[Senate Hearing 115-803]
[From the U.S. Government Publishing Office]
S. Hrg. 115-803
THE INTERNET AND DIGITAL
COMMUNICATIONS: EXAMINING THE IMPACT
OF GLOBAL INTERNET GOVERNANCE
=======================================================================
HEARING
BEFORE THE
SUBCOMMITTEE ON COMMUNICATIONS,
TECHNOLOGY, INNOVATION, AND THE INTERNET
OF THE
COMMITTEE ON COMMERCE,
SCIENCE, AND TRANSPORTATION
UNITED STATES SENATE
ONE HUNDRED FIFTEENTH CONGRESS
SECOND SESSION
__________
JULY 31, 2018
__________
Printed for the use of the Committee on Commerce, Science, and
Transportation
[GRAPHIC NOT AVAILABLE IN TIFF FORMAT]
Available online: http://www.govinfo.gov
__________
U.S. GOVERNMENT PUBLISHING OFFICE
55-218 PDF WASHINGTON : 2024
-----------------------------------------------------------------------------------
SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION
ONE HUNDRED FIFTEENTH CONGRESS
SECOND SESSION
JOHN THUNE, South Dakota, Chairman
ROGER F. WICKER, Mississippi BILL NELSON, Florida, Ranking
ROY BLUNT, Missouri MARIA CANTWELL, Washington
TED CRUZ, Texas AMY KLOBUCHAR, Minnesota
DEB FISCHER, Nebraska RICHARD BLUMENTHAL, Connecticut
JERRY MORAN, Kansas BRIAN SCHATZ, Hawaii
DAN SULLIVAN, Alaska EDWARD MARKEY, Massachusetts
DEAN HELLER, Nevada TOM UDALL, New Mexico
JAMES INHOFE, Oklahoma GARY PETERS, Michigan
MIKE LEE, Utah TAMMY BALDWIN, Wisconsin
RON JOHNSON, Wisconsin TAMMY DUCKWORTH, Illinois
SHELLEY MOORE CAPITO, West Virginia MAGGIE HASSAN, New Hampshire
CORY GARDNER, Colorado CATHERINE CORTEZ MASTO, Nevada
TODD YOUNG, Indiana JON TESTER, Montana
Nick Rossi, Staff Director
Adrian Arnakis, Deputy Staff Director
Jason Van Beek, General Counsel
Kim Lipsky, Democratic Staff Director
Chris Day, Democratic Deputy Staff Director
Renae Black, Senior Counsel
------
SUBCOMMITTEE ON COMMUNICATIONS, TECHNOLOGY, INNOVATION, AND THE
INTERNET
ROGER F. WICKER, Mississippi, BRIAN SCHATZ, Hawaii, Ranking
Chairman MARIA CANTWELL, Washington
ROY BLUNT, Missouri AMY KLOBUCHAR, Minnesota
TED CRUZ, Texas RICHARD BLUMENTHAL, Connecticut
DEB FISCHER, Nebraska EDWARD MARKEY, Massachusetts
JERRY MORAN, Kansas TOM UDALL, New Mexico
DAN SULLIVAN, Alaska GARY PETERS, Michigan
DEAN HELLER, Nevada TAMMY BALDWIN, Wisconsin
JAMES INHOFE, Oklahoma TAMMY DUCKWORTH, Illinois
MIKE LEE, Utah MAGGIE HASSAN, New Hampshire
RON JOHNSON, Wisconsin CATHERINE CORTEZ MASTO, Nevada
SHELLEY MOORE CAPITO, West Virginia JON TESTER, Montana
CORY GARDNER, Colorado
TODD YOUNG, Indiana
C O N T E N T S
----------
Page
Hearing held on July 31, 2018.................................... 1
Statement of Senator Wicker...................................... 1
Letter dated July 31, 2018 to Hon. Roger Wicker and Hon.
Brian Schatz from Pat Kane, Senior Vice President,
VeriSign, Inc.............................................. 71
Statement of Senator Schatz...................................... 2
Statement of Senator Fischer..................................... 48
Statement of Senator Inhofe...................................... 50
Statement of Senator Capito...................................... 51
Statement of Senator Peters...................................... 54
Statement of Senator Gardner..................................... 56
Statement of Senator Hassan...................................... 59
Statement of Senator Udall....................................... 61
Statement of Senator Markey...................................... 63
Statement of Senator Cantwell.................................... 65
Statement of Senator Cruz........................................ 67
Statement of Senator Klobuchar................................... 68
Witnesses
Hon. Michael Chertoff, Former Secretary of Homeland Security
(2005-2009); Co-Founder and Executive Chairman, The Chertoff
Group.......................................................... 4
Prepared statement........................................... 5
James Bladel, Vice President of Global Policy, GoDaddy........... 11
Prepared statement........................................... 13
Roslyn Layton, Ph.D., Visiting Scholar, American Enterprise
Institute...................................................... 15
Prepared statement........................................... 16
Denise E. Zheng, Vice President, Policy, Business Roundtable..... 32
Prepared statement........................................... 33
Christopher M.E. Painter, Commissioner, Global Commission on the
Stability of Cyberspace........................................ 37
Prepared statement........................................... 39
Appendix
Hon. Bill Nelson, U.S. Senator from Florida, prepared statement.. 75
Letter dated July 17, 2018 to Hon. Chuck Grassley, Hon. Dianne
Feinstein, Hon. John Thune and Hon. Bill Nelson from
CreativeFuture Independent Film and Television Alliance........ 76
Response to Written Questions Submitted to Hon. Michael Chertoff
by:
Hon. Roger F. Wicker......................................... 84
Hon. Catherine Cortez Masto.................................. 84
Hon. Jon Tester.............................................. 86
Response to written questions submitted to James Bladel by:
Hon. Roger F. Wicker......................................... 87
Hon. Catherine Cortez Masto.................................. 87
Hon. Jon Tester.............................................. 88
Response to written questions submitted to Roslyn Layton, Ph.D.
by:
Hon. Roger F. Wicker......................................... 89
Hon. Roy Blunt............................................... 91
Hon. Catherine Cortez Masto.................................. 91
Hon. Jon Tester.............................................. 122
Response to written questions submitted to Denise E. Zheng by:
Hon. Maggie Hassan........................................... 129
Hon. Catherine Cortez Masto.................................. 129
Hon. Jon Tester.............................................. 132
Response to written questions submitted to Christopher M.E.
Painter by:
Hon. Maggie Hassan........................................... 133
Hon. Catherine Cortez Masto.................................. 134
Hon. Jon Tester.............................................. 135
THE INTERNET AND DIGITAL
COMMUNICATIONS: EXAMINING
THE IMPACT OF GLOBAL INTERNET GOVERNANCE
----------
TUESDAY, JULY 31, 2018
U.S. Senate,
Subcommittee on Communications, Technology,
Innovation, and the Internet,
Committee on Commerce, Science, and Transportation,
Washington, DC.
The Subcommittee met, pursuant to notice, at 10:00 a.m. in
room SR-253, Russell Senate Office Building, Hon. Roger Wicker,
Chairman of the Subcommittee, presiding.
Present: Senators Wicker [presiding], Cruz, Fischer,
Inhofe, Schatz, Cantwell, Klobuchar, Markey, Udall, Peters,
Hassan, Capito, and Gardner.
OPENING STATEMENT OF HON. ROGER F. WICKER,
U.S. SENATOR FROM MISSISSIPPI
Senator Wicker. Good morning. Today's Subcommittee meets to
examine international Internet policies and their impact on
U.S. businesses, domestically and abroad.
I'm glad to convene this hearing with my good friend and
colleague, Ranking Member Schatz.
The Internet, as we know it, has become one of the most
important inventions in history. We use it for just about
everything. Thanks to infrastructure investments and ingenuity,
the Internet is now an economic engine driving job creation and
unprecedented access to information and opportunities.
In a short time, the World Wide Web has transformed into a
global interconnected information super highway facilitating
growth, freedom, and economic prosperity.
The multi-stakeholder governing model has been key to the
Internet's development across the world. This model has
fostered the creation of a dynamic Internet economy that
promotes investment and innovation.
We owe many of the cutting edge products and services we
enjoy today to the Internet economy. Underpinning this economy
is Internet data. As the Internet grows and more people and
things become connected, the volume, quality, and variety of
Internet data increases.
This is driving the development of new businesses and
services and it is enhancing online experiences for consumers.
Internet data is an essential commodity for businesses to
compete and grow in the global digital market.
The importance of Internet data has not gone unnoticed
internationally. In fact, it has expanded the focus of the
conventional Internet governing agenda.
Traditionally, Internet governance has centered on the
formation of policies and rules dedicated to the Internet's
technical development across jurisdictions. While this remains
an important function and primary focus, the increasing value
of data has shifted attention to the collection, use, movement,
and overall treatment of Internet data.
