SlideShare a Scribd company logo
D A TA L O C A L I S A T I O N
A N D
D A TA S E C U R I T Y
M A R T I N A F R A N C E S C A F E R R A C A N E
P O L I C Y A N A LY S T A T E C I P E
Q E D E V E N T O N “ C Y B E R S E C U R I T Y A N D C L O U D C O M P U T I N G ”
2 6 A P R I L 2 0 1 6
A TA X O N O M Y O F D A TA L O C A L I S A T I O N
Definition: a Government imposed restriction that results in the
localisation of data within a certain jurisdiction.
Categorization:
1. Strict data localisation:
• Local storage
• Local storage and processing
• Local storage, processing and access (i.e. ban to transfer)
2. Conditional flow regime.
P R O T E C T I O N I S M 2 . 0
Source: ECIPE Digital Trade Estimates database - To be released in September 2016.
Note: The graph does not include conditional flow requirements and measures whose date of entry into force is unknown.
0"
10"
20"
30"
40"
50"
60"
70"
80"
1961" 1966" 1971" 1976" 1981" 1986" 1991" 1996" 2001" 2006" 2011" 2016"
The$evolu)on$of$data$localisa)on$measures$
DOES DATA LOCALISATION INCREASE SECURITY?
Myth: Data security is a function of where the data is
physically located.
DOES DATA LOCALISATION INCREASE SECURITY?
Data can be
accessed from any
location,
independently from
where the IP address
is located.
DOES DATA LOCALISATION INCREASE SECURITY?
More control of the implementing jurisdiction…
THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
1. Market access commitment: any data localisation
measure which imposed a ban to transfer infringes such
commitment.
2. National treatment rules: any data localisation measure
requiring a foreign supplier to build new servers or use
local servers gives a competitive advantage to local
suppliers.
G A T S C O M M I T M E N T S
Exceptions: inter alia, national security, data privacy, fraud
and safety, etc.
—> Necessity test: there is no reasonably available WTO-
consistent alternative (US-Gambling dispute)
—> Burden of demonstration.
G A T S C O M M I T M E N T S
F R E E T R A D E A G R E E M E N T S 2 . 0
Trans-Pacific Partnership:
Art. 14.13: “No party shall require a covered person to use or
locate computer facilities in that Party’s territory as a
condition of conducting business in that territory”
Exceptions:
1. Carve-out on financial services;
2. “Legitimate policy objective”
TTIP?
TiSA?
F R E E T R A D E A G R E E M E N T S 2 . 0
M A R T I N A F R A N C E S C A F E R R A C A N E
E M A I L : M A R T I N A . F E R R A C A N E @ E C I P E . O R G
THANK YOU!

More Related Content

What's hot

Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Data Mining : Healthcare Application
Data Mining : Healthcare ApplicationData Mining : Healthcare Application
Data Mining : Healthcare Application
osman ansari
 
rdbms-notes
rdbms-notesrdbms-notes
rdbms-notes
Mohit Saini
 
Database : Relational Data Model
Database : Relational Data ModelDatabase : Relational Data Model
Database : Relational Data Model
Smriti Jain
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
Bernard Marr
 
Four Types of Data Models
Four Types of Data ModelsFour Types of Data Models
Four Types of Data Models
Deanna Medina
 
Degree of relationship set
Degree of relationship setDegree of relationship set
Degree of relationship set
Megha Sharma
 
Database design
Database designDatabase design
Database design
Dhani Ahmad
 
Different data models
Different data modelsDifferent data models
Different data models
madhusha udayangani
 
Centralised and distributed database
Centralised and distributed databaseCentralised and distributed database
Centralised and distributed database
Santosh Singh
 
Intro to digital forensic imaging
Intro to digital forensic imagingIntro to digital forensic imaging
Intro to digital forensic imaging
Detectalix
 
Relational database- Fundamentals
Relational database- FundamentalsRelational database- Fundamentals
Relational database- Fundamentals
Mohammed El Hedhly
 
DBMS Part-4.pdf
DBMS Part-4.pdfDBMS Part-4.pdf
DBMS Part-4.pdf
Prof. Dr. K. Adisesha
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
Johnecis Madrid
 
R programming
R programmingR programming
R programming
TIB Academy
 
Gun Control
Gun ControlGun Control
Gun Control
RMR1025
 
Chapter10 conceptual data modeling
Chapter10 conceptual data modelingChapter10 conceptual data modeling
Chapter10 conceptual data modeling
Dhani Ahmad
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbmsTech_MX
 

What's hot (20)

Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Data Mining : Healthcare Application
Data Mining : Healthcare ApplicationData Mining : Healthcare Application
Data Mining : Healthcare Application
 
rdbms-notes
rdbms-notesrdbms-notes
rdbms-notes
 
Database : Relational Data Model
Database : Relational Data ModelDatabase : Relational Data Model
Database : Relational Data Model
 
File records on disk
File records on diskFile records on disk
File records on disk
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
 
Four Types of Data Models
Four Types of Data ModelsFour Types of Data Models
Four Types of Data Models
 
Degree of relationship set
Degree of relationship setDegree of relationship set
Degree of relationship set
 
Database design
Database designDatabase design
Database design
 
Different data models
Different data modelsDifferent data models
Different data models
 
Centralised and distributed database
Centralised and distributed databaseCentralised and distributed database
Centralised and distributed database
 
Intro to digital forensic imaging
Intro to digital forensic imagingIntro to digital forensic imaging
Intro to digital forensic imaging
 
Relational database- Fundamentals
Relational database- FundamentalsRelational database- Fundamentals
Relational database- Fundamentals
 
DBMS Part-4.pdf
DBMS Part-4.pdfDBMS Part-4.pdf
DBMS Part-4.pdf
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
R programming
R programmingR programming
R programming
 
Gun Control
Gun ControlGun Control
Gun Control
 
Chapter10 conceptual data modeling
Chapter10 conceptual data modelingChapter10 conceptual data modeling
Chapter10 conceptual data modeling
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbms
 

Viewers also liked

ISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court SystemISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court System
Martina F. Ferracane
 
DIY microscope
DIY microscopeDIY microscope
DIY microscope
Martina F. Ferracane
 
Fab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurshipFab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurship
Martina F. Ferracane
 
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
Martina F. Ferracane
 
Designing regulation for the future
Designing regulation for the futureDesigning regulation for the future
Designing regulation for the future
Martina F. Ferracane
 
Digital Trade Restrictions in South Africa
Digital Trade Restrictions in South AfricaDigital Trade Restrictions in South Africa
Digital Trade Restrictions in South Africa
Martina F. Ferracane
 
Digital Trade Estimates Project
Digital Trade Estimates Project Digital Trade Estimates Project
Digital Trade Estimates Project
Martina F. Ferracane
 
Cybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont'sCybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont's
Martina F. Ferracane
 
Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
Martina F. Ferracane
 
ITA: What's next?
ITA: What's next?ITA: What's next?
ITA: What's next?
Martina F. Ferracane
 
Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
Martina F. Ferracane
 
Trade and Growth in the Digital Era
Trade and Growth in the Digital EraTrade and Growth in the Digital Era
Trade and Growth in the Digital Era
Martina F. Ferracane
 
Will 3D printing change everything?
Will 3D printing change everything?Will 3D printing change everything?
Will 3D printing change everything?
Martina F. Ferracane
 

Viewers also liked (13)

ISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court SystemISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court System
 
DIY microscope
DIY microscopeDIY microscope
DIY microscope
 
Fab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurshipFab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurship
 
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
 
Designing regulation for the future
Designing regulation for the futureDesigning regulation for the future
Designing regulation for the future
 
Digital Trade Restrictions in South Africa
Digital Trade Restrictions in South AfricaDigital Trade Restrictions in South Africa
Digital Trade Restrictions in South Africa
 
Digital Trade Estimates Project
Digital Trade Estimates Project Digital Trade Estimates Project
Digital Trade Estimates Project
 
Cybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont'sCybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont's
 
Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
 
ITA: What's next?
ITA: What's next?ITA: What's next?
ITA: What's next?
 
Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
 
Trade and Growth in the Digital Era
Trade and Growth in the Digital EraTrade and Growth in the Digital Era
Trade and Growth in the Digital Era
 
Will 3D printing change everything?
Will 3D printing change everything?Will 3D printing change everything?
Will 3D printing change everything?
 

Similar to Data localisation and data security

South Africa & Data Flows
South Africa & Data FlowsSouth Africa & Data Flows
South Africa & Data Flows
Martina F. Ferracane
 
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
FSR Communications and Media
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23
Juan Llanos
 
NIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsNIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government Contractors
Unanet
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison
 
Telecom service futures driven by customer need
Telecom service futures driven by customer needTelecom service futures driven by customer need
Telecom service futures driven by customer need
University of Hertfordshire
 
Blockchain - creating more transparent economy
Blockchain - creating more transparent economy Blockchain - creating more transparent economy
Blockchain - creating more transparent economy
Paweł Kuskowski
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
JakeAldrinDegala1
 
Wireless Past Present Future
Wireless Past Present FutureWireless Past Present Future
Wireless Past Present Future
University of Hertfordshire
 
Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...
Ulf Mattsson
 
2020 NYS Shield Act Webinar
2020 NYS Shield Act Webinar2020 NYS Shield Act Webinar
2020 NYS Shield Act Webinar
Innovative Solutions
 
Blockchain for f Financial Institutions | Asian Development Bank conference
Blockchain for f Financial Institutions | Asian Development Bank conferenceBlockchain for f Financial Institutions | Asian Development Bank conference
Blockchain for f Financial Institutions | Asian Development Bank conference
mim3mim3
 
Buenos Aires - CEMLA/G20 FinTech Experts
Buenos Aires - CEMLA/G20 FinTech ExpertsBuenos Aires - CEMLA/G20 FinTech Experts
Buenos Aires - CEMLA/G20 FinTech Experts
Juan Llanos
 
Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)
Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)
Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)
Executive Leaders Network
 
The Delaware Geospatial Metadata Standard
The Delaware Geospatial Metadata StandardThe Delaware Geospatial Metadata Standard
The Delaware Geospatial Metadata Standard
Mike Mahaffie
 
The Future of Private International Law of IP: The Bright Promise of the Cod...
The Future of Private International Law of IP:  The Bright Promise of the Cod...The Future of Private International Law of IP:  The Bright Promise of the Cod...
The Future of Private International Law of IP: The Bright Promise of the Cod...
Paulius Jurcys
 
11 Critical Areas of Cybersecurity Focus for Financial Institutions
11 Critical Areas of Cybersecurity Focus for Financial Institutions11 Critical Areas of Cybersecurity Focus for Financial Institutions
11 Critical Areas of Cybersecurity Focus for Financial Institutions
MICHAEL MOSHIRI
 
Base de datos
Base de datosBase de datos
Base de datoskjoha95
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Maurice Dawson
 
Predictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraPredictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform Era
IDC Italy
 

Similar to Data localisation and data security (20)

South Africa & Data Flows
South Africa & Data FlowsSouth Africa & Data Flows
South Africa & Data Flows
 
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23
 
NIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsNIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government Contractors
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
Telecom service futures driven by customer need
Telecom service futures driven by customer needTelecom service futures driven by customer need
Telecom service futures driven by customer need
 
Blockchain - creating more transparent economy
Blockchain - creating more transparent economy Blockchain - creating more transparent economy
Blockchain - creating more transparent economy
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Wireless Past Present Future
Wireless Past Present FutureWireless Past Present Future
Wireless Past Present Future
 
Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...
 
2020 NYS Shield Act Webinar
2020 NYS Shield Act Webinar2020 NYS Shield Act Webinar
2020 NYS Shield Act Webinar
 
Blockchain for f Financial Institutions | Asian Development Bank conference
Blockchain for f Financial Institutions | Asian Development Bank conferenceBlockchain for f Financial Institutions | Asian Development Bank conference
Blockchain for f Financial Institutions | Asian Development Bank conference
 
Buenos Aires - CEMLA/G20 FinTech Experts
Buenos Aires - CEMLA/G20 FinTech ExpertsBuenos Aires - CEMLA/G20 FinTech Experts
Buenos Aires - CEMLA/G20 FinTech Experts
 
Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)
Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)
Personal Data: Globalisation or Localisation (Gary Brown at Westinghouse)
 
The Delaware Geospatial Metadata Standard
The Delaware Geospatial Metadata StandardThe Delaware Geospatial Metadata Standard
The Delaware Geospatial Metadata Standard
 
The Future of Private International Law of IP: The Bright Promise of the Cod...
The Future of Private International Law of IP:  The Bright Promise of the Cod...The Future of Private International Law of IP:  The Bright Promise of the Cod...
The Future of Private International Law of IP: The Bright Promise of the Cod...
 
11 Critical Areas of Cybersecurity Focus for Financial Institutions
11 Critical Areas of Cybersecurity Focus for Financial Institutions11 Critical Areas of Cybersecurity Focus for Financial Institutions
11 Critical Areas of Cybersecurity Focus for Financial Institutions
 
Base de datos
Base de datosBase de datos
Base de datos
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Predictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraPredictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform Era
 

More from Martina F. Ferracane

Reglamento General de Protección de Datos
Reglamento General de Protección de DatosReglamento General de Protección de Datos
Reglamento General de Protección de Datos
Martina F. Ferracane
 
DATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITYDATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITY
Martina F. Ferracane
 
INCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABSINCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABS
Martina F. Ferracane
 
