign state or to any higher law externally.”15 By focusing on such “incorporated independent authority,” Vattel provided the foundation for the discourse on sovereignty under international law, which is based on the fundamental notion of states as independent actors.

It is easy to see where Bodin and Vattel differ, in that the former defines sovereignty vis-à-vis its subjects while the latter places sovereignty in the context of external powers, be they foreign states or international law. Despite their differences, both of these definitions focus on the “general norm”16 or the “routine” situations.17 In reality, however, the power of sovereignty is often manifested in decisions concerning “borderline cases” or the “exceptions.”18 This led Carl Schmitt to propose a new definition of sovereignty by stating, at the very beginning of his Four Chapters on the Concept of Sovereignty, that “[s]overeign is he who decides on the exception.”19 As illustrated in later discussions in this chapter, the focus on exceptions is also fitting to discussions on data sovereignty, which often needs to wrestle with issues such as exceptions to the general rules on data flow and location of data.

The discussions above reveal a common theme among the definitions by classical authors: power. This is explicit in Bodin (“highest power”) and Vattel (“underived power”), and implicit in Schmitt (“exceptional power”).20 Now fast forward to the digital age, where technology giants pose serious competition to the national governments in terms of the powers they possess. In this sense, digital firms could be said to have powers rivaling that of traditional sovereigns. This led Lawrence Lessig to extend the concept of sovereignty by equating it with “control.”21 He developed two models of sovereignty depending on who has the control. The first model of “citizen-sovereignties” deal with institutions such as universities, social clubs, and churches, which “give consumers control over the rules that will govern them.”22 On the other hand, in the model of “merchant-sovereignties” the rules are imposed by the merchants and not chosen by the consumers.23 These rules are imposed on a “take it or leave it” basis and the only choice consumers can make is whether to go to McDonald’s or Burger King. But unlike the switching of your lunch spots in the physical space, which is virtually costless, it can be rather costly to try to switch communities in the cyberspace, as “you must give up everything in a move from one cyber-community to another,” which explains the power of digital giants in cyberspace.24

Despite the lack of a precise and commonly agreed-upon definition, sovereignty is still regarded as one of the most indispensable concepts in international law. The same, however, cannot be said of the concept of data sovereignty. To start with, the concept has been dismissed by many as just an oxymoron, because data by its nature transcends borders but sovereignty traditionally has been understood to be confined to within borders. Further complications would arise when data is generated, processed, stored, and disseminated in different jurisdictions, as it has become commonplace in the cyberspace these days. Thus, it has been rather difficult to provide a satisfactory definition of data sovereignty, with earlier attempts focusing either on the ethical dimension of the ownership and control of the data by the individual25 or the technical dimension of “the coupling of stored data authenticity and geographical location in the cloud.”26 After reviewing 602 papers discussing sovereignty in the digital context, a comprehensive survey on the usage of the concept in academic literature classifies six different means to address data sovereignty.27 However, the survey concludes that “data sovereignty” is typically employed to refer “in some way to meaningful control, ownership, and other claims to data or data infrastructures.”28 Such emphasis on control and power is consistent with the classical concepts of sovereignty discussed earlier.

As illustrated by the foregoing discussion, defining data sovereignty has been an endeavor fraught with difficulties. However, as the focus of this chapter is on data sovereignty in the context of trade agreements, it is not really necessary to try to come up with a general definition of data sovereignty. To paraphrase the famous remark made by Bill Clinton when he tried to persuade the U.S. Congress to grant Permanent Normal Trade Status to the China ahead of China’s accession to the WTO in 2000, defining data sovereignty in general would be like “trying to nail jello to the wall.”29 Here, however, we merely need to decide what happens when jello hits the wall, that is, the applicable rules when the concept of data sovereignty somehow interacts with the rules under trade agreements.

By narrowing the scope of our inquiry, we can tentatively define data sovereignty in the context of trade agreements as follows: the highest independent power over data trade, which can define rules and exceptions, especially regarding first, border measures such as the cross-border transfer of data; and second, domestic regulations such as data localization requirements. This definition takes into account the key elements of the different variants mentioned earlier, that is, power, independence and exception. It also situates the concept in the unique context of data trade, with the cross-border fungibility of data as a key feature.

When it comes to data governance, there are three main groups of players: the individual, which provides the raw data, and uses the processed data; the firm, which processes the raw inputs from the consumer, and usually controls such data; and the state, which monitors and regulates the data use by the first two groups. Their different interests often result in conflicting priorities, with the individual advocating privacy protection, the firm promoting unhindered data flow, while the state focusing on the security implications.

The clashes between the three groups often result in various restrictive measures, with the most common type being restrictions on cross-border data flow in the name of the protection of individual privacy or national security.30 More recently, however, data localization requirements have also become popular, with the following as main variations:31

(1)

Local commercial presence or residency requirements: The origin for such requirements can be traced back to the General Agreement on Trade in Services (GATS), where service providers are often required to have a local commercial presence before they can provide a service. While such requirements could potentially affect all service sectors, e-commerce is especially vulnerable as it is often detached from traditional brick-and-mortar establishments.

(2)

Local infrastructure requirements: These include both hardware requirements for service providers to use computing facilities located in the host territory and software requirements to use computer processing and/or storage services located in such territory.

(3)

Local content requirements. Depending on the modus operandi of the local content requirements, this obligation can be further divided into two categories. One is granting preferences or advantages to goods or electronically transmitted contents produced in a territory, or to local computing facilities or computer processing or storage services supplied locally. The other is requiring foreign service suppliers to purchase or use local goods or electronically transmitted contents.

(4)

Local technology requirements. This can also be broken down into two types of obligations. The first is the requirement for foreign service suppliers to transfer technologies as a condition of providing a service. This is often tied to the requirement to have a local partner. The other is the requirement for foreign service suppliers to purchase or use local technologies.

While data flow restrictions and data localization requirements are both barriers to e-commerce, it is important to note the differences between the two. Data flow restrictions curb cross-border transfer of data. They normally target the outflow, but can also affect the inflow, such as banning access to certain foreign websites due to its contents. As such restrictions uniformly affect both domestic and foreign firms alike, they are more akin to a most-favored nation (MFN) treatment type of restriction. While such constraints make it more difficult for firms to move data around, they could reduce data breach risks for individuals and regulatory costs for states. On the other hand, data localization requirements tend to affect mostly foreign firms so they can be viewed more as a National Treatment issue. Such requirements obviously would increase costs for foreign firms, but they could also increase risks of personal data breach and even regulatory costs for states due to the duplication of data on both local and offshore servers.32 Given the different ways MFN and national treatment obligations under trade agreements are structured, a proper understanding of the differences between the two restrictions can help inform regulatory approaches and negotiations in trade agreements.