The rise of data where localization rules following how
data can be process in a certain territory or jurisdiction
along with local content requirements, Internet censorship
policies, and cybersecurity laws are a few examples of this
growing trend.
Policies targeting data and networks often stem from a
country's interest in fostering its own innovation or
protecting its people from possible data misuse, but here's a
new problem.
The global nature of the Internet means that the impact and
power of these laws goes beyond a jurisdiction's borders. U.S.
companies are compelled to change business models or alter
operations to achieve compliance in foreign markets, and
they're experiencing disruptions in their own domestic
operations, as well. The result is less job creation, less
investment, and less innovation in the United States.
Consumers are feeling the effects of international Internet
policies. Overly restrictive limitations on data movements or
inconsistencies across jurisdictions ultimately deliver an
Internet experience to consumers that is less personalized and
more expensive to access.
Today, we look forward to examining the impact of global
Internet policies on U.S. businesses and consumers as well as
the continued development of the Internet around the world.
I would mention that I'm Chairman of the Helsinki
Commission and as part of the Commission's mission, we promote
economic cooperation overseas and I also look forward to
discussing the appropriate role that Congress should play in
enhancing international coordination on the future Internet
policies and empowering U.S. businesses to prosper in today's
global Internet marketplace.
This is critically important to maintain U.S. leadership
and data-driven innovation and Internet technologies for years
to come.
I welcome the witnesses here today. I will introduce them
in a moment after we've heard an opening statement from Senator
Schatz.
STATEMENT OF HON. BRIAN SCHATZ,
U.S. SENATOR FROM HAWAII
Senator Schatz. Thank you, Mr. Chairman. Thank you for
holding this hearing.
We are here today to talk about governing an Internet that
is truly international. It serves billions of people who have
different cultural and economic values and ideas of how it
should work and that presents a challenge.
We also have more specific challenges, such as online
terrorism, foreign propaganda, interfering in elections, state-
sanctioned surveillance, and misinformation that can lead to
violence, and as we consider them, we have to ask how they can
be addressed without compromising basic human rights, such as
free speech or privacy.
Approaching any one of these challenges would require a
long and technical conversation and so it's unrealistic to
think that we can solve all of these weighty policy issues with
a hearing or two, but what we can do here is highlight and
demonstrate support for the forums where these discussions can
happen in a more comprehensive manner.
The IANA transition from NTIA to ICANN is a good example of
how a technical governance of the Internet is best served by a
process in which all stakeholders participate. These include
industry, civil society, academia users, and governments.
Government-driven forums, like OECD, G7, G20, and WTO, also
allow people to come together to address important Internet
policy issues, including security, economic development, and
trade.
Russia, China, and Iran use these forums to push for
agendas that censor speech, enable government surveillance, and
restrict free markets. That's why the U.S. and our allies need
to maintain our leadership to preserve and advance democratic
principles. Similarly, a free and open Internet is in our
common interests.
The Internet started in the United States. It is
intertwined with the fabric of our daily lives from basic
activities, like checking the weather, to exercising our
fundamental civic rights and democratic values, and that's why
we have to show up and lead these forums and to continue to be
the indispensable nation.
This is generally true for international policy issues, but
it's especially true for the governance of the global Internet.
Unfortunately, our leadership is being jeopardized by this
Administration. Last year, Secretary Tillerson eliminated the
cybersecurity coordinator role and demoted its
responsibilities, putting it under the Bureau of Economic
Affairs, and earlier this year, National Security Advisor John
Bolton eliminated the White House cyber coordinator role.
Congress is working to reinstate the Office of Cyber
Coordinator at the State Department and we hope to persuade the
White House to re-establish the Cyber Coordinator role in the
NSC.
The U.S. Government needs to play an active role in helping
to set reasonable rules of the road for Internet governance.
This means protecting the existing international and multi-
stakeholder processes and in this global context, our standing
down will create a vacuum for authoritarian regimes.
I look forward to hearing from the witnesses about how we
can better engage with the international community to address
the many challenges facing the Internet today.
Thank you, Mr. Chairman.
Senator Wicker. Thank you, Senator Schatz.
We are delighted today to have the Honorable Michael
Chertoff, former Secretary of Homeland Security and Co-Founder
and Executive Chairman of The Chertoff Group, Washington, D.C.;
Mr. James Bladel, Vice President of Policy, GoDaddy, of
Scottsdale, Arizona; Dr. Roslyn Layton, Visiting Scholar, the
American Enterprise Institute in Washington, D.C.; Ms. Denise
Zheng, Vice President for Policy of The Business Roundtable, in
Washington; and Mr. Christopher Painter, Commissioner, Global
Commission on the Stability of Cyberspace, Washington, D.C.
Let's take 25 minutes evenly divided among our witnesses
for opening statements, and, Secretary Chertoff, we'll begin
with you and just go down the table.
Welcome.
STATEMENT OF HON. MICHAEL CHERTOFF,
FORMER SECRETARY OF HOMELAND SECURITY (2005-2009);
CO-FOUNDER AND EXECUTIVE CHAIRMAN,
THE CHERTOFF GROUP
Secretary Chertoff. Well, thank you, Mr. Chairman, and
Ranking Member Schatz, and members of the Committee, for
holding this hearing, which is very timely.
I've submitted a written statement which I request be made
part of the record.
Senator Wicker. All of the statements will be made a part
of the record.
Secretary Chertoff. And I should just point out that I
serve with Chris Painter on the Global Commission on Stability
of Cyberspace. So we interact quite a bit on this issue.
Let me just try to make a few brief points. As both the
Chairman and Ranking Member indicated, obviously the value
proposition of the Internet in many respects rests upon its
global nature. In fact, it connects up networks all around the
world and therefore when you have the prospect of fragmentation
or localization, you run the risk of undermining the
fundamental value of the Internet because you would wind up
with a number of different networks.
This is important not only because we value freedom and the
ability to communicate with others around the world and to have
discourse about matters of public importance but because this
is critical to our economy. The reality is the Internet has
transformed the nature of our economic activity.
It allows us to promote exports. It allows us to--if I can
use the phrase--dis-intermediate between buyers and sellers, so
we now have the ability of people to sell directly, whether
it's auctioning on eBay or signing up to look for drivers under
Uber or Lyft or other ride-sharing programs, and in many
respects, this is part of what is fueling global growth around
the world.
It's also true that much of the innovation and the
ingenuity behind the Internet, which is part of the market
value of many of our most prominent companies, depends upon
having a global market and that means a global Internet.
Without a global Internet, that market dries up. So we have a
very strong interest in dealing with this issue.
It also means that no one country can control the outcome.
We have to work with our partners. Now KANDR compels that we
recognize that the Russians and the Chinese have a different
view and in many cases, to the Russians and the Chinese,
information they don't want their public to read is what they
regard as cybersecurity and that's, of course, the opposite of
what we view as important.
So I would make, I think, three points about what we ought
to address. One is I do think we need to continue to promote
what has been described as the multi-stakeholder model of
Internet governance. That means making sure we get not just
government but civil society, business, and consumers into the
mix in deciding how the Internet is going to be operated.
The Russians and the Chinese often look to put the
governance in bodies, like the United Nations, which would
politicize and give them in many cases control over the
outcomes for their own purposes, and I would emphasize that
often rules that appear to be merely technical actually have a
great deal of real substance because your ability, for example,
to control the domain name registry system and to decide, you
know, who controls basically the traffic flow in many cases is
the key to whether you censor the Internet or you have it be
wide open.
A second issue is we do have conflicting laws in different
jurisdictions. The Internet is borderless, the data is
borderless, but the laws have borders, and we often do wind up
with conflicts.
Congress has passed the CLOUD Act, which has opened the
door to resolving some of the conflicts about lawful access by
the authorities to data that may be held in another country and
that's a good step forward, and we need to continue to work on
resolving these disputes among legal jurisdictions about who
gets to access information and what the substantive rules are,
in particular because we prize the First Amendment. We want to
make sure that other countries don't use their power over
multi-national global Internet companies to drive a vision of
censorship that would fundamentally undermine our
constitutional values.
And, finally, I would say, and Full Disclosure is a book
I've just written recently, that we need to talk about what
privacy is like in an era when we are generating so much data
globally that the idea of keeping it all hidden is a ship that
has sailed and now it becomes an issue of how do we control the
data and what rights do we as citizens and consumers have to
make sure that our data is not being used in ways that we don't
agree to or that will hurt us and so these are very meaty
topics.
I look forward to answering questions from the Committee on
any and all of these.
Thank you very much.