ISDS in APEC region the record
ISDS in APEC region   the recordISDS in APEC region   the record
ISDS in APEC region the record
Martina F. Ferracane
 
Experiencing a FabLab
Experiencing a FabLabExperiencing a FabLab
Experiencing a FabLab
Martina F. Ferracane
 
Will 3D Printing change everything?
Will 3D Printing change everything?Will 3D Printing change everything?
Will 3D Printing change everything?
Martina F. Ferracane
 
Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0
Martina F. Ferracane
 
Bio-hacking
Bio-hackingBio-hacking

More from Martina F. Ferracane (8)

Reglamento General de Protección de Datos
Reglamento General de Protección de DatosReglamento General de Protección de Datos
Reglamento General de Protección de Datos
 
DATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITYDATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITY
 
INCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABSINCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABS
 
ISDS in APEC region the record
ISDS in APEC region   the recordISDS in APEC region   the record
ISDS in APEC region the record
 
Experiencing a FabLab
Experiencing a FabLabExperiencing a FabLab
Experiencing a FabLab
 
Will 3D Printing change everything?
Will 3D Printing change everything?Will 3D Printing change everything?
Will 3D Printing change everything?
 
Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0
 
Bio-hacking
Bio-hackingBio-hacking
Bio-hacking
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Data localisation and data security

  • 1. D A TA L O C A L I S A T I O N A N D D A TA S E C U R I T Y M A R T I N A F R A N C E S C A F E R R A C A N E P O L I C Y A N A LY S T A T E C I P E Q E D E V E N T O N “ C Y B E R S E C U R I T Y A N D C L O U D C O M P U T I N G ” 2 6 A P R I L 2 0 1 6
  • 2. A TA X O N O M Y O F D A TA L O C A L I S A T I O N Definition: a Government imposed restriction that results in the localisation of data within a certain jurisdiction. Categorization: 1. Strict data localisation: • Local storage • Local storage and processing • Local storage, processing and access (i.e. ban to transfer) 2. Conditional flow regime.
  • 3. P R O T E C T I O N I S M 2 . 0 Source: ECIPE Digital Trade Estimates database - To be released in September 2016. Note: The graph does not include conditional flow requirements and measures whose date of entry into force is unknown. 0" 10" 20" 30" 40" 50" 60" 70" 80" 1961" 1966" 1971" 1976" 1981" 1986" 1991" 1996" 2001" 2006" 2011" 2016" The$evolu)on$of$data$localisa)on$measures$
  • 4. DOES DATA LOCALISATION INCREASE SECURITY? Myth: Data security is a function of where the data is physically located.
  • 5. DOES DATA LOCALISATION INCREASE SECURITY? Data can be accessed from any location, independently from where the IP address is located.
  • 6. DOES DATA LOCALISATION INCREASE SECURITY? More control of the implementing jurisdiction…
  • 7. THE COST OF DATA LOCALISATION Source: The cost of data localisation: Friendly Fire on Economic Recovery. ECIPE Occasional Paper No.8/2014.
  • 8. THE COST OF DATA LOCALISATION Source: The cost of data localisation: Friendly Fire on Economic Recovery. ECIPE Occasional Paper No.8/2014.
  • 9. THE COST OF DATA LOCALISATION Source: The cost of data localisation: Friendly Fire on Economic Recovery. ECIPE Occasional Paper No.8/2014.
  • 10. THE COST OF DATA LOCALISATION Source: The cost of data localisation: Friendly Fire on Economic Recovery. ECIPE Occasional Paper No.8/2014.
  • 11. 1. Market access commitment: any data localisation measure which imposed a ban to transfer infringes such commitment. 2. National treatment rules: any data localisation measure requiring a foreign supplier to build new servers or use local servers gives a competitive advantage to local suppliers. G A T S C O M M I T M E N T S
  • 12. Exceptions: inter alia, national security, data privacy, fraud and safety, etc. —> Necessity test: there is no reasonably available WTO- consistent alternative (US-Gambling dispute) —> Burden of demonstration. G A T S C O M M I T M E N T S
  • 13. F R E E T R A D E A G R E E M E N T S 2 . 0 Trans-Pacific Partnership: Art. 14.13: “No party shall require a covered person to use or locate computer facilities in that Party’s territory as a condition of conducting business in that territory” Exceptions: 1. Carve-out on financial services; 2. “Legitimate policy objective”
  • 14. TTIP? TiSA? F R E E T R A D E A G R E E M E N T S 2 . 0
  • 15. M A R T I N A F R A N C E S C A F E R R A C A N E E M A I L : M A R T I N A . F E R R A C A N E @ E C I P E . O R G THANK YOU!