At the same time, notwithstanding their differences, it is also important to keep in mind that both types of restrictions could have major implications for international trade, especially given the growing importance of data to trade in general. Moreover, due to their binding natures, trade agreements have also become the forum of choice for regulating data issues at the international level.

While all countries would agree that there is a need to strike a balance between the clashing interests of different stakeholders, their approaches often differ in practice. Some jurisdictions prioritize the need to safeguard the privacy of users. A good example in this regard is the General Data Protection Regulation (“GDPR”) of the EU, which recognizes “[t]he protection of natural persons in relation to the processing of personal data” as “a fundamental right.”33 On the other hand, some jurisdictions put the commercial interests of firms first. In the United States, this is reflected in the 1996 Telecommunication Act, which notes that it is “the policy of the United States . . . to preserve . . . free market . . . unfettered by Federal or State regulation.”34 In contrast, national security concerns are often cited to justify restrictions on cross-border data flow, albeit in varying degrees in different countries. A recent example is China’s 2017 Cyber Security Law, which imposes several restrictions aiming to “safeguard cyber security, protect cyberspace sovereignty and national security.”35

These differences in the domestic regulatory frameworks of these countries are also reflected in their trade agreements, which in turn reveals their different approaches to data sovereignty. Using the twin provisions of free flow of data and prohibition of data localization requirements as proxies, we can group the major approaches to data sovereignty and trade agreements into the following three models, with each represented by a major trader.

Table 9.1
Three Data sovereignty Models
Free Flow of DataProhibition on Data LocalizationData Sovereignty
Regime

US

Yes

Yes

Firm Sovereignty

China

No

No

State Sovereignty

EU

Yes, but

Yes, but

Individual Sovereignty

Free Flow of DataProhibition on Data LocalizationData Sovereignty
Regime

US

Yes

Yes

Firm Sovereignty

China

No

No

State Sovereignty

EU

Yes, but

Yes, but

Individual Sovereignty

As the world’s largest economy and until recently, the largest trader, the United States is a highly competitive exporter in both agricultural and industrial goods and services. Thus, the United States has been very aggressive in promoting free trade and dismantling trade barriers in its trade agreements. This approach is also carried over into the digital age, with the U.S. trade agreements pioneering the inclusion of digital trade issues with an expansive set of obligations.

In particular, two provisions have become the sine qua non in the digital trade chapters in U.S. trade agreements, with the recently concluded United States-Mexico-Canada Agreement (“USMCA”) as the leading example:

First is the guarantee on free cross-border flow of data by stating that “no Party shall prohibit or restrict the cross-border transfer of information, including personal information, by electronic means”;36 and

Second is the prohibition of data localization requirements by stipulating that “no Party shall require a covered person to use or locate computing facilities in that Party’s territory as a condition for conducting business in that territory.”37

These two provisions provide strong protection of the interests of the firm, which deem the restrictions on cross border flow of data and various localization requirements as obstacles to their ability to conduct businesses across national boundaries. Applying the concept of sovereignty mentioned earlier, the U.S. approach essentially puts the sovereignty into the hands of business firms, so that they have the control of both border measures and domestic regulations.

As we can see from the experiences of China and the EU below, two of the most frequent reasons used by governments to regulate data are protection of privacy or national security. In both of these areas, however, the United States has taken different approaches in its trade agreements.

On privacy protection, the U.S. trade agreements only require parties to adopt their own legal framework for data protection, which could take many different legal approaches including “comprehensive privacy, personal information or personal data protection laws, sector-specific laws covering privacy, or laws that provide for the enforcement of voluntary undertakings by enterprises relating to privacy.”38 This is very different from the EU approach, which requires its trade partners to adopt GDPR-equivalent clauses. While the U.S. agreements also calls for Parties to “take into account principles and guidelines of relevant international bodies,”39 the examples only include “the APEC Privacy Framework and the OECD Recommendation of the Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data (2013),” which are regarded as providing only minimum levels of data protection or “1st generation” data privacy standards.40 Moreover, rather than enhancing privacy protection for consumers, the U.S. trade agreements seem to be more concerned with making sure that the commercial interests of the firms are not adversely affected by over-restrictive privacy regimes. Take, for example, the clause on personal information protection under the USMCA, which include a total of six paragraphs. Only one of these contains substantive obligations to adopt or maintain legal framework on personal information protection,41 while three are aimed at minimizing the regulatory burden for business firms. The first among the three calls the Parties to ensure that “any restrictions on cross-border flows of personal information are necessary and proportionate to the risks presented,”42 which are apparently modeled after the necessity test and proportionality principle under the WTO. The second requires the Parties to “endeavor to adopt non-discriminatory practices in protecting users of digital trade from personal information protection violations occurring within its jurisdiction,” which also draws from the non-discrimination principle of the WTO, especially the national treatment obligation. Lastly, while the agreement recognizes the divergent legal approaches the Parties might take on personal information protection, it also encourages the Parties to develop “mechanisms to promote compatibility between these different regimes.” Again, trade lawyers would recognize in these provisions vestiges of WTO rules on mutual recognition, harmonization, and equivalence under the various WTO agreements.

On security, the U.S. trade agreements focus on “threats to cybersecurity undermine confidence in digital trade,” that is, “malicious intrusions or dissemination of malicious code that affect electronic networks.”43 Put differently, the U.S. approach mainly addresses cybersecurity risks facing the private firm, which is quite different from the Chinese approach that focuses on perceived threats to national security. At the same time, the U.S. approach also tries to minimize disruptions to the operations of firms, by calling Parties to adopt “risk-based approaches that rely on consensus-based standards and risk management best practices to identify and protect against cybersecurity risks.”44 The risk-based approach is apparently carried over from the regulatory framework under the WTO, especially under the Agreements on Technical Barriers to Trade (TBT) and Sanitary and Phytosanitary Measures (SPS). By placing restrictions on the regulatory measures that might be adopted by governments, such an approach provides better protection for the firms’ interests. Similarly, the reference to “consensus-based standards” also reflects prevailing practices in the United States, which has been codified in the the Cybersecurity Enhancement Act of 2014.45 The Act calls for the National Institute for Standards and Technology under the Commerce Department to “facilitate and support the development of a voluntary, consensus-based, industry-led set of standards, guidelines, best practices, methodologies, procedures, and processes to cost-effectively reduce cyber risks to critical infrastructure.”46 Under the Act, the U.S. cybersecurity standards are developed as a public-private partnership between the government and the business sector, which serves to reduce the cybersecurity risks for the firms rather than advancing the national security goals of the government.