[The prepared statement of Secretary Chertoff follows:]
Prepared Statement of Hon. Michael Chertoff, Former Secretary of
Homeland Security (2005-2009); Co-Founder and Executive Chairman, The
Chertoff Group
Introduction
As we are all aware, the Internet knows no borders. National
sovereignty and borders, key elements of how those of us in the West
have looked at legal and political issues since the Peace of
Westphalia, lack their traditional meaning in a digital world in which
data moves between servers and users without regard for their location
or nationality. I can just as easily access my e-mail in Geneva as I
can in Washington. My service provider can seamlessly move my data
between data centers in dozens of countries, with the decision to do so
made by an algorithm. In some instances, a provider may not even know
the physical location of the data, the underlying ones and zeros, or
may ``shard'' the data, spreading it across multiple locations.
In this environment, it is nearly impossible for any one country to
claim sovereignty over ``their portion'' of the internet. A country may
have jurisdiction over the physical infrastructure of the Internet
within their country, but it cannot control the infrastructure beyond
its borders nor can it control the services and offerings of providers
in other countries. Practically speaking, the only way to truly control
the Internet within your country is to disconnect it from the rest of
the world, as Russia recently threatened to do and as North Korea has
done for much of its domestic population (leaving aside the activities
of the country's cyber warriors).\1\ Even China's Great Firewall, a
costly but reasonably effective means of control, is unable to
completely stem the flow of information deemed objectionable by the
Chinese Communist Party to citizens within its borders.
---------------------------------------------------------------------------
\1\ See https://www.theregister.co.uk/2017/12/01/
russia_own_internet/, https://www.scmp.
com/news/asia/east-asia/article/2119146/how-north-korea-slowly-
embracing-its-own-sealed-version-internet
---------------------------------------------------------------------------
More importantly, taking such drastic action comes at a significant
cost. The Internet is now a vital part of the U.S. and the global
economies. In 2016 e-commerce sales in the U.S. totaled approximately
$400B, or roughly 10 percent of all retail sales.\2\ Mobile and
Internet banking use in the U.S. has also exploded, resulting in 2.5B
bill-payment transactions in 2012 alone.\3\ Beyond these transactions
are entire companies built on the power of the internet, such as Google
and Facebook. The Internet has also fostered entirely new segments of
the economy, such as ride and home sharing.
---------------------------------------------------------------------------
\2\ See https://www.census.gov/newsroom/press-releases/2018/estats-
report.html
\3\ See https://www.frbservices.org/assets/news/research/2013-fed-
res-paymt-study-summary-rpt.pdf
---------------------------------------------------------------------------
Beyond the economics, the Internet serves as a massive, if
imperfect, laboratory for democracy and free speech, allowing for the
free exchange of ideas and information between all users regardless of
nationality, location, or class. It has also allowed for large scale
collaboration, resulting in the creation of the world's largest
encyclopedia, Wikipedia, and various crowdfunding sites that allow
individuals to raise funds for their ventures beyond the traditional
confines of banks and institutional investors. On the darker side of
things, the Internet has also given rise to a dark web that facilitates
the sale of illicit goods and gives opportunities to criminals to
conspire and collaborate in private.
Need for coordinated action on cyber (international and bilateral)
The Internet has proven to be a vital economic and social tool,
vastly expanding economic opportunity while allowing for the free
exchange of thoughts and ideas. It is something that is worth
protecting, but also something that requires regulation and policing.
However, this global nature also necessitates an appreciation that the
actions of one country can have impacts far beyond that country's
borders, and conversely, that broader Internet and cyber policy aims
can only be fulfilled through cooperation with other countries.
That said, we must recognize that not all countries view the
Internet in the same way nor appreciate its significant social and
democratic value to society. China, Russia, Iran, and many other
authoritarian countries view the Internet as a threat to the governing
regime and thus require significant controls and monitoring. In such
countries various websites are blocked, applications prohibited, and
communications monitored for seditious speech or efforts that might
challenge the regime's hold on power. While these countries are part of
the global network, the reality is that we are never going to see eye-
to-eye with them on important issues of Internet governance, nor will
the U.S. and its allies be able to convince them to abandon their
efforts and allow unfettered access to materials that might undermine
them.
And so, it is up to us to cooperate and build consensus with like-
minded countries, other democracies and Western countries who agree on
the broader principles of the Internet but may disagree about how to
regulate, shape, and manage it. We must recognize that we may, at
times, disagree with even our closest allies on policy particulars, but
in the end, it is better to reach an imperfect compromise with them
than allow for the disintegration of the Internet as we know. So much
of the internet's value is in its global nature, and we must work
across international borders if we hope to preserve it as a common
good.
Without that cooperation we are likely to see new barriers,
intended or not, appear and impede the development and growth of the
internet. Data localization requirements, for example, may be enacted
to protect a country's citizens' data, but have the more practical
effect of significantly raising costs, diminishing competition,
frustrating international commerce, and preventing citizens from
accessing the services of providers based outside their own country.
New regulations may be enacted to protect users' privacy but result in
unexpected delays in cross-border law enforcement cooperation. The best
way to avoid such barriers is to work with other countries to address
these issues, as many countries share the same concerns and would all
benefit from coordinated action.
At present, the mechanisms for such cooperation are limited.
Broader international bodies, such as the United Nations and
International Telecommunications Union, include stakeholders from
authoritarian countries which may use those bodies to pursue policies
contrary to our vision for the internet. The European Union has
arguably been the most successful multi-national body on this issue,
developing Europe-wide policies such as the General Data Protection
Regulation (GDPR). Some progress has also been made on bi-lateral
solutions, such as the law enforcement data sharing agreements
authorized by the recently enacted Clarifying Lawful Overseas Use of
Data (CLOUD) Act, which allows for the U.S. to enter into bi-lateral,
reciprocal law enforcement data access agreements with countries that
meet a specified set of legal and human rights criteria. The first such
agreement, between the U.S. and the U.K., is currently working its way
through the approval process.
A variety of other organizations have also worked to address these
issues. The Global Commission on Internet Governance and the Global
Commission on Stability in Cyberspace, on which I have served, work to
counter the fragmentation of the Internet and offer guidance to policy
makers seeking to address Internet governance issues.\4\ Toomas Hendrik
Ilves, the former President of Estonia and Visiting Fellow at the
Hoover Institution at Stanford University, recently proposed what he
termed a new ``Cyber NATO,'' a coalition of liberal democracies that is
better able to meet the ubiquity of cyber threats and ensure proper,
adequate response.\5\ The President of Microsoft, Brad Smith, has
proposed what he has dubbed a ``Digital Geneva Convention,'' which
outlines the rules of cyberspace and protects civilians and other
bystanders from the offensive cyber activities of nation-states.\6\
---------------------------------------------------------------------------
\4\ See https://www.cigionline.org/sites/default/files/
gcig_final_report_-_with_cover.pdf
\5\ See https://berlinpolicyjournal.com/a-digital-defense-alliance/
\6\ See https://blogs.microsoft.com/on-the-issues/2017/02/14/need-
digital-geneva-convention/
---------------------------------------------------------------------------
The above is just a brief snapshot of the need for international
cooperation on Internet governance, be it multi-lateral or bi-lateral.
Ultimately, the U.S. will be best served by working with countries that
share its values and vision for the Internet to find a mutually-
agreeable approach to the myriad of privacy, security, regulatory, and
management issues that face the Internet as we know it. The U.S. would
also be well served to consult with key stakeholders throughout the
process, considering the concerns of the technology industry, the
privacy community, and other actors as it develops its strategy for
international engagement cooperation on Internet governance and related
cybersecurity issues. The costs of non-cooperation would be severe and
ultimately harm the U.S., and the rest of the world, economically and
socially.
Privacy needs and the impacts of inaction
Today's rampant technology, and the convenience and opportunity it
offers, has numbed us to our loss of privacy. The availability of data
is only going to grow in years and decades to come and we urgently need
to regulate how government and the private sector can make use of that
information. The creaky and dated legal framework that currently
governs the collection and use of personal data was created decades ago
when phone records and photographs constituted metadata. The U.S. needs
a legal and policy structure built for the way the 21st century uses
data--one that retains security and economic benefits without
sacrificing Americans' liberty and civic values.
Privacy as we know it has been forever at least substantially lost,
and the collection of data will--and must, for security reasons--
expand. What must be preserved, however, by new laws and regulations is
our autonomy--the ability to make our own personal choices restricted
only by transparent laws and social norms, and to have a reasonable
degree of ownership and control over the data we generate.
In March of this year, news broke that Cambridge Analytica was
regularly harvesting our data for the purposes of manipulating American
voters in favor of the Trump Campaign in 2016.\7\ The entering wedge of
Cambridge Analytica's data collection was an apparently limited request
by a developer to have Facebook users complete an online survey.
Slightly over a quarter of a million did so. But by downloading the
survey, they opened the door to collection of data about all their
friends and their other on-line interactions. As a result, data
relating to approximately 50 million individuals was captured. Most of
these people did not know that their information was being used.
Perhaps improperly, this data was transferred to Cambridge to applying
machine learning algorithms to correlate granular connections between
individuals and their likely political predilections and interests.
