pisco_log
banner

International Law Protection of Cross-Border Transfers of Personal Information Based on Cloud Computing and Big Data

Hao Ren

Abstract


Cross-border data is crucial for the digital economys growth, but uncontrolled transfers risk national security, public interests,
corporate interests, and data sovereignty. Currently, cross-border data regulation lacks unified global rules, with existing ones dominated by
Europe and the U.S. China needs to improve its international legal protection for cross-border personal information transfer. This paper examines Chinas mechanisms for personal data privacy protection in digital trade, including frameworks for big data, cloud computing, and cloud
service selection for data lifecycle privacy protection. It suggests clarifying data controllers and exporters obligations, strengthening regulatory responsibilities, improving cross-border data legislation, enhancing law operability, and advocating for stronger international cooperation
and participation in global rule-making to protect personal privacy information rights.

Keywords


Cross-border data; Regulation; International law; Information protection

Full Text:

PDF

Included Database


References


[1] Q. Ma, Li Xiaonan on the construction of supervision rules for cross-border data flow in China, Research on the rule of law, vol. 1,

pp. 91101, 2021.

[2] D. Guo, Open the Rudder Research on Legal Regulation of Cross-Border Data Flow, University of international business and economics, Beijing, China, 2018.

[3] M. Xiaying, Legal attribute of data and its civil law positioning, Chinese Social Sciences, vol. 40, no. 9, pp. 164183+209, 2016.

[4] M. Ferracane, Restrictions on Cross-Border data flows: a taxonomy, ECIPE Working Paper No. 1/2017, 2017.

[5] S. A. Aaronson, Data is different, and thats why the world needs a new approach to governing cross-border data flows, Digital Policy,

Regulation and Governance, vol. 3, 2019.

[6] R. Pepper, J. Garrity, and C. LaSalle, Cross-border data flows, digital innovation, and economic growth, Global Inf. Technol. Rep,

vol. 2016, pp. 3947, 2016.

[7] D. W. Trabay, I. El-Henawy, and W. Gharibi, A trust framework utilization in cloud computing environment based on multi-criteria

decision-making methods, :e Computer Journal, vol. 65, no. 4, pp. 9971005, 2021.




DOI: http://dx.doi.org/10.18686/frim.v2i3.4235

Refbacks

  • There are currently no refbacks.