Many other provisions in the USMCA are also designed to facilitate the development of digital trade. This is done by either removing regulatory barriers, such as the provision on non-discriminatory treatment of digital products; or providing an enabling framework for digital trade such as the provisions on domestic electronic transaction legal framework; recognition of the legal validity of electronic signatures or electronic authentication methods; the acceptance of electronic documents as the legal equivalent of their paper versions; and open government data. The most interesting provision, though, is the provision on principles on access to and use of the Internet for digital trade.47 This clause is mainly designed to deal with the risks that market players that own or control key infrastructures could abuse their power by unreasonably denying their business users access to their infrastructures, making it impossible for these users to conduct e-commerce activities. To address this problem, the agreements provide consumers (including business users) with the freedom of access to and use of the Internet for e-commerce, subject only to network management and network safety restrictions. This provision apparently grew out of the net neutrality principle from the domestic telecom regulatory framework within the United States. In a way, it provides digital giants with reverse control over the telecom and Internet services providers in the countries they are operating, shielding the former from being held hostage by the network throttling practices often found in many countries.

As the main proponent of the pluri-lateral Trade in Services Agreement (TISA) negotiations, the United States also proposed similar provisions in the draft TISA agreement. Most of these can be found in the e-commerce chapter, where the United States called for provisions that guarantee service suppliers the freedom to transfer information across countries for the conduct of its business; freedom for network users to access and use services and applications of their choice online, and to connect their choice of devices; prohibition of data localization requirements as a condition of supplying a service or investing; and prohibition of discrimination against electronic authentication and electronic signatures. In addition, the horizontal provisions also include prohibitions on a host of localization requirements as mentioned earlier. While they apply to all service sectors, they would be of particular relevance to e-commerce due to the nature of the sector.

For China, the key to data regulation is data security, which has now been elevated to the level of national security and national sovereignty. Such a regulatory approach, which I dubbed “data regulation with Chinese characteristics” in another paper,48 is the result of an evolution spanning 25 years. This evolving approach closely traces the development of the Internet sector in China. When the Internet first started as a novelty that was confined to the ranks of tech-savvy geeks, the regulations focused on computer and Internet hardware, by requiring all Internet connections to go through official gateways sanctioned by the Chinese government. As the Internet gradually expanded to the masses with the proliferation of software and social media catered to popular uses, the government moved on to regulate the software and started to demand that software used for Internet access must be sanctioned by the government. As the cyberspace became an indispensable part of everyday life and began to permeate every sector from socializing, shopping to entertainment and education, the government shifted the focus to the regulation of content and now data, which is the essence of cyberspace that powers everything, especially with the rise of big data and artificial intelligence. Moreover, data regulation has now been elevated to the level of national security with the introduction of Cyber Security Law in 2016. The agency that is responsible for content regulation, the CAC (Cyberspace Administration of China), has also evolved into the super-agency that is almost synonymous with data regulation in China. The CAC has no responsibility in promoting the growth of the sector. Instead, its only responsibility is making sure that the cyberspace is secure and nothing unexpected would pop up. It is this single-minded pursuit of security that has led to such draconian policies as Internet blockage, filtering and other restrictions on the free flow of data, forced data localization requirements, and the transfer of source code. As the Internet is becoming more complicated and omnipotent, we can only expect Internet and data regulations in China to become more sophisticated and omnipresent.

At the international level, China has traditionally taken a cautious approach to data regulation in trade agreements. Until very recently, it has not even included e-commerce chapters in its RTAs (regional trade agreements). This only changed with its FTAs (free trade agreements) with Korea and Australia, which were both signed in 2015. Nonetheless, the provisions in these two FTAs remain rather modest, as they mainly address trade facilitation related issues, such as moratorium on customs duties on electronic transmission, recognition of electronic authentication and electronic signature, protection of personal information in e-commerce, paperless trading, domestic legal frameworks governing electronic transactions, and the need to provide consumers using electronic commerce level of protection equivalent to traditional forms of commerce.

A major breakthrough was made in the Regional Comprehensive Economic Partnership (RCEP) Agreement, which China signed along with other 14 countries in the region in November 2020. Under the Chapter on E-commerce, China like all other RCEP Members agreed to not “require a covered person to use or locate computing facilities in that Party’s territory as a condition for conducting business in that Party’s territory,”49 or “prevent cross-border transfer of information by electronic means where such activity is for the conduct of the business of a covered person.”50

Of course, merely agreeing to the twin provisions on data flow and data localization does not mean that China now embraces the U.S. model. Instead, both provisions are still overshadowed by national security concerns. First of all, both provisions allow Members to adopt “any measure that it considers necessary for the protection of its essential security interests.” Moreover, they also explicitly state that such security measures “shall not be disputed by other Parties,” which means that the securities measures will be largely self-judging. Finally, as the whole chapter on e-commerce is carved out from the normal dispute settlement procedure under the RCEP, any such security measure will not be subject to legal challenge.

Another exception to these two obligations is “any measure . . . that [the implementing Party] considers necessary to achieve a legitimate public policy objective.” Note here the necessity test is not the objective one as found under the general exceptions clause under GATT Art. XX, but what the Party taking such measure “considers necessary,” which is only found under the security exceptions clause under GATT Art. XXI. The subjective nature of the necessity test here is further confirmed by the footnotes to the two provisions, which explicitly “affirm that the necessity behind the implementation of such legitimate public policy shall be decided by the implementing Party.”

What then, could such “legitimate public policy objective” entail? Like most other countries in the world, this could include laws for the protection of privacy or personal information. Yet, the Chinese approach to privacy protection also comes with its own limitations. To start, privacy is a rather new concept in Chinese law, and there was no privacy protection law until 2009, when privacy was first recognized as a civil right under the Tort Liability Law. This was duly incorporated into China’s new Civil Code enacted in 2020, which has a separate chapter on privacy and personal information protection as part of the volume on personality rights.51 According to Art. 1035 of the new Civil Code, the processing of personal information shall be based on the consent of the data subject, “except if there are different requirements under laws or administrative regulations.” In China, there are many laws that do not require the consent of the data subject. For example, under Art. 25 of China’s Electronic Commerce Law, government agencies may require e-commerce operators to provide e-commerce transaction data, which includes the personal information of the consumers. Similarly, by requiring government agencies in charge of cyber security monitoring and management and their staff to keep confidential any personal or privacy information they obtain in the discharge of their duty, Art. 45 of the Cyber Security Law also indirectly confirms that such agencies do have access to personal information of netizens without their consent. This approach is also adopted by China’s new Personal Information Protection Law, which confirms that data processors might not need to obtain the consent of the data subject when necessary for discharging official duty and responsibility.52 Moreover, in cases specified by the relevant laws or administrative regulations, the data subject would not even be made aware that his/her data is being processed.53 The same exception also applies in cases where the notification or obtaining the consent of the data subject would impede the discharge of official duty by the relevant state organs.54 Even if the data subject later becomes aware of the occurrence of such data processing activities, he/she would be denied the right to review or copy such personal information, which is normally available to data subjects.55

To sum up, the Chinese framework for personal information protection provides extensive exemptions for the government to collect personal information, either directly or through personal information processors. This probably explains why China until this day has yet to participate in the APEC CBPR (Cross-Border Privacy Rules),56 as the CBPR Program Requirements includes some potentially awkward questions such as “how the collected personal information may be shared, used or disclosed as compelled by law,” which neither the companies nor the Chinese government might be ready to answer.

