The Effects Of GDPR On EU / US Relations

An important recent EU Court of Justice of the European Union (CJEU) decision in Schrems II found  that the EU-US agreement on transatlantic data sharing known as Privacy Shield is invalid and its additional findings with respect to standard contractual clauses, closes off key mechanisms for transferring persona data from the EU to the US. 

Now with important impacts on trade and the development of technologies such as cloud computing and artificial intelligence (AI) this will have significant effects on EU/US relations.

Many have also argued the EU’s General Data Protection Regulations (GDPR) should have stopped much of how the conjoined ad-tech and online industries operate.  It should have removed the data of 700 million EU residents from the machine, just as it should have removed our data from most transatlantic data transfers.

The dawning age of Surveillance capitalism is underpinned by the value of our commoditised, collected, collated and analysed data, sold in marketing databases, gathered and shared internally by data giants across their own multiple-market platforms and properties, and externally to third parties. Your data, sifted and sorted into minute categories, is also traded in microsecond auctions between huge advertising entities in order to instantly serve you a specific targeted ad in the eye blink between when a web page’s cookies know it’s you, and that page’s many parts congeal on the screen.

What appears to you as just another ad, maybe eerily related to something you might have searched for or purchased recently, is the fleeting end result of these vast ad-tech data-gathering and marketing machinations.

The attempt by GDPR to extend EU privacy rights and obligations to countries and entities receiving EU personal data reflects a broad dynamic, which is that as the global free flow of data increases the scope for national security agencies to access the personal data of everyone, national privacy standards need to be globalised as well to be effective. Yet, governments often provide different levels of privacy protection and redress depending on whether a person is a citizen and where they are located. 

Under the Fourth Amendment to the Constitution, the US provides different levels of legal redress to people in the US compared to those outside the US, including access to US courts. 

GDPR in effect seeks to extend the full suite of rights and obligations available in the EU under GDPR, to any country receiving EU personal data.  Given these risks and developments, what is needed is an international agreement on how to balance national security and access to data, with other key goals such as privacy. 

EU Commission:         Irish Times:     Curia:      Farrer:        VoxEU

You Might Also Read:

How Does The CCPA Compare To The GDPR?:

 

« What Is A Cyber Security Audit?
Cyber Security Teams Worry Most About Phishing & Ransomware »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.