Book contents
- Public and Private Governance of Cybersecurity
- Public and Private Governance of Cybersecurity
- Copyright page
- Contents
- Contributors
- Acknowledgements
- Abbreviations
- 1 Introduction
- 2 International Relations Perspectives
- 3 The State-Oriented Model of Internet Regulation
- 4 Cybercrime, the United Nations, Prospects, and Challenges for International Co-operation
- 5 Responding to Public and Private Cyberattacks
- 6 International Data Transfers and Cybersecurity
- 7 International Trade Law and Cybersecurity
- 8 Cyberthreats, Human Rights, and FDI Restrictions
- 9 Public–Private Partnerships on Cybersecurity and International Law
- 10 The Geopolitical Divide, Norm Conflict, and Public–Private Partnership in Cybersecurity Governance
- Index
6 - International Data Transfers and Cybersecurity
Three Regulatory Approaches and Their Implications
Published online by Cambridge University Press: 09 November 2023
- Public and Private Governance of Cybersecurity
- Public and Private Governance of Cybersecurity
- Copyright page
- Contents
- Contributors
- Acknowledgements
- Abbreviations
- 1 Introduction
- 2 International Relations Perspectives
- 3 The State-Oriented Model of Internet Regulation
- 4 Cybercrime, the United Nations, Prospects, and Challenges for International Co-operation
- 5 Responding to Public and Private Cyberattacks
- 6 International Data Transfers and Cybersecurity
- 7 International Trade Law and Cybersecurity
- 8 Cyberthreats, Human Rights, and FDI Restrictions
- 9 Public–Private Partnerships on Cybersecurity and International Law
- 10 The Geopolitical Divide, Norm Conflict, and Public–Private Partnership in Cybersecurity Governance
- Index
Summary
The chapter explores the question of how different domestic and international law approaches to regulating the international transfer of personal data deal with cybersecurity threats. It examines the 2016 EU General Data Protection Regulation, the 2021 UK National Security and Investment Act, and the 2018 United States, Mexico and Canada Agreement, as representing distinct approaches for regulating international data transfers, namely data protection legislation, investment screening legislation, and digital trade agreements. The analysis demonstrates that a lack of uniformity in terms of what constitutes an adequate level and design of data protection mechanisms has left the issue of how to distinguish between acceptable and non-acceptable data-transfer restrictions largely unresolved.
Keywords
- Type
- Chapter
- Information
- Public and Private Governance of CybersecurityChallenges and Potential, pp. 134 - 160Publisher: Cambridge University PressPrint publication year: 2023