This analysis could then be applied for precisely targeted,
individually focused political advertising aimed at potential voters.
It is debatable whether this had an impact on the election outcome, but
it is certain that political campaigns and even governments will
continue efforts to refine and apply the political marketing
techniques.
---------------------------------------------------------------------------
\7\ See https://www.cnbc.com/2018/03/21/facebook-cambridge-
analytica-scandal-everything-
you-need-to-know.html
---------------------------------------------------------------------------
And the purpose of those techniques will not only be to affect
elections. As we have seen, information from Russia and other foreign
powers has been used to create social division, sow public distrust,
and even foment unrest. Weaponized data is the newest tool in the
armory of subversion.
What all this illustrates, is that personal data has become one of
the most valuable assets of the modern age. That is evident from the
fact that many of the companies with the highest market capitalization
are essentially earning revenue from data adapted to commercial
marketing. But the value of these data assets increasingly also lies in
their utility as a tool to drive political behavior, impact social
stability, and even affect national security.
Even more significant, the business of aggregating and reselling an
individual's data from multiple sources--social media, online searches,
consumer purchases, and locational data--means that people will
increasingly be subject to pressure to change their behavior from
multiple sources: employers, insurers and governments. By way of
example, China has embarked on a ``social credit'' plan to aggregate
myriad data points of online and offline behavior, and award
individuals a ``score'' that will affect their life prospects.\8\
---------------------------------------------------------------------------
\8\ See https://www.businessinsider.com/china-social-credit-system-
punishments-and-rewards-explained-2018-4
---------------------------------------------------------------------------
For all of us what this means is that all the data we generate has
become as valuable, and as worthy of safeguarding, as our money in the
bank. Privacy--in the sense of shielding data from others--has been
frayed given how easily third parties can collect and fuse our data.
What must be protected now is our freedom of action, which requires
that we take greater ownership and control of our data even when it is
accessible to others.
Data security regulation and policy solutions
Part of the remedy will be adaptations in the law and regulation,
changes that must allow for innovation but also the need to protect
individuals from having their data abused or weaponized. When user data
is collected by a platform to improve the user experience, consent
should be readily presumed. But when the data is being used for other
commercial purposes, or transferred to third parties, the law should
mandate that the proposed new use of this data be clearly explained to
the user, and the user's affirmative approval should be required.
Opting in or out of this kind of data sharing should always be the
user's choice and should not be the result of pressure or deception.
Finally, platforms should be required to describe and make available to
the user all the types of data being collected about him or her.
But the remedy also requires each of us becoming mindful of how and
when we share our data. Sometimes that means we should not share data,
or that we should pay for an online service instead of accepting a
``free'' benefit that we pay for with our personal information. We
should also be careful about completing online surveys because the data
we enter could wind up in different hands than we expect. Even more
critical, we should consider that our online communications with
friends may be harvested if those friends agree to grant access to
their data. Finally, we must educate ourselves about the way data can
be used to influence us, and to train ourselves to evaluate these
messages critically.
Some data regulation had already progressed both abroad and at the
state level. Under the GDPR, EU citizens have a right to know what's
being done with their data, and a right to access it. GDPR requires any
company doing business in the EU that interacts with and processes data
of people in the EU to get explicit consent from users for every
possible use to their data. Users will have a right to be
``forgotten;'' as in being able to request that a company delete their
data, stop sharing it and force third-party firms from using it as
well.\9\
---------------------------------------------------------------------------
\9\ See https://www.lawfareblog.com/summary-eu-general-data-
protection-regulation
---------------------------------------------------------------------------
In June of this year, California recently passed one of the
toughest data privacy laws in the country, the California Consumer
Privacy Act of 2018, impacting how businesses will be required to
disclose the types of data that they collect, as well as allow
consumers to opt out of having their data sold.\10\ The legislation,
which is similar to Europe's new GDPR protections, gives consumers more
control over their personal data. It grants them the right to know what
information companies like Facebook and Google are collecting, why they
are collecting it, and who they are sharing it with. Consumers will
have the option of barring tech companies from selling their data, and
children under 16 must opt into allowing them to even collect their
information at all.
---------------------------------------------------------------------------
\10\ See https://www.theverge.com/2018/6/28/17509720/california-
consumer-privacy-act-legislation-law-vote
---------------------------------------------------------------------------
While the legislation is a positive step forward for consumers'
privacy, I acknowledge that addressing privacy through dozens or
hundreds of regulations various states and cities would be unworkable,
and that their needs to be a broader solution at the national and
global levels. However, the country or state that takes the most action
and has critical mass will ultimately have the most impact. Take the
California Emissions Standards legislation as an example. Automakers
were compelled to more or less follow those standards nationally once
the automakers in the region were forced to comply with a higher level
of emission standards than the Federal requirement. To date, 12 states
and the District of Columbia follow the California standards.
Similarly, the jurisdictions that lead on data privacy legislation and
impact most U.S. companies could effectively set the national standard.
Defending against disinformation across Western democracies and
election interference
Attacks on democracy will affect all parties. If we want to
establish concrete solutions, we need to exchange knowledge and take
global-minded actions. Organizations like the Transatlantic Commission
on Election Security, for which I am the co-chairman, focus on finding
solutions to three major election meddling strategies: manipulation of
social media, tampering with social infrastructure and leaking
confidential documents. Working with political and private sector
leaders, traditional and new media actors, and non-governmental
organizations, the Commission promotes transatlantic coordination,
identifying and plugging gaps and raising awareness of this important
issue. It will also investigate the level of risk exposure across
Western countries and provide concrete recommendations to address this
problem head on.
A positive step forward are private sector initiatives like
Microsoft's ``Defending Democracy'' initiative (with which I work).
This initiative engages with stakeholders in democratic countries
globally to protect campaigns from hacking through:
increased cyber resilience measures, enhanced account
monitoring and incident response capabilities;
increased political advertising transparency online by
supporting relevant legislative proposals such as the Honest
Ads Act and adopting additional self-regulatory measures across
our platforms;
technological solutions to preserve and protect electoral
processes and engage with federal, state and local officials to
identify and remediate cyber threats;
defending against disinformation campaigns in partnership
with leading academic institutions and think tanks dedicated to
countering state-sponsored computational propaganda and junk
news.
Information Sharing
Cybersecurity information sharing, that is, the sharing of threat
data, indicators, Tactics, Techniques, and Procedures (TTPs), and other
data, is vital to helping others detect and prevent a cyber-attack.
What makes information sharing so important is the fact that our cyber
infrastructure is so diffuse. While one entity, such as the FBI,
Google, or Microsoft, may be aware of a particular vulnerability or
threat, it can take days, weeks, or even months before the relevant
information spreads throughout the cyber ecosystem and results in the
deployment of patches, installation of new technologies, changes in
network architecture, or the adoption of new policies that adequately
counter the threat. Such information sharing is likely the most mature
within the Federal Government, where agencies, particularly within the
Intelligence and Defense communities, share vital information with one
another to protect Federal networks.
The good news is that information sharing efforts are also growing
within the private sector of the United States, though much can still
be done. Some of the greatest progress has been made through the growth
and use of Information Sharing and Analysis Centers (ISACs) and
Information Sharing and Analysis Organizations (ISAOs), which
coordinate the sharing of threat information among entities from a
single sector or geographic region. Some of the most successful ISACs
and ISAOs, including the Financial Sector ISAC (FS-ISAC) and the Multi-
State ISAC (MS-ISAC), have been able to coordinate the sharing of
significant volumes of threat information between private and public
entities while working with Federal agencies to ensure that the threat
information that they are able to provide is also reflected within
their ecosystem.
However, more can be done to grow information sharing beyond the
government space and a relatively limited portion of the private
sector. First, the Federal Government can do more to encourage private
sector information sharing both by enhancing incentives for private
sector companies to participate and by making it easier for those
companies to access threat information data from Federal agencies.
Second, at present, information sharing across international
borders is exceedingly difficult. Unclear data privacy requirements,
data transfer limitations, and other legal uncertainties often prevent
or significantly delay the sharing of threat information data between
private entities in different countries. The United States should work
with its international partners to help ease these restrictions while
maintaining and respecting relevant privacy protections for sensitive
personally identifiable information.
Third, international information sharing between governments can
also be enhanced. While cooperation between U.S. intelligence agencies
and those of our allies is generally effective, such cooperation is far
less common between civilian agencies, sometimes because of the same
regulations that frustrate private sector information sharing across
international borders. We can do more to enable this information
sharing and build stronger relationships between the Department of
Homeland Security, which is responsible for the protection of Federal
civilian networks, and its counterparts in allied countries.
