北京航空航天大学学报社科版 ›› 2021, Vol. 34 ›› Issue (3): 18-26.DOI: 10.13766/j.bhsk.1008-2204.2021.0131

• 新法学论坛 • 上一篇    下一篇

数据全球化与数据主权的对抗态势和中国应对——基于数据安全视角的分析

何傲翾   

  1. 北京航空航天大学 法学院, 北京 100083
  • 收稿日期:2021-04-16 发布日期:2021-06-08
  • 作者简介:何傲翾(1997-),男,江西上饶人,博士研究生,研究方向为民商法、网络与信息法.

Confrontation and China's Solution of Data Globalization and Data Sovereignty: Based on Data Security

HE Aoxuan   

  1. Law School, Beihang University, Beijing 100083, China
  • Received:2021-04-16 Published:2021-06-08

摘要: 数据主权是网络主权延伸到数据层面的必然结果,其背后折射的是国家主权利益,但在行使方式上可能存在不同的利益诉求,并将深刻影响数据跨境流动的效率和成本。自"棱镜门"等多起网络安全事件爆发后,出于维护国家安全、加强公众个人信息保护和促进数字经济发展的现实需要,世界各国(地区)政府纷纷采取措施规制数据跨境流动,催生了美国"云法案"等一批将传统管辖权伸及网络空间的制度设计,深刻地挑战了网络空间秩序,印度等新兴市场国家则通过数据本地化措施予以应对。数据安全属于非传统安全,中国应坚持数据安全流动的基本立场,完善数据跨境流动统一立法,在国际治理中主动开展国际合作,以更具建设性的姿态融入数据全球化进程之中。

关键词: 数据主权, 数据跨境流动, 数据安全, 数据本地化, 数据治理

Abstract: The forming of data sovereignty is the inevitable result of cyber sovereignty extending to the data layer. It reflects the interests of national sovereignty, but with different ways of expression which may profoundly affect the efficiency and cost of data cross-border flows. Since the outbreak of many cybersecurity incidents such as the "Prism Gate", to maintain the national security, strengthen the protection of personal information, and promote the development of the digital economy, governments around the world have taken measures to regulate the cross-border flows of data, which has enacted the US "CLOUD Act" and other institutional designs to extend traditional jurisdiction to cyberspace. These changes have profoundly challenged the order of cyberspace, and emerging market countries, such as India, who have responded via data localization measures. Since data security belongs to the category of non-traditional security. China should insist on the security of data flow, improve unified legislation on data cross-border flow, actively initiate international cooperation in term of international governance of data flow, manage to integrate into the process of data globalization in a more constructive manner.

Key words: data sovereignty, data cross-board flow, data security, data localization, data governance

中图分类号: