ebook img

Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective PDF

297 Pages·2022·4.327 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective

Progress in IS Melissa Lukings Arash Habibi Lashkari Understanding Cybersecurity Law in Data Sovereignty and Digital Governance An Overview from a Legal Perspective Progress in IS “PROGRESSinIS”encompassesthevariousareasofInformationSystemsintheory andpractice,presentingcutting-edgeadvancesinthefield.Itisaimedespeciallyat researchers, doctoral students, and advanced practitioners. The series features both researchmonographsthatmakesubstantialcontributionstoourstateofknowledge andhandbooksandothereditedvolumes,inwhichateamofexpertsisorganizedby oneormoreleadingauthoritiestowriteindividualchaptersonvariousaspectsofthe topic. “PROGRESS in IS” is edited by a global team of leading IS experts. The editorialboardexpresslywelcomesnewmemberstothisgroup.Individualvolumes inthisseriesaresupportedbyaminimumoftwomembersoftheeditorialboard,and a code of conduct mandatory for all members of the board ensures the quality and cutting-edgenatureofthetitlespublishedunderthisseries. (cid:129) Melissa Lukings Arash Habibi Lashkari Understanding Cybersecurity Law in Data Sovereignty and Digital Governance An Overview from a Legal Perspective MelissaLukings ArashHabibiLashkari YorkUniversity YorkUniversity Toronto,ON,Canada Toronto,ON,Canada ISSN2196-8705 ISSN2196-8713 (electronic) ProgressinIS ISBN978-3-031-14263-5 ISBN978-3-031-14264-2 (eBook) https://doi.org/10.1007/978-3-031-14264-2 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNatureSwitzerland AG2022 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseof illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similarordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors, and the editorsare safeto assume that the adviceand informationin this bookarebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Melissa Lukings For my family, friends, and all of those who have supported me throughout my journey. And for my cat children, my shadow goblins, my floofy beneficiaries, my little meow nuggets... with limitless love. Arash Habibi Lashkari For my wife Farnaz and children, Kourosh and Kianna, And my father Bahman, mother Zeynab and sister Ziba, And my teachers and lecturers, for all the lessons you’ve taught me. Preface This book is one piece of the Understanding Cybersecurity Series (UCS) research programme, which will produce a varied collection of cybersecurity resources for researchersandreadersofallbackgrounds.Ourfirstonlinearticleseriesinthispiece, entitled “Understanding Canadian Cybersecurity Laws”, is a 10-part series which waspublishedonlinebetweenJanuary2020andApril2021. (cid:129) UnderstandingCanadianCybersecurityLaws:TheFoundations (cid:129) Understanding Canadian Cybersecurity Laws: Privacy and Access to Informa- tion,theActs (cid:129) UnderstandingCanadianCybersecurityLaws:PrivacyProtectionintheModern Marketplace—PIPEDA (cid:129) Understanding Canadian Cybersecurity Laws: Interpersonal Privacy and Cybercrime—CriminalCodeofCanada (cid:129) Understanding Canadian Cybersecurity Laws: “Insert Something Clever Here”—Canada’sAnti-SpamLegislation (cid:129) UnderstandingCanadianCybersecurityLaws:Peer-to-PeerPrivacyProtection— "IntrusionUponSeclusion”andtheProtectionofIntimateImages (cid:129) Understanding Canadian Cybersecurity Laws: Deep, Dark and Undetectable— CanadianJurisdictionalConsiderationsinGlobalEncryptedNetworks (cid:129) Understanding Canadian Cybersecurity Laws: Measuring Up—Outlining Existing Federal Cybersecurity Legislation in Canada, the UK, Australia and theUnitedStates (cid:129) Understanding Canadian Cybersecurity Laws: Legislative Modernisation— RespondingandAdaptingtoTechnologicalChangeinaGlobalDomain (cid:129) Understanding Canadian Cybersecurity Laws: Refactored—Our Series in Summary Flowing from the success of this first article series, we were recognised with a Gold Medal for Best Blog Column in the Business Division at the 2020 Canadian Online Publishing Awards, which was remotely held in 2021 as a result of the ongoing COVID-19 pandemic. The research continued with the publication of our vii viii Preface firstbook,“UnderstandingCybersecurityLawandDigitalPrivacy:ACommonLaw Perspective”, which was published by Springer Nature Switzerland AG on 9 December 2021, with hard copies of the book being distributed beginning in January2022. Starting in 2022, we began our second online series, “Understanding Current CybersecurityChallengesinLaw”,whichcontainssixpartsandaddressesmanyof the emerging trends and larger legal issues pertaining to cybersecurity around the world, including determination of digital jurisdictional authority, user-generated digitalcontentownershipandothertopics. Thisbookrepresentstheresultsofourworktobringanuancedandcomprehen- sive understanding of current cybersecurity challenges and the law to the greater community and increase public awareness of these important issues in our rapidly changingdigitalworld. Toronto,ON,Canada MelissaLukings ArashHabibiLashkari Introduction Digital governance refers to the strategic management of a governing body or corporation, which is connected to their position and function online—including theimpactsoftheiractionsinthatposition.Digitalcorporatesocialresponsibility extends the social obligations related to the digital governance of a corporation or othergoverningbodytothatwhichisconnectedtotheirpositionwithinthedigital sphere. The legal issues which intersect with, and relate to, user-generated content canbewide-ranging,includingdeterminationofownershipandcopyright,personal privacyprotection,individualfreedomofexpression,issuesofcyberbullying,illegal contentdistributionandlarge-scalecorporatedatabreaches. Cloud computing and cloud-service providers have brought about a significant shift in the globalised delivery of information technology services and computing resources. When data is stored in a cloud environment, regardless of where the cloud-serviceresourcesarephysicallylocated,thedatamaybesubjecttothelawsof othercountries.Inlaw,datasovereigntyreferstothecontrolanation—orstate—has overaccesstoanddisclosureofitsdigitalinformation,andsubjectonlytoitslaws. Whereacloud-serviceprovider—asalarge-scalecorporateentity—isoperatingona globallevel,itcouldendupbeingrequiredtocomplywithacourtorder,warrantor subpoena request from a foreign law enforcement agency seeking to obtain data relatingtotheaffairsofanothernation. When a crime takes place or a dispute occurs between two parties who reside withinthesamegeographiclocation,thedeterminationofwhichlawappliestothat scenarioiseasilydistinguishedasbeingthelawofthatgeographiclocation.Whena dispute occurs between two parties who reside in different nations—or legal juris- dictions—the methodology for determining which country’s laws and legal forum should apply is rooted in the topics of private international law, international criminallawandconflictsoflaw.Whilethesetopicsarebynomeansstraightforward orsimple,thestrategyforaddressinglegaldisputesorcriminaloffenceswhichoccur betweenoracrosslegaljurisdictionsbecomesgreatlycomplexifiedwhenthealleged crime, dispute or other offence takes place online or is otherwise enabled via the Internet. ix x Introduction While jurisdiction is often linked to sovereignty over a territorial location, jurisdictioncanalsoexistwithoutaconnectiontoterritory.Thetypeofjurisdictional authority held by a governing body indicates whether that nation or state can undertake enforcement action to uphold its law. This becomes more complex when we consider online activities, particularly cybercrimes, defamation and other tortious activities, as there may not necessarily be a defined geographic area to distinguish which governing authority has the legal jurisdiction to address these matters.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.