Despite the gaps in China’s personal information protection framework, at least an argument could be made that it is common to have personal information protections laws as exceptions to the twin provisions on data flow and data localization. However, the exceptions under the Chinese data regulation regime covers not only personal data but also “important data,” a highly important concept that is poorly defined.

The concept of “important data” was first introduced in the Cyber Security Law, which requires “operators of critical information infrastructure” to locally store not only personal information but also “important data” collected and generated in their operations within China.57 If they need to send such data abroad due to business necessity, they have to first undergo security assessment by the authorities.58 Thus, the local storage requirement and restriction on cross-border data flow applies to “important data” collected and generated by operators of “critical information infrastructure,” which is defined in Article 31 of the law as infrastructure in “important industries and fields such as public communications and information services, energy, transport, water conservancy, finance, public services and e-government affairs,” as well as such “that will result in serious damage to state security, the national economy and the people’s livelihood and public interest if it is destroyed, loses functions or encounters data leakage.” Such a broad definition could potentially capture everything and is not really helpful nor does it give much guidance, which is why the same Article also directs the State Council to develop the “specific scope of critical information infrastructure.”

In 2016, the CAC issued the National Network Security Inspection Operation Manual59 and the Guide on the Determination of Critical Information Infrastructure,60 which clarified the scope of critical information infrastructure by grouping them into three categories: (1) websites, which includes websites of government and party organizations, enterprises and public institutions, and news media; (2) platforms, which include Internet service platforms for instant messaging, online shopping, online payment, search engines, emails, online forum, maps, and audio video; and (3) production operations, which include office and business systems, industrial control systems, big data centers, cloud computing, and TV broadcasting systems.

The CAC also laid down three steps in determining the critical information infrastructure, which starts with the identification of the critical operation, then continues with the determination of the information system or industrial control system supporting such a critical operation, and concludes with the final determination based on the level of the critical operations’ reliance on such systems and possible damages resulting from security breaches in these systems. More specifically, they listed 11 sectors, which include energy, finance, transportation, hydraulic, medical, environmental protection, industrial manufacturing, utilities, telecom and Internet, radio and TV, and government agencies. The detailed criteria are both quantitative and qualitative. For example, on the one hand, critical information infrastructure includes websites with daily visitor counts of more than one million people and platforms with more than ten million registered users or more than one million daily active users, or daily transaction value of 10 million RMB. On the other hand, even those that do not meet the quantitative criterion could be deemed to be critical information infrastructure, if there are risks of security breaches that would lead to leakage of lots of sensitive information about firms or enterprises, or leakage of fundamental national data on geology, population, and resources; or seriously harming the image of the government or social order or national security. The potentially wide reach of the criteria was well illustrated by the case of the BGI Group, the largest genomics organization in the world, which was fined by the Ministry of Science and Technology in October 2018 for exporting certain human genome information abroad via the Internet without authorization.61 Given the nature of their business, the BGI case could fall under the category of “leakage of fundamental national data on . . . population,” as mentioned earlier.

In addition to the vague concept of “important data,” the newly enacted Data Security Law adds another concept of “national core data,” which is defined as “data related to national security, the lifeline of the national economy, people’s livelihood and major public interests” and will be subject to “a more stringent management system.”62 It is likely that the scope of the new category of “national core data” will be narrower than “important data,” but it is unclear how much narrower it will be. Moreover, as mentioned above, the restrictive rules on data flow and data localization only applies to “important data” collected and generated by operators of “critical information infrastructure” as per the Cyber Security Law. It is unclear, however, whether the stricter restrictions on “national core data” will be similarly limited to operators of “critical information infrastructure.” A plausible or even compelling argument could be made to argue that due to its utmost importance, the restrictions on “national core data” would apply to all data processors or even private individuals, even if they do not qualify as operators of “critical information infrastructure.”

Unlike the United States and China, which focus respectively on the firm and the state, the EU has, as its main concern, the privacy of the individual. This started with the Data Protection Directive in 1995, which prohibits the transfer of personal data to non-EU countries unless they have privacy protection standards deemed adequate.63 The Directive was replaced64 by the GPDR in 2018.

Despite its name, which suggests a broader reach, the GDPR applies only to personal data, which is defined as “any information relating to an identified or identifiable natural person (‘data subject’).”65 It regulates the behaviors of the data controller and processor, which are respectively defined as the one who “determines the purposes and means of the processing of personal data”66 and “processes personal data on behalf of the controller.”67 Under the GDPR, the processing of personal data is only allowed with the “explicit”68 consent of the data subject and a few other specifically enumerated reasons,69pursuant to a set of principles that specifies the scope and manner of such processing.70 Transfer of personal data to third countries is only allowed on the basis of an adequacy decision71 or appropriate safeguards.72

Since its introduction, the GDPR has become the gold standard of privacy protection in the world. Encouraged by its success, top EU officials started to advocate “technological sovereignty” for the EU.73 “Technological sovereignty” is a concept closely linked with “digital sovereignty,”74 which was elaborated in the European Commission’s “Communication on a European Strategy for Data” unveiled in February 2020.75 As many commentators pointed out, the EU’s new data strategy is designed to “counter the strong position of US and Chinese digital companies in the European market”76 and remedy “the key European disadvantage” of “the lack of significant European digital corporations with global influence.”77 The new data strategy aims to create “a single European data space” so that “by 2030, the EU’s share of the data economy—data stored, processed, and put to valuable use in Europe—at least corresponds to its economic weight, not by fiat but by choice.”78

For the EU, the quest for digital sovereignty started out as a defensive move to fend off the encroachment into EU cyberspace by big firms from the United States, as well as the big government from China. By combining the powers of its huge market and regulatory apparatus, the EU is trying to reclaim digital sovereignty from not only the other countries, but more importantly, the digital giants.

The EU’s data strategy can be seen as part of its broader plan of establishing its own “strategic autonomy.”79 The concept started as an idea of the French, when they published their 1994 white paper on defense.80 Gradually, however, it was accepted by all of the big three EU Member States: Germany, France, and Italy.81 The concept was adopted by the EU in 2016 when it unveiled its Global Strategy, which was supposed to “nurtures the ambition of strategic autonomy” for the EU.82 With Trump’s election as U.S. president and Brexit, the concept started to take off among the governments of EU Member States.83 While there was some ambiguity on the exact content of the concept, the bigger EU Member States typically perceive it as referring to decision-making autonomy.84 This is recently confirmed by the new trade strategy paper issued in February 2021, where the EU further refined it as a concept of “open strategic autonomy,” which emphasizes “the EU’s ability to make its own choices and shape the world around it through leadership and engagement, reflecting its strategic interests and values,”85 with a priority area being the EU’s digital agenda.86

On data flow, the EU takes a bifurcated approach. Non-personal data are supposed to flow freely pursuant to the EU’s Framework for the Free Flow of Non-personal Data,87 while the cross-border flow of personal data is subject to the stringent requirements under the GDPR, despite the explicit recognition under the GDPR that “[f]lows of personal data to and from countries outside the Union and international organisations are necessary for the expansion of international trade and international cooperation.”88 Due to its high compliance costs,89 the GDPR has proven to be “challenging especially for the small and medium sized enterprises (SMEs).”90 To stay away from potential legal challenges, many U.S. websites blocked access to EU customers before the GDPR went into effect91 and remained unavailable in the EU months after.92

In addition to its negative impact on cross-border data flow, the GDPR also creates the pressure toward data localization, especially after the decision of the Court of Justice of the European Union in Data Protection Commissioner v. Facebook Ireland, Maximillian Schrems (Schrems II).93 However, as Chander has eloquently argued, data localization not only will not “solve the policy objectives identified in Schrems II,” but also creates “its own policy problems.”94 The data localization requirements for non-personal data are banned by the EU’s Framework for the Free Flow of Non-personal Data, which mandates EU Member States to repeal their data localization laws by May 30, 2021. In contrast, however, the GDPR does not include such a prohibition. On the contrary, data localization requirements for personal data are quite common among EU countries,95 with most covering special categories of sensitive data like health-related personal data or financial services data.96 On the latter point, it is worth noting that the EU approach again diverges from the current U.S. approach. When the United States negotiated the Trans-Pacific Partnership, it carved out the entire financial services sector from the scope of its e-commerce chapter, including prohibition of data localization requirements.97 In the new USMCA, however, the United States explicitly brought the financial services sector under the ban by stating that data localization should not be required “so long as the Party’s financial regulatory authorities, for regulatory and supervisory purposes, have immediate, direct, complete, and ongoing access to information processed or stored on computing facilities that the covered person uses or locates outside the Party’s territory.”98 It would be interesting to see whether the EU shifts closer to the U.S. approach in the future.

In its RTAs, the EU has not been able to include substantive language on data issues until recently. This was due to the internal differences between the two director-generals (DGs) with overlapping jurisdictions on the issue, that is, DG-Trade, which favors free trade for the sector; and DG-Justice, which has concerns over personal information protection.99 Thus, notwithstanding its strong interest in privacy protection, the EU positions in its existing FTAs have been rather modest, which usually requires Parties to adopt their own laws for personal data protection to help maintain consumer trust and confidence in electronic commerce.100 In February 2018, the two DGs were finally able to reach a compromise position, which includes on the one hand horizontal clauses on free flow of all data and ban on localization requirements, while one the other hand, affirms the EU’s right to regulate in the sector by making clear that it shall not be subject to investor-state arbitration.101 Despite this development, the EU still seems to prefer handling data flow issues through bilateral “adequacy” recognitions, which so far has only been granted to a dozen countries.102 In many of its latest FTAs, data flow issues were left out in the main text, with a separate adequacy decision adopted. This is, for example, the case of its Economic Partnership Agreement (EPA) with Japan, where the adequacy decision103 was adopted separately from the EPA, which does not include commitments on free flow of data.104 While its recent FTA with Vietnam lacks not only provisions on data flow and localization but also any plan for an adequacy decision.

The diverging approaches among the three major players are not randomly chosen. Instead, they reflect deeper differences in their respective commercial interests and regulatory approaches within each jurisdiction.

First, the global e-commerce market is largely dominated by China and the United States. Among the ten biggest digital trade firms in the world, six are American and four are Chinese.105 Of course, this does not necessarily mean that they must share the same position. Upon closer examination, one can see that the U.S. firms on the list tend to be pure digital service firms. Firms like Facebook, Google, and Netflix do not sell physical products but only provide digitalized services such as online search, social network, or content services. In contrast, two of the top three Chinese firms—Alibaba and JD.com—sell mainly physical goods. This is why the United States focuses on the “digital” side while China focuses on the traditional “trade” side when it comes to digital trade, as I argued in another paper.106

One may argue that China also has giant pure digital firms like Baidu and Tencent, which are often referred to, respectively, as the Google and the Facebook of China. However, because they serve almost exclusively the domestic Chinese market and most of their facilities and operations are based in China, they do not share the demands for free cross-border data flow like their U.S. counterparts, which have data centers in strategic locations around the world.

As for the EU, with no major players in the game, their restrictive privacy rules could be viewed as a form of “digital protectionism”107 to fend off the invasions of American and Chinese firms into Europe.

The second influence is their different domestic regulatory approaches. In the United States, the development of the sector has long benefited from its “permissive legal framework,”108 which aims to minimize government regulation on the Internet and relies heavily on self-regulation in the sector. Such policy is even codified in the law, with the Telecommunication Act of 1996 explicitly stating that it is “the policy of the United States . . . to preserve the vibrant and competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State regulation.”109 Therefore, it is no surprise that the United States wishes to push for deregulation and the free flow of information at the international level, a long-standing policy that can be traced back to the Framework for Global Electronic Commerce announced by the Clinton administration in 1997.110 At the same time, the United States does not have a comprehensive privacy protection framework. Instead, it relies on a patchwork of sector-specific laws,111 which provides privacy protection for consumers of a variety of sectors such as credit reports and video rental. This is further complemented by case-by-case enforcement actions by the Federal Trade Commission, and self-regulation by firms themselves. This explains why, in its RTAs, the United States does not mandate uniform rules on personal information protection but allows members to adopt their own domestic laws.