Five Frameworks for New Laws and Rules to Enhance Security and Civil
Liberties
Finally, I would offer this committee and their colleagues in
Congress five frameworks that they should contemplate as they consider
how best to address the cyber threats facing our country and the policy
challenges that those threats and changing technologies present. While
no one framework is a silver bullet for the challenges we face, each
helps to illustrate both these challenges and some of the specific
solutions that could address them.
First, to protect us against attacks on our physical and cyber
security by bad actors while simultaneously preventing the government
from overreaching to threaten our autonomy, we must recognize that data
requires both a loosening on what information can be collected and
stored by or for government and at the same time tightening of the
standards under which that information can be inspected, analyzed, and
used. We should grant the government necessary authority to access and
collect data. The government cannot effectively disrupt criminal
enterprises or foil terrorist plots without following a digital data
trail that may only appear significant with the passage of time. The
trail goes cold if the government does not have initial access and
collection capability so that the relationships in the data can be
analyzed in context. Note, however, that I am not advocating that
private companies build vulnerabilities, like decryption backdoors,
into their systems to assist the government. The government should use
its own resources; this burden remains on the government.
But even as restrictions on access and collection are loosened,
restraints on government inspection (human or robot), analysis,
dissemination, and use of that data should be tightened to strengthen
civil liberties protections against abuse of that data. In the interest
of individual autonomy, this balances the need to preserve useful
information with the need to control human access--and possible
misuse--of that information.
Second, consider the spectrum of active defense when our
enterprises or homes are attacked by cyber criminals, terrorists, or
adversary nation-states. I suggest that licensing private actors to
defend their networks could help the United States stem the flow of
intellectual property--the greatest heist in history. But to mitigate
the risks of unintended consequences and uncontrolled escalation of
conflict, the government must restrict these licenses to specific
activities and set clear rules of the road. In particular, no private
party should be allowed to retaliate against or invade another
network--even if it is the source of a hacking attack--unless under the
direction and control of an appropriate law enforcement or judicial
authority.
Third, to avoid fragmentation of the internet, and the consequent
huge global economic cost, Congress should work with other countries to
develop uniform laws governing both the legal process for obtaining
data and the substantive laws governing that data. This will require
creation of enforceable treaties or international agreements that focus
on protecting the rights of the data subject, since the focus of
personal autonomy is reasonable control over one's own data. The
objective of this developing international law regime should be to
avoid inconsistencies that lead to individual national laws that
mandate data localization and thereby compromise the global
architecture and freedom of movement of Internet data.
Fourth, the law must evolve to control the use private parties can
make of individual data. In a world in which people inevitably give off
digital exhaust and often cannot give meaningful consent to the use of
their data by apps or third parties, the law should shift the default
to better protect privacy and autonomy. As some European regulators are
currently insisting, this means that enterprises seeking to use data
for purposes other than improving the particular service engaged by the
user--for example, reselling to third party marketers--should be
required to obtain that user's affirmative or ``opt-in'' consent. Even
more explicit consent from the data subject should be mandated when a
data aggregator or platform seeks to resell or repurpose an
individual's data that was obtained from the third parties who
initially collected that subject's data without consent. For those
aggregators or platforms whose market position makes them effective
monopolists, consent may be deemed insufficient; regulators may need to
impose limits on the data uses a monopolist may engage in and might
even require a fee be paid by the company to the subject for certain
uses.
Most important, the law must limit the ability of corporations to
coerce individuals into consenting to broad surrender of control over
their data. Thus, the ability of employers or insurance providers to
insist on virtually limitless access to individual data as a condition
of employment or affordable premiums should be tailored to apply only
to information reasonably related to employment or insurability. And
data collected for these reasons should be barred from resale or use
for unrelated purposes.
Indeed, noting that NGOs have developed transparency indices for
how well tech companies respond to government requests for their users'
data, we should develop transparent accounts or regulations for how
private companies are using, and especially sharing, individual users'
data.
Fifth, the law must incentivize private parties to collaborate with
the government in protecting against shared vulnerabilities. The vast
majority of IT infrastructure is in private hands, but the Internet
makes it interdependent. Without government expertise and even
regulation, coupled with private sector ingenuity and commitment, the
Internet infrastructure will continue to fall prey to its weakest link.
As part of this effort, the law should encourage and protect
information sharing directly and in real-time among private and public
entities on both industry-focused and regional bases.
Conclusion
If there is an overarching lesson to be drawn from the technology
revolution, it is that our day to day lives are described and even
defined by data. We generate data, it tracks our behavior, preferences,
location and even intentions. Data is used to incentive us, deter us,
and even coerce us. If others, be they government or private actors,
manage our data, they effectively control much of what we do.
The Internet was intended as a force to empower individuals, to
forge global connectivity, and even to promote freedom. Although some
believe that the Internet can be a law-free, almost anarchic zone, I
believe that the above demonstrates that without thoughtful rules, the
Internet can be a tool to constrain individual autonomy, to bully, and
to manipulate.
One way to look at the sea of data in which we currently swim is as
a global public good. Such a public good has value only if there are
rules that prohibit overreaching interference and disruption. We must
therefore develop rules to prevent powerful institutions and bad actors
from using Internet data to damage, rather than enhance, our autonomy.
Senator Wicker. Thank you, Mr. Secretary.
Mr. Bladel.
STATEMENT OF JAMES BLADEL,
VICE PRESIDENT OF GLOBAL POLICY, GODADDY
Mr. Bladel. Thank you. Good morning, Chairman Wicker,
Ranking Member Schatz, and Subcommittee Members.
My name is James Bladel, and I'm the Vice President of
Global Policy for GoDaddy, and we appreciate the opportunity to
testify before you today.
GoDaddy is the world's largest web platform dedicated to
independent ventures. We provide the tools, insights, and
people necessary to enable small businesses and aspiring
entrepreneurs or anyone with an idea to get that idea up and
running online and every idea starts with a domain name.
A domain name, whether it's a dot com, a dot org, or a new
extension, like dot app or dot blog, is essential to creating
an online identity. GoDaddy currently manages over 76 million
domain names for our 18 million customers worldwide and whether
that customer is a florist in Mississippi or a baker in London
or a web designer in Mumbai, our mission is to provide an
excellent customer experience that is uniform around the world.
The focus of this hearing is on the impact of international
policies and regulations on end user experiences and global
competition online and today, I would like to discuss the
following three issues.
First, the adoption of laws and regulations by countries
that are designed to exclude American companies; second, the
patchwork of privacy laws and regulations; and, third, the dot
com cooperative agreement between NTIA and Verisign, which
underpins the global Internet domain system.
Internationally, we're seeing an increasing number of
countries adopt laws and regulations that make it more
difficult to serve our customers in those markets. We have
encountered numerous examples of foreign regulations on
Internet providers that would require us to establish a local
presence or use local banks or even hire a local workforce all
in order to gain access to that market.
Some nations aggressively regulate content and censor
political or religious views. Taken together, all of these
regulations stand in the way of GoDaddy reaching new customers,
competing in new markets, and developing innovative products,
and laws like these are harmful to providers and to consumers
alike and are a barrier to free trade.
There's also an increasing number of new privacy
regulations, such as the European Union's new General Data
Protection Regulation, GDPR, and these regulations have created
a patchwork of laws with which companies must comply in order
to operate globally.
GDPR compliance was a major undertaking for GoDaddy. GDPR's
touched every aspect of our industry but, most notably, it has
significantly disrupted the WHOIS Service, which is a directory
of contact information for domain name registrants.
WHOIS is a two-edged sword. It serves an important tool for
law enforcement and other stakeholders, but it's also a gold
mine of personal data for spammers.
Currently, we're engaged with representatives of law
enforcement agencies and our colleagues at ICANN to try and
strike the right balance between providing access to WHOIS for
legitimate purposes while also protecting the private
information of our customers.
Also crucial to the health of the Internet is the 20-year-
old cooperative agreement between NTIA and Verisign that
governs the dot com registry.
As you're aware, dot com makes up about 80 percent of
domain names and the cooperative agreement holds the wholesale
price of dot com domain names at $7.85 per year. This is
scheduled to expire in November and it's our understanding that
NTIA and Verisign are currently in talks to renew and possibly
amend this agreement, which could potentially raise prices.
GoDaddy serves millions of small customers and in our
experience they're very sensitive to any price increase. We
believe it's important to preserve price caps in any renewal of
the cooperative agreement.
Eventually, we believe our industry and all consumers would
benefit from the full dot com agreement being put out for
competitive bid. The Internet has matured over the last 20
years and while we have no complaints about Verisign's
performance of the contract, there are now several companies
that could capably operate the dot com registry equally as well
and perhaps at lower wholesale cost.
So thank you again for the opportunity to testify here
today. We believe the United States must continue to push back
on protectionist policies imposed by other countries and to
help mitigate a global patchwork of inconsistent and unclear
privacy laws and, further, we are hopeful that NTIA will
increase transparency and extend the current dot com pricing as
associated with any renewal of the cooperative agreement and
engage with ICANN and other stakeholders to put that agreement
out for competitive bid.
