Data Protection Laws Trends: Practice and Debate

α
Hedaia-T-Allah Nabil Abd Al Ghaffar
Hedaia-T-Allah Nabil Abd Al Ghaffar

Send Message

To: Author

Data Protection Laws Trends: Practice and Debate

Article Fingerprint

ReserarchID

4ALR4

Data Protection Laws Trends: Practice and Debate Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Technological advancement changed the way everything is being done, providing extraordinary benefits and low costs. People and governments are increasingly adopting new technologies to achieve better performance and financial savings. However, those benefits do not come at no cost; technological advancements (such as Cloud Computing, Artificial Intelligence, Robotics, Internet of Things,..etc) involve several security challenges that may expose countries’ national securities. The touchstone in this is data. Data has always been central to national security throughout different historical periods. Intelligence agencies’ core of work has always been data; however, the mechanisms of getting and securing data evolved throughout history. Nowadays, the applications of different technologies generate enormous amounts of data that are stored in data centers located in different countries. Data could be traveling across countries and between data centers in a routine process so as to balance loads between data centers of the company. This process contains several security risks because countries lose control and sovereignty over the data generated or collected inside their territories, which exposes the core of nation’s sovereignty and national security.

References

20 Cites in Article
  1. Abd Al Ghaffar,Hedaia-T-Allah Nabil (2020). Government Cloud Computing and National Security.
  2. Nate Lord (2018). What is the Data Protection Directive? The Predecessor to the GDPR.
  3. Eu Gdpr,Org Key Changes with the General Data Protection Regulation.
  4. Marta Otto (2016). Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation – GDPR).
  5. Jonah Hill,Force (2014). The Growth of Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business Leaders.
  6. Steven Chabinsky,F Pittman (2019). National Data Protection Laws after 1981.
  7. Fabien Terpan (2018). EU-US Data Transfer from Safe Harbour to Privacy Shield: Back to Square One?.
  8. Otava (2019). COMPARISON Safe Harbor Vs. The EU-US Privacy Shield.
  9. (2021). Mapping national policies on cross-border data flows.
  10. Jingting Liu,Ulrike Sengstschmid,Ge Yixuan (2017). Facilitating Data Flows Across ASEAN.
  11. Hogan Lovells (2018). Sherrington, Patrick Philip, (born 1 Nov. 1951), Regional Managing Partner, Asia Pacific and Middle East, since 2013, and Member, International Management Committee, since 2010, Hogan Lovells International LLP.
  12. Alexander Sauvelyev (2016). Russia's new personal data localization regulations: A step forward or a self-imposed sanction?.
  13. Antony Savvas (2019). Internet Iron Curtain Comes Down Across Mother Russia.
  14. Anupam Chander,Uyen Le (2014). Breaking the Web: Data Localization vs. The Global Internet.
  15. Emily Wu (2021). Sovereignty and data localization.
  16. Martina Ferracane (2018). South Africa and Data Flows: How to Fully Exploit the Potential of the Digital Economy.
  17. Big Bang Understanding Data Localization Laws.
  18. (2020). https://publ.icgbio.ru/wp-content/uploads/2024/09/BGRSSB_2024_Abstracts-137-140.pdf.
  19. Bernold Nieuwesteeg (2016). Quantifying Key Characteristics of 71 Data Protection Laws.
  20. Anirudh Burman,Upasana Sharma (2021). How would data localization benefit India?.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Hedaia-T-Allah Nabil Abd Al Ghaffar. 2021. \u201cData Protection Laws Trends: Practice and Debate\u201d. Global Journal of Human-Social Science - H: Interdisciplinary GJHSS-H Volume 21 (GJHSS Volume 21 Issue H9): .

Download Citation

Protecting Personal Data in Social Science Research.
Journal Specifications

Crossref Journal DOI 10.17406/GJHSS

Print ISSN 0975-587X

e-ISSN 2249-460X

Keywords
Classification
GJHSS-H Classification: FOR Code: 270707
Version of record

v1.2

Issue date

December 18, 2021

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 1826
Total Downloads: 935
2026 Trends
Related Research

Published Article

Technological advancement changed the way everything is being done, providing extraordinary benefits and low costs. People and governments are increasingly adopting new technologies to achieve better performance and financial savings. However, those benefits do not come at no cost; technological advancements (such as Cloud Computing, Artificial Intelligence, Robotics, Internet of Things,..etc) involve several security challenges that may expose countries’ national securities. The touchstone in this is data. Data has always been central to national security throughout different historical periods. Intelligence agencies’ core of work has always been data; however, the mechanisms of getting and securing data evolved throughout history. Nowadays, the applications of different technologies generate enormous amounts of data that are stored in data centers located in different countries. Data could be traveling across countries and between data centers in a routine process so as to balance loads between data centers of the company. This process contains several security risks because countries lose control and sovereignty over the data generated or collected inside their territories, which exposes the core of nation’s sovereignty and national security.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Data Protection Laws Trends: Practice and Debate

Hedaia-T-Allah Nabil Abd Al Ghaffar
Hedaia-T-Allah Nabil Abd Al Ghaffar

Research Journals