The Effects Of GDPR On EU / US Relations

An important recent EU Court of Justice of the European Union (CJEU) decision in Schrems II found  that the EU-US agreement on transatlantic data sharing known as Privacy Shield is invalid and its additional findings with respect to standard contractual clauses, closes off key mechanisms for transferring persona data from the EU to the US. 

Now with important impacts on trade and the development of technologies such as cloud computing and artificial intelligence (AI) this will have significant effects on EU/US relations.

Many have also argued the EU’s General Data Protection Regulations (GDPR) should have stopped much of how the conjoined ad-tech and online industries operate.  It should have removed the data of 700 million EU residents from the machine, just as it should have removed our data from most transatlantic data transfers.

The dawning age of Surveillance capitalism is underpinned by the value of our commoditised, collected, collated and analysed data, sold in marketing databases, gathered and shared internally by data giants across their own multiple-market platforms and properties, and externally to third parties. Your data, sifted and sorted into minute categories, is also traded in microsecond auctions between huge advertising entities in order to instantly serve you a specific targeted ad in the eye blink between when a web page’s cookies know it’s you, and that page’s many parts congeal on the screen.

What appears to you as just another ad, maybe eerily related to something you might have searched for or purchased recently, is the fleeting end result of these vast ad-tech data-gathering and marketing machinations.

The attempt by GDPR to extend EU privacy rights and obligations to countries and entities receiving EU personal data reflects a broad dynamic, which is that as the global free flow of data increases the scope for national security agencies to access the personal data of everyone, national privacy standards need to be globalised as well to be effective. Yet, governments often provide different levels of privacy protection and redress depending on whether a person is a citizen and where they are located. 

Under the Fourth Amendment to the Constitution, the US provides different levels of legal redress to people in the US compared to those outside the US, including access to US courts. 

GDPR in effect seeks to extend the full suite of rights and obligations available in the EU under GDPR, to any country receiving EU personal data.  Given these risks and developments, what is needed is an international agreement on how to balance national security and access to data, with other key goals such as privacy. 

EU Commission:         Irish Times:     Curia:      Farrer:        VoxEU

You Might Also Read:

How Does The CCPA Compare To The GDPR?:

 

« What Is A Cyber Security Audit?
Cyber Security Teams Worry Most About Phishing & Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Fastpath

Fastpath

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

Techzone Solutions

Techzone Solutions

Techzone Solutions is a leading ICT Solution Provider in Afghanistan. Services offered include cyber security.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Synergy Infosec

Synergy Infosec

Synergy Infosec offer companies a combination of intelligent tools that identify their security vulnerabilities and eliminate them for good.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

QuantLR

QuantLR

QuantLR is enabling the global mass deployment of Quantum Cryptography, by providing the world’s lowest-cost secure Quantum Cryptography solution.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.