On the other hand, in China, the Internet has always been subject to heavy government regulations, which not only dictate the hardware one must use to connect to international networks, but also the content that may be transmitted online.112 Many foreign websites are either filtered or blocked in China, which confirms China’s cautious position on free flow of data. Moreover, in 2016, China also adopted the Cyber Security Law, which requires the operators of critical information infrastructure to store locally personal information they collected or generated in China. This is at odds with the U.S. demand to prohibit data localization requirements. Privacy protection is also weak in China, as it was only incorporated into the Chinese legal system in 2009, along with extensive exemptions for the government.

The EU, in contrast, has a long tradition of human rights protection, partly in response to the atrocities of the Second World War.113 Coupled with the absence of major digital players wielding significant market power and the lack of a strong central government with overriding security concerns, this translates into a strong emphasis on privacy in the digital sphere. Moreover, the EU is also able to transcend the narrow mercantilist confines of the United States114 and recognize privacy as not only a consumer right but also a fundamental human right that is recognized in several fundamental EU instruments115 and the constitution of many Member States.116 Such a refreshing perspective is probably the biggest contribution made by the EU to digital trade issues.

Trade agreements are complicated. Data sovereignty issues are even more so. This chapter provides a modest attempt to offer some clarity to these issues with an in-depth discussion of the data sovereignty models of the three major players. The discussions herein should provide some help in understanding the approaches of most other countries in the world as well because, as illustrated by Ferracane and Marel in their recent comprehensive survey, countries around the world broadly fit in one of the three models discussed here.117

At the same time, we should not be disheartened by the wide divergences among the three approaches. Such differences might prove to be short-lived as countries are learning from each other’s experiences. For example, with its recent ban on TikTok and WeChat, the United States seems to be taking a leaf out of China’s playbook. At the same time, by accepting obligations on free flow of data and prohibitions on data localization requirements, China seems to be edging closer to the U.S. position. Just like the three kingdoms in Chinese history, which were ultimately united into one, hopefully, the three digital kingdoms studied in this chapter can also, through trade agreements,118 forge their divergent approaches to data sovereignty into one, at least in the cyberspace.

Notes
1

 

John H. Jackson, The Great 1994 Sovereignty Debate: United States Acceptance and Implementation of the Uruguay Round Results, 36 Colum. J. Transnat’l L. 157, 182 (1997)
.

2

 See  

Lassa Oppenheim, 1 International Law – A Treatise 103 (1905)
(“There exists perhaps no conception the meaning of which is more controversial than that of sovereignty.”).

3

 

James R. Crawford, The Creation of States in International Law 26 (1st ed. 1979)
.

4

 

Hent Kalmo & Quentin Skinner, Introduction: A Concept in Fragments, in Sovereignty in Fragments: The Past, Present and Future of a Contested Concept 4 (Hent Kalmo & Quentin Skinner eds., 2010)
.

5

 

Andrew Keane Woods, Litigating Data Sovereignty, 128 Yale L.J. 328, 360 (2018)
.

6

 

Louis Henkin, That “S” Word: Sovereignty, and Globalization, and Human Rights, Et Cetera, 68 Fordham L. Rev. 1 (1999)
.

7

 Id. at 2.

8

 

Louis Henkin, International Law: Politics and Values 9–10 (1995)
.

9

 

Stéphane Beaulac, The Power of Language in the Making of International Law: The Word Sovereignty in Bodin and Vattel and the Myth of Westphalia 1 (2004)
.

10

 See id. at 101 (citing

Jacques Maritain, The Concept of Sovereignty, in In Defense of Sovereignty 41, 43 (Wladyslaw J. Stankiewicz ed., 1969)
).

11

 

Charles E. Merriam, History of the Theory of Sovereignty since Rousseau 13 (1900)
;
Jean Bodin, Les Six Livres de la Republique [Six Books of the Commonwealth] 84 (1576)
.

12

 Bodin,  supra note 11, 122 (“La SOUVERAINETÉ est la puissance absolue & perpétuelle d’une République”).

13

 Beaulac, supra note 9, at 122 (citing

Dominique Carreau, Droit International 15 (7th ed. 2001)
).

14

 Beaulac, supra note 9, at 137 (citing

E. Jouannet, Emer de Vattel et L’émergence Doctrinale du Droit International Classique 404 [1998]
).

15

 Id. at 137.

16

 

Carl Schmitt, Political Theology: Four Chapters on the Concept of Sovereignty 6 (2008)
.

17

 Id. at 5.

18

 Id.

19

 Id.

20

 Id. at 11.

21

 

Lawrence Lessig, Code Version 2.0 283 (2006)
.

22

 Id. at 287.

23

 Id. at 286–87.

24

 Id. at 290.

25

Ai Thanh Ho, Towards a Privacy-enhanced Social Networking Site 50 (Apr. 2012) (Ph.D. dissertation, Université de Montréal), https://papyrus.bib.umontreal.ca/xmlui/bitstream/handle/1866/8581/Ho_Ai_2012_these.pdf;jsessionid=8C6B63BC38E30AC76436C22468476E60?sequence=4 (discussing the “data sovereignty principle”, i.e., “the data related to an individual belongs to him and that he should stay in control of how these data are used and for which purpose.”).

26

 See  

Zachary N.J. Peterson et al., A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud, in Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing 1, https://www.usenix.org/legacy/events/hotcloud11/tech/final_files/Peterson.pdf
(using data sovereignty to describe the notion of “establishing data location at a granularity sufficient for placing it within the borders of a particular nation-state.”).

27

 

Patrik Hummel et al., Data Sovereignty: A Review, 8 Big Data & Soc’y 1 (2021)
.

28

 Id. at 12.

29

Bill Clinton, President, U.S., Speech on China Trade Bill at the Paul H. Nitze School of Advanced International Studies of the Johns Hopkins University (Mar. 9, 2000), https://www.iatp.org/sites/default/files/Full_Text_of_Clintons_Speech_on_China_Trade_Bi.htm.

30

 

Mark Wu, Digital Trade-Related Provisions in Regional Trade Agreements: Existing Models and Lessons for the Multilateral Trade System 22–23 (2017), http://e15initiative.org/publications/digital-trade-related-provisions-in-regional-trade-agreements-existing-models-and-lessons-for-the-multilateral-trade-system
.

31

 

Henry Gao, Digital or Trade? The Contrasting Approaches of China and US to Digital Trade, 21 J. Int’l Econ. L. 297, 303–04 (2018)
.

32

 See  

Anupam Chander & Uyên P. Lê, Data Nationalism, 64 Emory L.J. 677, 719–21 (2015)
.

33

Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), Recital 1, 2016 O.J. (L119) 1 [hereinafter GDPR].