So thank you for your time, and I look forward to your
questions.
[The prepared statement of Mr. Bladel follows:]
Prepared Statement of James Bladel, Vice President of Global Policy,
GoDaddy
Introduction
Good morning, Chairman Wicker, Ranking Member Schatz, and
subcommittee members. My name is James Bladel, and I am the Vice
President of Global Policy at GoDaddy. We appreciate the opportunity to
testify before you today.
GoDaddy is the world's largest web platform dedicated to
independent ventures. We provide the tools, insights, and people to
enable small businesses, aspiring entrepreneurs, or anyone with an idea
to get that idea up and running online. Every idea starts with a domain
name and building an online presence.
A domain name, whether it is a dot-COM, dot-ORG, or a new extension
like dot-APP or dot-BLOG, is critical to establishing an online
identity. GoDaddy currently manages over 76 million domain names for 18
million customers worldwide. Whether that customer is a florist in
Mississippi, a baker in London, or a web designer in Mumbai, our
mission is to provide an excellent customer experience that is uniform
around the world.
The focus of this hearing is the impact of international policies
and regulations on end user experiences and global competition online.
Today, I will discuss the following three issues:
Adoption of laws and regulations by countries designed to
exclude American companies;
The patchwork of country and regional privacy laws and
regulations; and
The renewal of the Cooperative Agreement between the
National Telecommunications and Information Administration
(NTIA) and Verisign, which underpins the global Internet domain
name system.
Foreign Regulations
Internationally, we are seeing an increasing number of countries
adopt local laws that make it more difficult to serve our customers in
those markets. We have encountered numerous examples of regulations on
foreign Internet providers that would require us to establish a local
presence, or use local banks, or even hire a local workforce, all in
order to access that market. Some nations aggressively regulate content
and censor political or religious views. Taken together, these
regulations stand in the way of GoDaddy reaching new customers,
competing in new markets, and developing new innovative products. Laws
like these must be seen as harmful to providers and consumers alike,
and are a barrier to free trade.
There is also an increasing number of new privacy regulations, such
as the European Union's new General Data Protection Regulation
(GDPR),\1\ creating a patchwork of country and regional laws with which
companies must comply to operate globally. GDPR compliance has been a
major undertaking at GoDaddy, diverting time and engineering resources
away from customer service and product development.
---------------------------------------------------------------------------
\1\ 2018 Reform of EU Data Protection Rules, available at https://
ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-
protection/2018-reform-eu-data-protection-rules_en
---------------------------------------------------------------------------
GDPR
GDPR has touched every aspect of our industry, but notably it has
significantly disrupted the WHOIS service, which is an online directory
of contact information for domain name registrants. WHOIS is a two-
edged sword, serving as an important tool for law enforcement agencies
and other stakeholders, while also being a gold mine of personal data
for spammers. Currently, we are engaged with representatives of law
enforcement agencies and our colleagues at the Internet Corporation for
Assigned Names and Numbers (ICANN) to strike the right balance between
providing access to WHOIS data for legitimate needs, while still
protecting the private information of our customers.
Cooperative Agreement and dot-COM Contract
Most important to GoDaddy--and critical to the tens of millions of
global customers who have dot-COM domains--is the 20-year-old,
exclusive Cooperative Agreement between NTIA and Verisign.\2\ In 2016,
an economic study commissioned by ICANN found that Verisign's share of
legacy generic Top-Level Domains (gTLDs) was over 80 percent, making
them an effective monopoly in our industry.\3\
---------------------------------------------------------------------------
\2\ Verisign Cooperative Agreement, National Telecommunications and
Information Administration (October 2016), available at https://
www.ntia.doc.gov/page/verisign-cooperative-agreement.
\3\ https://www.icann.org/news/announcement-2016-10-11-en
---------------------------------------------------------------------------
The Cooperative Agreement addresses this by capping the wholesale
price of dot-COM domain names at $7.85 per year. The Cooperative
Agreement is scheduled to expire in November, and we understand that
NTIA and Verisign are currently in talks to renew and possibly amend
this agreement.
Our experience clearly shows that small businesses are very
sensitive to price increases, and that any increase has the potential
to suppress their ability to grow, deliver products and add jobs.
GoDaddy serves millions of small businesses. Granting Verisign the
ability to raise dot-COM prices would have a negative impact on our
business and our customers, but also our competitors and their
customers, which can ultimately affect overall economic growth.
We see no justification for higher dot-COM prices, and we recommend
that NTIA preserve the price caps in any renewal of the Cooperative
Agreement.
Beyond the renewal of the Cooperative Agreement, we believe our
industry and all end users would benefit from the dot-COM contract
eventually being put out for competitive bid. Granting Verisign the
exclusive right to operate the dot-COM gTLD may have been appropriate
in the early days of the Internet, but the Internet has matured over
the last 20 years. And while we have no complaints with Verisign's
performance of the contract, there are now several companies capable of
operating the dot-COM gTLD equally as well, and perhaps at lower
wholesale costs.
Conclusion
Thank you for the opportunity to testify today to discuss global
policies that impact the Internet industry and our users. We believe
the U.S. must continue to push back on protectionist policies imposed
by other countries and the growing patchwork of privacy regulations.
Further, we are hopeful the NTIA will provide more transparency,
and seek more stakeholder engagement, as part of the renewal process
for the Cooperative Agreement. In the short-term, we support extending
the dot-COM price caps in any renewed agreement. But in the long-term,
we would like NTIA to engage with ICANN and other stakeholders to
develop a strategy to put the dot-COM contract up for competitive bid.
Thank you for your time, and I look forward to your questions.
Senator Wicker. Thank you very much.
Dr. Layton.
STATEMENT OF ROSLYN LAYTON, Ph.D., VISITING SCHOLAR, AMERICAN
ENTERPRISE INSTITUTE
Dr. Layton. Thank you, Chairman Wicker, and Ranking Member
Schatz.
Chairman Wicker, thank you also for your leadership of the
Helsinki Commission on Security and Cooperation and your
defense of human rights. It reminds me how Americans from every
part of our Nation can play a role in Internet policy.
For example, Mississippi is innovating in telemedicine and
precision agriculture. As we enter the 5G era, our economy will
broaden with smart application for cities, cars, and so on.
It's not just search engines and social networks. We want to
export these new 5G platforms and services and this underscores
the importance of today's hearing.
Now our country has practiced international technology
policy for at least 230 years. Alexander Hamilton's report on
the subject of manufacturers from 1791 advocated for
modernizing the American economy to break dependence on slavery
and supersede England in manufacturing. We revere Hamilton for
his enlightened contribution on the importance of central
government. Equally, we revere Thomas Jefferson for his
championing of individual freedoms.
Our policy legacy is thus to hold the balance of the Rule
of Law with individual rights and these values should underpin
our approach to Internet governance. The United States is one-
third of the global tech economy and we should shape the
international environment with our values, but we won't have
any credibility if our policy is just about American companies
making money.
We must export a value system that legitimately empowers
and rewards other nations to participate in a free market
economy, to respect the Rule of Law and individual rights, to
limit regulatory distortion, to protect property, and to
improve quality of life. This is how we ensure that our regime
is the most fair, rationale, and humane.
Now a popular misconception is that the Global Data
Protection Regulation or GDPR protects privacy. It does not.
The GDPR is about data regulation, specifically, 173 rules on
data regulation.
Now Europe is the destination of two-thirds of America's
digital goods and services and U.S. companies are now suffering
because of its cost and complexity. Now I live in Copenhagen,
so I can experience this. I can no longer look at the
newspapers, such as the L.A. Times, the Chicago Tribune, the
New York Daily News, the Hartford Courant, or Atlanta Sentinel
and Baltimore Sun.
Additionally, 60 additional newspapers in Illinois,
Indiana, Minnesota, Missouri, Montana, Nebraska, Nevada,
Washington, and Wisconsin are not available. This reduction in
content has reduced visibility for U.S. advertisers and has
shut them out of independent ad exchanges.
Retailers Williams and Sonoma and Pottery Barn no longer
sell in the EU. Game companies from Washington State have shut
down their online communities. A Nevada provider of online IT
services no longer takes European customers. A mobile marketing
platform company with six offices in the United States has
closed its EU operation, and even the website of the
Association of National Advertisers is not available.
Now if we adopted such a measure in the United States, it
would likely violate our freedom of speech as the government
requirements are so onerous that they reduce expression.
Indeed, California's GDPR-inspired legislation should be
preempted federally for this very reason, and the EU Parliament
is using the GDPR as a pretext to torpedo our faithfully
negotiated Privacy Shield Agreement.
These actions violate international law and we need to
challenge them in court.
