● Data Modeling and Data Models.
● Business Rules (Translating Business Rules into Data Model Components).
● Emerging Data Models: Big Data and NoSQL.
● Degrees of Data Abstraction (External, Conceptual, Internal and Physical model).
Financial Time Series: Concept and Forecast
Chainarong Kesamoon, PhD
Data Science Thailand Team
chainaron.kes@gmail.com
https://www.facebook.com/DataScienceTh/
datascienceth.com
● Data Modeling and Data Models.
● Business Rules (Translating Business Rules into Data Model Components).
● Emerging Data Models: Big Data and NoSQL.
● Degrees of Data Abstraction (External, Conceptual, Internal and Physical model).
Financial Time Series: Concept and Forecast
Chainarong Kesamoon, PhD
Data Science Thailand Team
chainaron.kes@gmail.com
https://www.facebook.com/DataScienceTh/
datascienceth.com
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?Bernard Marr
There are three classifications of data: structured, semi-structured and unstructured. While structured data was the type used most often in organizations historically, artificial intelligence and machine learning have made managing and analysing unstructured and semi-structured data not only possible, but invaluable.
Introduction to the basic concepts of digital forensic image acquisition, hardware/software write-blocking techniques and forensic image formats
*
*
*
Subscribe to the YouTube channel:
https://youtube.com/channel/UC4bvx2ub2h7F_FrZKF9QGIg
Basic tutorial for R programming. this video contains lot of information about r programming like
agenda
history
SOFTWARE PARADIGM
R interface
advantages of r
drawbacks of r
Workshop given to girls between 11 and 14 years old in occasion of the Green Light for Girls event in Brussels (27 February 2016).
The SVG file and detailed instructions to make a microscope in a Fab Lab can be found here: https://biohackacademy.github.io/biofactory/class/2-microscope/
The total cost for the DIY microscope is less than 10 euros.
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?Bernard Marr
There are three classifications of data: structured, semi-structured and unstructured. While structured data was the type used most often in organizations historically, artificial intelligence and machine learning have made managing and analysing unstructured and semi-structured data not only possible, but invaluable.
Introduction to the basic concepts of digital forensic image acquisition, hardware/software write-blocking techniques and forensic image formats
*
*
*
Subscribe to the YouTube channel:
https://youtube.com/channel/UC4bvx2ub2h7F_FrZKF9QGIg
Basic tutorial for R programming. this video contains lot of information about r programming like
agenda
history
SOFTWARE PARADIGM
R interface
advantages of r
drawbacks of r
Workshop given to girls between 11 and 14 years old in occasion of the Green Light for Girls event in Brussels (27 February 2016).
The SVG file and detailed instructions to make a microscope in a Fab Lab can be found here: https://biohackacademy.github.io/biofactory/class/2-microscope/
The total cost for the DIY microscope is less than 10 euros.
Presentation at 5th Annual QED Conference on Cybersecurity on 22 June 2017: https://qed.eu/Events/5th%20Annual%20QED%20Conference%20on%20Cybersecurity%20/Bio/
Video available at: https://www.youtube.com/watch?v=y0vg231Bl6o&t=778s
Launch of the Digital Trade Estimates Project in Brussels (12 October 2016). You can browse our database of measures on digital trade at www.ecipe.org/dte/database
Presentation by Martina F. Ferracane at European Business Summit (May 2015).
Video version available at this link: https://youtu.be/hrRHBCLcgqU - It shows also the videos presented in the PPT!
Presentation delivered during 9th Seminar on Media and the Digital Economy (21-22 March 2019, Florence).
http://fsr.eui.eu/event/annual-scientific-seminar-on-media-and-the-digital-economy-9th-edition/
Madrid - Digital Currency Summit 2015-04-23Juan Llanos
My most provocative presentation so far. I argue that the current policy goal priority of national security, tax compliance and financial crime prevention, as well as the current identity paradigm (government-issued) are factors that contribute to financial exclusion and hamper innovation. I focus on the challenges to our mental models created by the advent of Bitcoin and cryptocurrencies, and innovation opportunities in AML/CFT, privacy, identity, data analysis and security. Finally, I present my three Is theory of "Responsible Evolution" as a viable strategy for entrepreneurs to make their projects viable.
NIST Cybersecurity Requirements for Government ContractorsUnanet
What is Controlled Unclassified Information (CUI)? What is NIST SP 800-171? How is my project management and accounting system impacted?
Navigating your way through these complex topics can be difficult for any government contractor, but protecting CUI in a non-federal environment is critical. Compliance is required by December 31, 2017.
Join us for this webinar to learn more about:
• What it means to be compliant with NIST SP 800-171
• Documenting your compliance status
• Preparing for audits and/or requests for compliance attestation/reports
• Key CUI requirements
• Suggested NIST processes
• How having the right system and team in place can help you remain compliant
Learn more at: https://www.unanet.com/news/demand-webinars
Telecom customer services appear to be stuck in the early 20th Century with the telephone call the primary channel for service provision that can take days to affect. Compare that to Google, Amazon, IBM, Apple and other modern companies where customers control service provision by the minute or second.
Modem business is driven by the accumulation of customer data, but the Telecom Industry sees vast amounts of customer-related data dormant and untapped. As a result, many new opportunities are lost. For example, the behavior of people, devices, systems, and networks give the earliest indicators of potential security problems.
OTT operators exploit networks and make far greater profits than any other sector and this might be further amplified by the roll-out of 5G. But without a fundamental rethink of FTTP, 5G will fail to deliver sufficient coverage and the advertised data rates. This pending failure is already seeing alternative solutions from outside the industry along with the realization that most ‘things’ on the IoT will never connect to the internet!
In this lecture is the final session of an extensive wireless course delivered over several weeks at the University of Suffolk. So, by way of ‘rounding-off’ the series, we chart the progression of wireless/radio communication from the first spark transmitters through Carrier -Wave Morse, AM, FM, DSSC, SSB to digital systems along with the use of LW, MW, SW, VHF, UHF and Microwaves. Whilst we focus on Electro-Magnetic-Waves from 30kHz through 300GHz, we also mention optical, ultrasonic, and chemical communication as additional modes.
Our examinations detail the distinct genetic trails of 1, 2, 3G, and 4, 5G, the approximate development cycles/timeline along with distinctive changes in design thinking. We then postulate that 6 and 7G are likely to form a new line of development with 6G probably realised without any towers or any conventional cellular structure. In this context we also point out that there are no digital radios today, only traditional analogue designs with ‘strap-on-modems’ at the transmitter and receiver. Perhaps more radically, we suggest that it is time to adapt fully digital designs that allow for the eradication of the established bands and channels mode of operation.
We also chart the energy hungry progression of systems from 1 through 5G where tower installations are now consuming in excess of 10kW due to the extensive signal processing employed. This immediately debunks any notion of another step in the direction of more bandwidth, lower latency, greater coverage with >20x more towers (than 4G) and >250Bn power hungry smart devices. In short: we propose that 5G is the last of the line and the realisation of 6G demands new thinking and new modes that lead us away from W and mW to µW and nW wireless designs.
Whilst most of the technology required for 6G is available up to 300GHz, there remains one big channel in respect of the growing number of antennas per device and platform. Even for 3 - 5G + WiFi + BlueTooth space is at a premium in mobile devices and fractal antennas have not lived up to their promise too integrate all of these into one wideband structure. However, at 100GHz and above, antennas/dipoles become less than chip size and can see 10s included as phased arrays. But this all needs further work!
Throughout this lecture, we provide examples, demonstrations, and mind-experiments to support our assertions.
Next generation data protection and security for oracle users - the block cha...Ulf Mattsson
Title: Next Generation Data Protection and Security for Oracle users: the Block Chain Advantage
Summary: You will learn how Oracle blockchain can help securing PII (Personally Identifiable Information), PCI data and Healthcare data.
You will learn about compliance for PII, PCI and Healthcare data impact Oracle blockchain users.
You will learn if there is a material difference in the use of block chaining IoT data in different industries and the compliance and privacy implications for Oracle users.
Abstract: You will learn how blockchain is applicable to securing PII (Personally Identifiable Information), PCI data and Healthcare data in Oracle.
You will learn about compliance for PII, PCI and Healthcare data impact Oracle blockchain users.
You will learn if deleting the Oracle data encryption key would be GDPR compliant.
You will learn the pros and cons of utilizing Tokenization vs encryption for Oracle blockchain data.
You will learn if we are dealing with very sensitive PII data; would a private Oracle blockchain. be more secure, manageable and presents a much smaller attack surface.
You will learn if there is a material difference in the use of block chaining IoT solutions in different industries and if so what is the compliance and privacy implications for Oracle users.
You will learn how Oracle blockchain can minimize a ransomware attack.
You will learn how the Estonia country in Europe is the future model for utilizing blockchain to prevent nation state attacks on Oracle data.
You will learn how to be GDPR compliant managing some of the data outside of the Oracle block chain.
Presenter Biography: Ulf is the Head of Innovation at TokenEx, previously Chief Technology Officer at Atlantic BT, and earlier CTO at Compliance Engineering. Ulf was the CTO and a founder of Protegrity Technology. He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security.
Ulf is the inventor of more than 50 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention. One line of his research during the last 15 years is in the area of managing and enforcing security policies for databases, including joint projects with research and development teams at Oracle, IBM, Microsoft, Hewlett-Packard, Sybase, Informix, Teradata, and RSA.
Get up to date on the NYS Shield Act to learn what you need to know to comply by March 2020.
To watch the webinar recording on-demand check out this link: https://zoom.us/webinar/register/WN_qkaEUTIzQJ6B3MIyKUAHAg
Buenos Aires - CEMLA/G20 FinTech ExpertsJuan Llanos
The birth of the blockchain era. Bitcoin, the first blockchain and why it's revolutionary. Ethereum, the global distributed computer and why it's revolutionary. The emergence of private blockchains, and why they are valuable. How blockchain challenges many paradigms, including property, identity and regulation. Competing public policies goals. Redefining identity. Opportunities to reinvent prudential and anti-crime policy and enforcement. The ultimate goal: reduce the cost of running civilization. Sample use cases, with a focus on Real-Time Gross Settlement. Think ocean, not lake.
Presented at Executive Leaders Network CMO/DPO/CIO/CISO Event on October 06th.
"For years companies have been streamlining their IT infrastructure and personnel, integrating their systems and locating all of these in best cost countries. More recently, a theme is emerging in newer national data protection regulations for data to remain local. What does this mean for the operating models of global companies?"
The Future of Private International Law of IP: The Bright Promise of the Cod...Paulius Jurcys
・Global intellectual property system is in crisis: international regulators are not able to agree on uniform rules on handling cross-border IP disputes;
・Fixed procedural rules prevent courts from handling IP litigation in an efficient way;
・This shows that it is up to the market to develop alternative solutions to solve problems related to cross-border IP disputes. Some examples of such market-driven solutions are non-binding regulatory proposals prepared by IP experts (ALI, CLIP Principles)
・In the future we will have increasing number of non-state regulatory frameworks, including algorithmic governance systems (=rules embedded in algorithms and smart contracts)
・we suggest that in the future lawyers should be more pragmatic and open to the legal "recognition" of the validity of such non-state legal systems.
11 Critical Areas of Cybersecurity Focus for Financial InstitutionsMICHAEL MOSHIRI
On Dec. 12, 2014, the New York State Department of Financial Services issued guidance on 11 areas related to cybersecurity where it plans to focus its future examinations. This presentation, delivered at a cybersecurity roundtable, provides an overview of these 11 areas, and offers additional guidance on where financial institutions should consider focusing their resources.
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
Recently some countries have fell victim to attacks from nation-states, cyber criminals, and bad actors resulting in loss of critical data or damage to critical infrastructure. Thus there is an urgent need to design, implement, and deliver innovative solutions that meet the challenges through advancements in intellection collection, analysis. This submission will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world concerning multiple sources of intelligence. This submission will provide insights into technological advancement for all cyber intelligence. Additionally, technological advancements for subjects such as open source intelligence, human intelligence, geospatial intelligence, social media intelligence, and data science will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Predictive Security in the 3rd Platform EraIDC Italy
Presentazione di Giancarlo Vercellino, Research & Consulting Manager di IDC Italia, tenuta all'IDC Conference Predictive Security in the 3rd Platform Era di Milano, l'11 marzo 2015
Similar to Data localisation and data security (20)
My presentation at the WTO Public Forum 2016. I talk about FabLabs and trade.
Video of the presentation available at https://youtu.be/_HK2km2AWS4?t=22m8s
Presentation at the Asia FDI Forum in Hong Kong (5-6 November 2015). The presentation reviews the ISDS cases in APEC region and describe the debate around ISDS and solutions proposed under mega-regionals' negotiations.
Presentation during the CONNECT Final Event on 28th October 2015. I present my experience at Garagem FabLab (São Paulo) which inspired the launch of FabLab Marsala. The Lab is a social project which will connect all the high schools in Marsala with the aim to solve local challenges through digital fabrication and sustain local entrepreneurs to implement digital solutions.
I made this presentation at the ECIPE Workshop: "Will 3D Printing change everything?" held on October 6th, 2015. It looks at sectoral disruption driven by adoption of 3D printing, while it also presents short-term regulatory aspects that will affect the diffusion of this technology. The presentation also provides a more general reflection on the wider economic and societal perspective surrounding the widespread adoption of 3D printing.
Presentation at ECIPE Seminar "How to Accelerate the Expansion of the Digital Economy?" on 15th July. Quick overview of new trends in manufacturing and regulatory implications.
The presentation presents the bio-hack academy experience at Garagem FabLab in São Paulo as a partner lab of the Waag Society. It also presents the implications that bio-hacking can have for enhancing high schools curricula, promoting science democratisation and creativity.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Data localisation and data security
1. D A TA L O C A L I S A T I O N
A N D
D A TA S E C U R I T Y
M A R T I N A F R A N C E S C A F E R R A C A N E
P O L I C Y A N A LY S T A T E C I P E
Q E D E V E N T O N “ C Y B E R S E C U R I T Y A N D C L O U D C O M P U T I N G ”
2 6 A P R I L 2 0 1 6
2. A TA X O N O M Y O F D A TA L O C A L I S A T I O N
Definition: a Government imposed restriction that results in the
localisation of data within a certain jurisdiction.
Categorization:
1. Strict data localisation:
• Local storage
• Local storage and processing
• Local storage, processing and access (i.e. ban to transfer)
2. Conditional flow regime.
3. P R O T E C T I O N I S M 2 . 0
Source: ECIPE Digital Trade Estimates database - To be released in September 2016.
Note: The graph does not include conditional flow requirements and measures whose date of entry into force is unknown.
0"
10"
20"
30"
40"
50"
60"
70"
80"
1961" 1966" 1971" 1976" 1981" 1986" 1991" 1996" 2001" 2006" 2011" 2016"
The$evolu)on$of$data$localisa)on$measures$
4. DOES DATA LOCALISATION INCREASE SECURITY?
Myth: Data security is a function of where the data is
physically located.
5. DOES DATA LOCALISATION INCREASE SECURITY?
Data can be
accessed from any
location,
independently from
where the IP address
is located.
7. THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
8. THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
9. THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
10. THE COST OF DATA LOCALISATION
Source: The cost of data localisation: Friendly Fire on Economic Recovery.
ECIPE Occasional Paper No.8/2014.
11. 1. Market access commitment: any data localisation
measure which imposed a ban to transfer infringes such
commitment.
2. National treatment rules: any data localisation measure
requiring a foreign supplier to build new servers or use
local servers gives a competitive advantage to local
suppliers.
G A T S C O M M I T M E N T S
12. Exceptions: inter alia, national security, data privacy, fraud
and safety, etc.
—> Necessity test: there is no reasonably available WTO-
consistent alternative (US-Gambling dispute)
—> Burden of demonstration.
G A T S C O M M I T M E N T S
13. F R E E T R A D E A G R E E M E N T S 2 . 0
Trans-Pacific Partnership:
Art. 14.13: “No party shall require a covered person to use or
locate computer facilities in that Party’s territory as a
condition of conducting business in that territory”
Exceptions:
1. Carve-out on financial services;
2. “Legitimate policy objective”