Horizontalizing Insecurity or Securitizing Privacy? Two Narratives of a Rule-of-Law Misalignment between a Special Administrative Region and Its State

被引:5
作者
Segate, Riccardo Vecellio [1 ,2 ]
机构
[1] Univ Macau, Fac Law, Dept Global Legal Studies, Int Law, E32 Ave Univ, Taipa, Macao, Peoples R China
[2] Univ Calif Berkeley, Sch Law, Berkeley Ctr Law & Technol, Berkeley, CA 94720 USA
关键词
DATA PROTECTION; HONG-KONG; PERSONAL DATA; CHINA; GOVERNMENT; GOVERNANCE; BREACHES; RIGHTS;
D O I
10.1093/cjcl/cxac002
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Data protection is generally surmised as antithetical to State surveillance and regulatory intrusiveness into the measures that businesses adopt to ensure the security of personal data. This originates in an ancient, West-rooted understanding of the 'rule of law' as the ultimate shield of 'the private' sphere against 'the public' sovereign power. Therefore, through Western lenses, data protection and State securitization of citizens' data cannot be but a dichotomy. This article challenges such a presumption, arguing that a no less legitimate view of what the 'rule of law' stands for gives rise to both a vertical and a horizontal attitude towards privacy regulation. By scrutinizing the Cathay Pacific data breach and its consequences for passengers' records in terms of corporate liability, this analysis posits that China and one of its special administrative regions, Hong Kong, display the facets of a horizontal and vertical policy approach to data protection respectively. Comparative observations demonstrate that against a context of increasingly pervasive cyberattacks, a fair degree of State oversight in corporate cyberspace regulation is not necessarily to be rejected. In fact, State 'interventionism' to prevent cyberattacks seems a legitimate outlook on data protection, which, while possibly impairing citizens' privacy vertically vis-a-vis the government, greatly enhances such a privacy horizontally by constraining exposure to data misappropriation by non-governmental (home and foreign) cybercriminals. These two 'Chinese' approaches can be synthesized and might, indeed, coalesce into an international rule of law, to be based on moderate State assertiveness to prevent data breaches in the cyberspace.
引用
收藏
页码:56 / 89
页数:34
相关论文
共 200 条
  • [1] A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
    Agrafiotis, Ioannis
    Nurse, Jason R. C.
    Goldsmith, Michael
    Creese, Sadie
    Upton, David
    [J]. JOURNAL OF CYBERSECURITY, 2018, 4 (01):
  • [2] Alcala Ronald TP, 2018, CHINA RULE LAW CAUTI
  • [3] Anagnostaki Dimitrios, 2021, Journal of Cyber Policy, V6, P247
  • [4] Anagnostakis Dimitrios, 2021, J CYBER POLICY, P243
  • [5] [Anonymous], 2019, YOU SHOULD PREPARE D
  • [6] [Anonymous], 2021, Global Times29 September
  • [7] [Anonymous], 2018, USITO COMMENTS CYBER
  • [8] [Anonymous], 2018, South China Morning Post
  • [9] [Anonymous], 2020, CHINAS DOMESTIC AVIA
  • [10] [Anonymous], 2014, DATA PRIVACY LAW INT