Now the GDPR is a global standard tool. The EU tried this
before with the 3G GSM and Mobile Standard hoping that we would
get on their platform. We didn't copy them but we leapfrogged
to 4G LTE. Now we need the same strategy with the GDPR, not to
copy but to make a better and different alternative for data
protection, and we can do that by meaningfully empowering
consumers through digital competence education and
incentivizing privacy-enhancing technologies.
I want to applaud Senator Klobuchar for her leadership on
the proposed bill.
In closing, we must walk the talk. For a rationale,
predictable, and consistent framework abroad, we need to start
at home. Therefore, the right policy should be a consistent
framework with same rules for all players, grounded in modern
evidence-based standards of antitrust delivered by the Federal
Trade Commission. This also requires addressing the regulatory
prejudice that has deterred flexible pricing and innovation in
business models and platforms.
For example, the cooperative agreement between Verisign and
U.S. Department of Commerce oddly caps the wholesale price of
dot com domains but allows arbitrage in the secondary market.
Now just as Jefferson had secured the Mediterranean Sea
lanes for free trade in the 19th Century, we have to secure the
information lanes for the free flow of data today, and this is
now our leadership challenge.
[The prepared statement of Dr. Layton follows:]
Prepayed Statement of Roslyn Layton, Ph.D., Visiting Scholar,
American Enterprise Institute
Thank you Chairman Wicker, Ranking Member Schatz, and members the
Committee for the opportunity to testify. Chairman Wicker, you are
understandably informed of international security and policy issues as
chairman of the Helsinki Commission on Security and Cooperation in
Europe. Thank you for leadership and commitment to ensure security and
defend human rights and freedoms in that role.\1\ It reminds me why
Mississippi is important to the digital future, just like Manhattan.
Mississippi with its population of 3 million has an economy as large as
the Nation of Ecuador, which has five times the population.\2\
Mississippi is innovating in digital technology with telemedicine \3\
and precision farming.\4\ While we think about digital communications
today as search engines, social networks, ecoomerce, and digital
content, as we enter the 5G era, our digital economy will be broadened
with smart applications and platforms for health, homes, cities, grids,
cars, and infrastructure. We should expect to export these 5G platforms
and services. This underscores the importance of today's hearing in
getting the policy right. It also demonstrates that every American can
benefit and participate in the Internet economy and that all Americans
have a stake in Internet policy.
---------------------------------------------------------------------------
\1\ Commission on Security and Cooperation in Europe, ``Senator
Roger F. Wicker,'' https://www.csce.gov/senator-roger-f-wicker.
\2\ Mark J. Perry, ``Putting America's Enormous $19.4T Economy into
Perspective by Comparing U.S. State GDPs to Entire Countries,'' May 8,
2018, http://www.aei.org/publication/putting-americas-enormous-19-4t-
economy-into-perspective-by-comparing-us-state-gdps-to-entire-
countries/.
\3\ Morgan Reed, ``The Connected Health Initiative Applauds the
FCC's New `Connected Care Pilot Program,' '' ConnectedHealth, July 11,
2018, https://www.connectedhi.com/blog/2018/7/11/the-connected-health-
initiative-applauds-the-fccs-new-connected-care-pilot-program.
\4\ Office of Roger Wicker, ``Wicker Leaders New Legislation on
Precision Agriculture,'' press release, January 29, 2018, https://
www.wicker.senate.gov/public/index.cfm/weekly-report?ID=
60B6C27C-72F6-4147-9F27-A24DA2E5B86A.
---------------------------------------------------------------------------
The economics of the Internet allow for the participation of many
players. With the evolution to 5G, the next generation mobile standard,
and the Internet of Things, this will only increase. Existing
businesses will converge, and new ones will emerge. Consider how
quickly the U.S. reaped the gains from 4G mobile wireless networks and
its associated technologies, apps, and services. Some $100 billion was
added annually to the Nation's GDP.\5\ The windfall from 5G is
projected to be even greater: The rollout of a 5G network should is
expected to deliver 3 million new jobs and contribute $1.2 trillion to
the U.S. economy.\6\
---------------------------------------------------------------------------
\5\ CTIA, ``How America's 4G Leadership Propelled the U.S.
Economy,'' April 16, 2018, https://www.ctia.org/news/how-americas-4g-
leadership-propelled-the-u-s-economy.
\6\ CTIA, ``Global Race to 5G--Spectrum and Infrastructure Plans
and Priorities,'' April 2018, https://api.ctia.org/wp-content/uploads/
2018/04/Analysys-Mason-Global-Race-To-5G_2018.pdf.
---------------------------------------------------------------------------
Our country has engaged the question of international technology
policy for at least 230 years. Alexander Hamilton's Report on the
Subject of Manufactures in 1791 advocated for modernizing the American
economy to break dependency on slavery and supersede England in
manufacturing.\7\ We revere Hamilton for his many contributions, which
exemplify the importance of a central government. Equally we revere
Thomas Jefferson, the exponent of individual freedoms and limited
government.\8\ As such, the legacy of our policy has been an attempt to
balance the necessary role of a central government with the sovereignty
of the individual. We maintain that balance through the rule of law and
enumerated individual rights. These are values that underpin our
approach to international Internet governance.
---------------------------------------------------------------------------
\7\ Founders Online, ``Introductory Note: Report on Manufactures,''
accessed May 29, 2018, http://founders.archives.gov/documents/Hamilton/
01-10-02-0001-0001.
\8\ Jules Witcover, Party of the People: A History of the
Democrats'' (Random House, November 4, 2003).
---------------------------------------------------------------------------
The U.S. tech economy was $1.6 trillion in 2018, 9.2 percent of
gross domestic product (GDP). The numbers are even more staggering from
an equities perspective; the American tech industry accounts for a
quarter of the value of the U.S. stock market, some $34 trillion.\9\
There are half a million tech companies in the U.S. with 34,000 new
startups in 2017 alone.\10\ Globally, the tech industry topped $4.5
trillion in revenue in 2017 and is expected to reach $4.8 trillion in
2018.\11\ The U.S. is the single-largest tech market in the world and
accounts for 31 percent of the global tech market.\12\
---------------------------------------------------------------------------
\9\ Nasdaq, ``Technology Companies,''
\10\ Cyberstates, ``Data Appendix,'' https://www.cyberstates.org/.
\11\ CompTIA, ``IT Industry Outlook 2018,'' https://
www.comptia.org/resources/it-industry-trends-analysis.
\12\ CompTIA, ``IT Industry Outlook 2018.''
---------------------------------------------------------------------------
As such, it is in the national interest to shape the international
environment by projecting power and securing economic, political, and
strategic goods. But the U.S. won't have any credibility if its
international Internet policy is just about American companies making
money. The U.S. must also export a value system that legitimately
empowers and rewards other nations to participate in a free-market
Internet economy, respects the rule of law and individual rights,
limits regulatory distortion and abuse, protects property, and delivers
measurable improvements in quality of life. This is how we ensure that
our regime is most fair, rational, and humane for global Internet
governance.
Today, I will describe some geopolitical and protectionist efforts
proffered by foreign governments as consumer protection, notably the
General Data Protection Regulation (GDPR), lax enforcement of
intellectual property, and data localization. I will discuss a range of
solutions for the committee to consider.
General Data Protection Regulation (GDPR)
In addition to my role at the American Enterprise Institute, I am
Visiting Research at the Center for Communication, Media and
Information Technologies at Aalborg University in Copenhagen, Denmark.
We run a multidisciplinary research and education program looking at
the impact of technology in society from engineering, economic, legal,
and social perspectives. The GDPR is one of our areas of focus, and I
follow it closely.\13\
---------------------------------------------------------------------------
\13\ European Commission, ``Data Protection: Rules for the
Protection of Personal Data Inside and Outside the EU,'' http://
ec.europa.eu/justice/data-protection/reform/files/regulation_oj
_en.pdf.
---------------------------------------------------------------------------
Europe is the destination for two-thirds of America's digital
exports,\14\ so naturally we should be concerned when it adopts
draconian, misguided regulation. Moreover, the region has fallen
precipitously behind on network investment \15\ by E150.\16\ The 2020
connectivity goals have been pushed out to 2025. Whereas 20 percent of
Americans, some 25 million households, have already adopted some kind
of pre-5G product or service (e.g., Google Home or Amazon Alexia),
Europeans have yet to make this cultural and technological shift.\17\
It makes sense that we should broaden and diversify the market for our
digital goods and services, as EU, if it continued down the current
path, will be increasingly incompatible. At the same point, there is
not a ready market to replace the EU; China wants indigenous
technology. So we need to pursue a strategy that helps the EU and the
rest of the world modernize as well as to open China's market. It is
becoming increasingly difficult for Brussels to maintain the narrative
that its 20-year attempt to regulate its way to growth and
competitiveness is working. More Europeans want prosperity than
protectionism.