34

Telecommunication Act of 1996 § 509(b)(2), 47 U.S.C. § 230(b)(2).

35

Wangluo Anquan Fa (网络安全法) [Cyber Security Law] (promulgated by the Standing Comm. Nat’l People’s Cong., Nov. 7, 2016, effective June 1, 2017), art. 1 (China) [hereinafter PRC Cyber Security Law].

36

United States-Mexico-Canada Agreement, Can.-Mex.-U.S., art. 19.11, Nov. 30, 2018, 134 Stat. 11 (2020) [hereinafter USMCA].

37

 Id. art. 19.12.

38

 Id. at n.4.

39

 Id. art. 19.8.2.

40

 

Graham Greenleaf, The UN should Adopt Data Protection Convention 108 as a Global Rreaty: Submission on ‘The Right to Privacy in the Digital Age’ to the UN High Commission for Human Rights, to the Human Rights Council, and to the Special Rapporteur on the Right to Privacy 1 (2018), https://www.ohchr.org/Documents/Issues/DigitalAge/ReportPrivacyinDigitalAge/GrahamGreenleafAMProfessorLawUNSWAustralia.pdf
.

41

USMCA, supra note 36, art. 19.8.2.

42

 Id. art. 19.8.3.

43

 Id. art. 19.15.

44

 Id.

45

Cybersecurity Enhancement Act of 2014, Pub. L. No. 113-274, 128 Stat. 2971 (2014).

46

 Id. § 101.

47

USMCA, supra note 36, art. 19.10.

48

 

Henry S. Gao, Data Regulation with Chinese Characteristics, in Big Data and Global Trade Law 245 (Mira Burri
ed., 2021).

49

Regional Comprehensive Economic Partnership art. 12.14, Nov. 15, 2020, https://rcepsec.org/legal-text [hereinafter RCEP].

50

 Id. art. 12.15.

51

Minfa Dian (民法典) [Civil Code] (promulgated by the Nat’l People’s Cong., May 28, 2020, effective Jan. 1, 2021), v.4, ch.6 (China).

52

Geren Xinxi Baohu Fa (个人信息保护法) [Personal Information Protection Law of the People’s Republic of China] (promulgated by the Standing Comm. Nat’l People’s Cong., Aug. 20, 2021), art. 13.3 (China).

53

 Id. art. 18.

54

 Id. art. 35.

55

 Id. art. 45.

56

 What Is the Cross-Border Privacy Rules System?, APEC, https://www.apec.org/About-Us/About-APEC/Fact-Sheets/What-is-the-Cross-Border-Privacy-Rules-System (last visited July 24, 2021).

57

PRC Cyber Security Law, supra note 35, art. 37.

58

 Id.

59

Guojia Wangluo Anquan Jiancha Caozuo Zhinan (国家网络安全检查操作指南) [National Network Security Inspection Operation Manual] (promulgated by the Central Leading Group on Cyber Security and Informatisation General Office, Network Security Coordination Bureau, June 1, 2016) (China).

60

Guanjian Xinxi Jichu Sheshi Queding Zhinan (Shixing) (关键信息基础设施确定指南(试行)) [Guide on the Determination of Critical Information Infrastructure (Trial)] (promulgated by the Cyberspace Administration of China, July 2016) (China).

61

An Shujun (安数君), Shuju Chujing Ruhe “Anjian” (数据出境如何“安检”) [How to Conduct “Safety Check” for Exporting Data], Zhihu (知乎) (May 11, 2019), https://zhuanlan.zhihu.com/p/65413452.

62

Shuju Anquan Fa (数据安全法) [Data Security Law of the People’s Republic of China] (promulgated by the Standing Comm. Nat’l People’s Cong., Jun. 10, 2021), art. 21 (China).

63

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, O.J. 1995 (L281) 31.

64

 See  

Susan A. Aaronson & Patrick Leblond, Another Digital Divide: The Rise of Data Realms and its Implications for the WTO, 21 J. Int’l Econ. L. 245, 260 (2018)
.

65

GDPR, supra note 33, art. 4.1.

66

 Id. art. 4.7.

67

 Id. art. 4.8.

68

 Id. art. 49.1(a).

69

 Id. art. 6.1. See also  

Aaditya Mattoo & Joshua P. Meltzer, International Data Flows and Privacy: The Conflict and its Resolution, 21 J. Int’l Econ. L. 769, 774 (2018)
.

70

GDPR, supra note 33, art. 5.1. See also Mattoo & Meltzer, supra note 69, at 774.

71

GDPR, supra note 33, art. 45.

72

 Id. art. 46.

73

 

Frances Burwell & Kenneth Propp, The European Union and the Search for Digital Sovereignty: Building “Fortress Europe” or Preparing for a New World?, Atlantic Council (June 22, 2020), https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-european-union-and-the-search-for-digital-sovereignty
. For the statement by EU President Ursula von der Leyen, see  
Mark Scott, What’s Driving Europe’s New Aggressive Stance on Tech, Politico (Oct. 28, 2019)
, https://www.politico.com/news/2019/10/28/europe-technology-silicon-valley-059988. For the statement by incoming EU commissioner for the internal market Thierry Breton, see  Thierry Breton, Answer to the European Parliament – Questionnaire to the Commissioner-Designate Thierry Breton (2019), https://ec.europa.eu/commission/commissioners/sites/comm-cwt2019/files/commissioner_ep_hearings/answers-ep-questionnaire-breton.pdf.

74

For the distinction between the two, see Burwell & Propp, supra note 73, at 1.

75

 Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on a European Strategy for Data, at 9, COM (2020) 66 final (Feb. 19, 2020), https://ec.europa.eu/info/sites/info/files/communication-european-strategy-data-19feb2020_en.pdf [hereinafter A European Strategy for Data].

76

Burwell & Propp, supra note 73, at 2.

77

 

Jeremy Shapiro, Introduction: Europe’s Digital Sovereignty, in Europe’s Digital Sovereignty: From Rulemaker to Superpower in the Age of US-China Rivalry 6, 11 (2020), https://ecfr.eu/wp-content/uploads/europe_digital_sovereignty_rulemaker_superpower_age_us_china_rivalry.pdf
.

78

 A European Strategy for Data, supra note 75, at 4.

79

See Henry Gao, The EU-China Comprehensive Agreement on Investment: Strategic Opportunity Meets Strategic Autonomy 1–23, https://doi.org/10.1007/16517_2021_1 (last visited Feb 12, 2022).

80

Jean-Marie Guehenno, Livre Blanc Sur La défense Et La sécurité Nationale [White Paper on Defense and National Security] (1994), http://www.livreblancdefenseetsecurite.gouv.fr/pdf/le-livre-blanc-sur-la-defense-1994.pdf.

