检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:刘业 Liu Ye
机构地区:[1]厦门大学法学院 [2]荷兰乌特勒支大学 [3]厦门大学法学院网络空间国际法研究中心
出 处:《国际法研究》2023年第6期64-85,共22页Chinese Review of International Law
基 金:国家社科基金项目“网络强国战略下数据资源的国际法规制研究”(项目批准号:18CFX087)的阶段性研究成果;国家留学基金资助。
摘 要:与安全港框架不同,隐私盾框架的废止在涉欧数据跨境流动合规方面引起了较大的震动,这折射出欧盟在技术主权战略指导下趋向于严格规制数据跨境流动。欧盟法院在法律适用上存在采用双重标准的嫌疑,以及欧盟数据保护委员会偏离《一般数据保护条例》“基于风险”路径等吊诡现象,是欧盟以技术主权战略对抗美国侵略性技术控制战略并作用于法律层面的结果。凭借个人数据保护领域中的布鲁塞尔效应,欧盟牢牢掌控该领域的规则话语权,在隐私盾框架废止后的美欧后续谈判中处于主动地位,并迫使美国不断修改立法以符合欧盟的法规。欧盟意图在谈判中实现软数据本地化和限制境内外国科技企业市场竞争力的目的,为技术主权战略的实施提供数据与技术保障。中国应当关注欧盟数据跨境流动规制中的技术主权战略意图,避免陷入被动合规陷阱,并构建独立自主的数据跨境流动战略。Distinguishing from the Safety-Harbor Framework,the abolishment of the Privacy-Shield Framework shocked the compliance of cross-border data flows concerning EEU,which reflects transformation of EU to regulating on cross-border data flows more stringently because of the newly technological sovereignty strategy.The suspicion to double standards in the law application of the Court of Justice of European Union,as well as the odd measures taken by European Data Protection Board that deviate from the intent of the"risk-based"approach of General Data Protection Regulation,are the results of which EU's technological sovereignty strategy responded to US's aggressive technological control strategy in the legal field.By virtue of the Brussels Effect in the field of data protection,EU has controlled the rules-making power and possessed in a privileged status when negotiating with US after the abolishment of the Privacy Shield Framework,forcing US to constantly revise its legislation for passive compliance.EU has been managing to realize the target of soft data localization,limit the competitiveness of foreign tech enterprises in EU's single market,and finally support the implementation of the technological sovereignty strategy in data and technology.China should keep a watchful eye on EU's regulation of cross-border data flows under the guidance of the technological sovereignty strategy,avoid falling into the trap of passive compliance,and plan an independent strategy on cross-border data flows.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117