81

 

Ulrike Franke & Tara Varma, Independence Play: Europe’s Pursuit of Strategic Autonomy 6 (2019), https://ecfr.eu/wp-content/uploads/Independence-play-Europes-pursuit-of-strategic-autonomy.pdf
.

82

 

European Union, Shared Vision, Common Action: A Stronger Europe. A Global Strategy for the European Union’s Foreign and Security Policy (2016), https://eeas.europa.eu/archives/docs/top_stories/pdf/eugs_review_web.pdf
.

83

 Franke & Varma,  supra note 81, at 7.

84

 Id. at 10–11.

85

 Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on Trade Policy Review – An Open, Sustainable and Assertive Trade Policy, at 4, COM (2021) 66 final, https://trade.ec.europa.eu/doclib/html/159438.htm.

86

 Id. at 16.

87

Regulation (EU) 2018/1807 of the European Parliament and of the Council of 14 November 2018 on a Framework for the Free Flow of Non-Personal Data in the European Union, 2018 O.J. (L303) 59.

88

GDPR, supra note 33, recital 101.

89

 

Luke Irwin, How Much Does GDPR Compliance Cost in 2021?, IT Governance Blog En (June 10, 2021), https://www.itgovernance.eu/blog/en/how-much-does-gdpr-compliance-cost-in-2020
.

90

 Communication from the Commission to the European Parliament and the Council Data Protection as a Pillar of Citizens’ Empowerment and the EU’s Approach to the Digital Transition – Two Years of Application of the General Data Protection Regulation, at 9, COM (2020) 264 final (June 24, 2020), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0264&from=EN.

91

 

Sam Schechner & Natalia Drozdiak, U.S. Websites Go Dark in Europe as GDPR Data Rules Kick In, Wall St. J. (May 25, 2018), https://www.wsj.com/articles/u-s-websites-go-dark-in-europe-as-gdpr-data-rules-kick-in-1527242038
.

92

 

Jeff South, More Than 1,000 U.S. News Sites Are Still Unavailable in Europe, Two Months After GDPR Took Effect, NiemanLab (Aug. 7, 2018), https://www.niemanlab.org/2018/08/more-than-1000-u-s-news-sites-are-still-unavailable-in-europe-two-months-after-gdpr-took-effect
.

93

Case C-311/18, Data Prot. Comm’r v. Facebook Ir. Ltd. and Maximillian Schrems, ECLI:EU:C:2020:559 (July 16, 2020).

94

 

Anupam Chander, Is Data Localization a Solution for Schrems II?, 23 J. Int’l Econ. L. 771, 778–84 (2020)
.

95

Frances G. Burwell, and Kenneth Propp, The European Union and the Search for Digital Sovereignty: Building ‘Fortress Europe’ or Preparing for a New World? Research Reports (June, 2020), Washington, DC: Atlantic Council, at 9.

96

 

Nigel Cory, Cross-Border Data Flows: Where Are the Barriers, and What Do They Cost 20–31 (2017)
, http://www2.itif.org/2017-cross-border-data-flows.pdf?_ga=2.63382255.1306428313.1587045825-1501175350.15870 45825.

98

USMCA, supra note 36, art. 17.18.2.

99

Aaronson & Leblond, supra note 64, at 261.

100

 Id.

101

 Id. at 262.

102

So far, the EU has granted adequacy recognitions to Andorra, Argentina, Canada (commercial organizations), Faroe Islands, Guernsey, Israel, Isle of Man, Japan, Jersey, New Zealand, Switzerland, and Uruguay. See Adequacy Decisions, Eur. Comm’n, https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/adequacy-decisions_en (last visited July 24, 2021).

103

Press Release, Eur. Comm’n, European Commission Adopts Adequacy Decision on Japan, Creating the World’s Largest Area of Safe Data Flows (Jan. 23, 2019), https://ec.europa.eu/commission/presscorner/detail/en/IP_19_421.

104

According to art. 8.81 of the EPA, “[t]he Parties shall reassess within three years of the date of entry into force of this Agreement the need for inclusion of provisions on the free flow of data into this Agreement.”

105

 List of Largest Internet Companies, Wikipedia, https://en.wikipedia.org/wiki/List_of_largest_Internet_companies (last visited Feb. 20, 2020).

106

 

Henry Gao, Digital or Trade? The Contrasting Approaches of China and US to Digital Trade, 21 J. Int’l Econ. L. 297 (2018)
.

107

 

Susan A. Aaronson, What Are We Talking about When We Talk about Digital Protectionism?, 18 World Trade Rev. 541 (2019)
.

108

 

Anupam Chander, The Electronic Silk Road: How the Web Binds the World Together in Commerce 57 (2013)
.

109

Telecommunication Act of 1996, § 509(b)(2), 47 U.S.C. § 230(b)(2).

110

Aaronson & Leblond, supra note 64, at 254.

111

 Chander, supra note 108, at 57–58.

112

For an overview of Chinese data regulation, see Gao, supra note 48.

113

Mattoo & Meltzer, supra note 69, at 771 (citing

James Q. Whitman, The Two Western Cultures of Privacy: Dignity Versus Liberty, 113 Yale L.J. 1151 (2004)
).

114

 See  

Paul M. Schwartz & Karl-Nikolaus Peifer, Transatlantic Data Privacy Law, 106 Geo. L.J. 115, 132–37 (2017)
.

115

 See, e.g., Charter of Fundamental Rights of the European Union art. 8, Dec. 18, 2000, 2000 O.J. (C 364) 1; Convention for the Protection of Human Rights and Fundamental Freedoms art. 8, Nov. 4, 1950, 312 U.N.T.S. 222.

116

These includes Germany, Greece, Hungary, Poland, and Spain. See Mattoo & Meltzer, supra note 69, at 772.

117

Martina Francesca Ferracane & Erik van der Marel, Regulating Personal Data: Data Models and Digital Services Trade (World Bank, Policy Research Working Paper No. 9596, 2021), https://openknowledge.worldbank.org/bitstream/handle/10986/35308/Regulating-Personal-Data-Data-Models-and-Digital-Services-Trade.pdf.

118

 See, e.g., Douglas W. Arner, Giuliano Castellano, & Ēriks Selga, The Transnational Data Governance Problem (Aug. 27, 2021). Berkeley Technology Law Journal, Forthcoming, University of Hong Kong Faculty of Law Research Paper No. 2021/039, Available at SSRN: https://ssrn.com/abstract=3912487 or http://dx.doi.org/10.2139/ssrn.3912487.

Close
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Close