---------------------------------------------------------------------------
\14\ United States International Trade Council. Digital Trade in
the U.S. and Global Economies, Part 1. 2013 http://www.usitc.gov/
publications/332/pub4415.pdf
\15\ Roslyn Layton, ``The EU's Broadband Challenge.'' American
Enterprise Institute. February 19, 2014. http://www.aei.org/
publication/the-european-unions-broadband-challenge/
\16\ European Investment Bank. ``Restoring EU Competitiveness.''
2016 http://www.eib.org/attachments/efs/
restoring_eu_competitiveness_en.pdf
\17\ Strand Consult. ``American consumers are already buying 5G
products and services while the EU falls further behind on networks and
innovation.'' Spring 2018. http://www.strand
reports.com/sw8027.asp
---------------------------------------------------------------------------
A popular misconception about the GDPR is that it protects privacy;
it does not. The GDPR is about data protection or more correctly, data
governance.\18\ The word ``privacy'' appears infrequently in the GDPR,
only to refer to ``Privacy by Design'' (Article 25), ``Privacy Impact
Assessment'' (Article 35), the ePrivacy Directive, and the Privacy
Shield regime. Data protection is a technical issue whereas data
privacy is a legal one.\19\
---------------------------------------------------------------------------
\18\ What Is the GDPR?, Evidon (last visited Aug. 25, 2017),
https://www.evidon.com/education-portal/videos/what-is-the-gdpr/.
\19\ David Robinson, Data Privacy vs. Data Protection, IPSwitch
(Jan. 29, 2918), https://blog.ipswitch.com/data-privacy-vs-data-
protection.
---------------------------------------------------------------------------
Harms to consumers, American firms, and competition
Before entering academe, I had a career in digital marketing in
Silicon Valley, where I worked with some 2000 American retailers and
other online companies. In 2010, I was recruited to the European Union
(EU) because of my analytics-based online marketing skills. Meanwhile
Brussels began a systematic campaign to dumb down the online experience
under the guise of ``protecting'' consumers. The ePrivacy Directive
\20\ or so-called ``cookie law'' launched in 2011, costs EU businesses
$2.3 billion annually with no relatable benefit.\21\ It is widely
recognized as a regulatory failure,\22\ detrimental to commerce, and,
indeed, counterproductive to privacy and data protection.\23\
---------------------------------------------------------------------------
\20\ EUR-Lex, ``Directive 2002/58/EC of the European Parliament and
of the Council of 12 July 2002 Concerning the Processing of Personal
Data and the Protection of Privacy in the Electronic Communications
Sector (Directive on Privacy and Electronic Communications),'' July 31,
2002, http://eur-lex.europa.eu/LexUriServ/
LexUriServ.do?uri=CELEX:32002L0058:EN:HTML,
\21\ Daniel Castro and Alan McQuinn, ``The Economic Cost of the
European Union's Cookie Notification Policy,'' Information Technology
and Innovation Foundation, November 6, 2014, https://itif.org/
publications/2014/11/06/economic-cost-european-unions-cookie-
notification-policy.
\22\ Graham Charlton, ``The EU 'cookie law': what has it done for
us?'' Econsultancy. August 27, 2014 https://econsultancy.com/blog/
65366-the-eu-cookie-law-what-has-it-done-for-us
\23\ W. Gregory Voss, ``First the GDPR, Now the Proposed ePrivacy
Regulation,'' Journal of Internet Law 21, no. 1 (July 25, 2017): 3-11,
https://ssrn.com/abstract=3008765.
---------------------------------------------------------------------------
The EU continued promulgating punitive regulation without
performing regulatory impact analyses of the policies, and ignoring, if
not rejecting, the mounting empirical evidence that its approach does
not fulfill the policy goals it promises.\24\ \25\ \26\ \27\ \28\
Indeed, when implementing the GDPR, the EU ignored the advice of its
official research institute on how to create trust in the online
environment,\29\ notably the importance of consumer education and
innovation in privacy-enhancing technologies.\30\ After a decade of
GDPR-type regulations across EU, consumers report only a marginal
increase in trust online. As of 2017 only 22 percent of Europeans shop
outside their own country (a paltry increase of 10 percent in a
decade), suggesting that the European Commission's Digital Single
Market goals are still elusive.\31\ Moreover, only 20 percent of EU
companies are highly digitized.\32\ These are primarily large firms.
Small to medium sized companies invest little to modernize their
business and market to other EU countries.
---------------------------------------------------------------------------
\24\ James Hayes,`` `Cookie Law': A Hostage to Fortune?,''
Engineering & Technology 7, no.8 (2012): 66-69.
\25\ Elizabeth Aguirre et al., ``Unraveling the Personalization
Paradox: The Effect of Information Collection and Trust-Building
Strategies on Online Advertisement Effectiveness'' Journal of Retailing
91, no. 1 (2015): 34-49.
\26\ Ronald Leenes and Eleni Kosta, ``Taming the Cookie Monster
with Dutch Law--a Tale of Regulatory Failure,'' Computer Law & Security
Review 31, no. 3 (2015): 317-35.
\27\ Christina Markou, ``Behavioural Advertising and the New `EU
Cookie Law' as a Victim of Business Resistance and a Lack of Official
Determination'' in Data Protection on the Move (Springer Netherlands,
2016), 213-47.
\28\ Alan McQuinn and Daniel Castro. ``Why Stronger Privacy
Regulations Do Not Spur Increased Internet Use.'' ITIF. July 11, 2018
https://itif.org/publications/2018/07/11/why-stronger-privacy-
regulations-do-not-spur-increased-internet-
use?mc_cid=6ef5636fad&mc_eid=ff7c0376f1
\29\ Layton, Roslyn, How the GDPR Compares to Best Practices for
Privacy, Accountability and Trust (March 31, 2017). https://ssrn.com/
abstract=2944358
\30\ European Union Agency for Network and Information Security.
``Privacy, Accountability and Trust-Challenges and Opportunities.''
February 18, 2011. https://www.enisa.europa.eu/publications/pat-study
\31\ European Commission Report. ``Use of Internet Services'',
2018. http://ec.europa.eu/information_society/newsroom/image/document/
2018-20/3_desi_report_use_of_internet_services_18E
82700-A071-AF2B-16420BCE813AF9F0_52241.pdf
\32\ European Commission Report. ``Integration of Digital
Technology''. 2018. http://ec.euro
pa.eu/information_society/newsroom/image/document/2018-20/
4_desi_report_integration_of_
digital_technology_B61BEB6B-F21D-9DD7-72F1FAA836E36515_52243.pdf
---------------------------------------------------------------------------
There is extensive evidence that shows that a flexible, innovation-
based approach yields software and systems that are better designed to
protect data and privacy and that empower enterprises to operate with
data protection as a competitive parameter.\33\ The International
Association of Privacy Professionals' survey of privacy practices of
800 enterprises around the world found that traditionally less
regulated industries have more advanced privacy practices than highly
regulated industries, which conform only to regulatory
requirements.\34\ Nevertheless the EU has continued its misguided
approach with the GDPR, promulgating 17 invented rights, 35 new
responsibilities for bureaucrats, and 45 specific regulations for
enterprises.
---------------------------------------------------------------------------
\33\ Kenneth A. Bamberger and Deirdre K. Mulligan, Privacy on the
Ground: Driving Corporate Behavior in the United States and Europe
(2015).
\34\ IAPP-EY Annual Privacy Governance Report 2015, IAPP (2015),
https://iapp.org/resources/article/iapp-ey-annual-privacy-governance-
report-2015-2/.
---------------------------------------------------------------------------
Following is a snapshot of the American media, retailers, software,
and other companies that are no longer accessible in the EU since May
25, when the GDPR went into effect. This is by no means a comprehensive
review. Notably people experienced their personal inboxes being flooded
with GDPR compliance e-mails or consent requests attempt to comply with
the GDPR, but apparently many of these communications are illegal under
the GDPR.\35\
---------------------------------------------------------------------------
\35\ Alex Hern, Most GDPR E-mails Unnecessary and Some Illegal, Say
Experts, The Guardian (May 21, 2018), https://www.theguardian.com/
technology/2018/may/21/gdpr-e-mails-mostly-unnecessary-and-in-some-
cases-illegal-say-experts.
---------------------------------------------------------------------------
There is no access to Tronc Media, whose flagships newspapers
include the Los Angeles Times, Chicago Tribune, New York Daily News,
Hartford Courant (America's longest running newspaper since 1764),
Orlando Sentinel, and the Baltimore Sun.\36\ Access is not available to
more than 60 newspapers of Lee Enterprises covering news across 20
states including Illinois, Indiana, Minnesota, Missouri, Montana,
Nebraska, Nevada, Washington, and Wisconsin.\37\
---------------------------------------------------------------------------
\36\ Alanna Petroff. CNN Money. ``LA Times takes down website in
Europe as privacy rules bite.'' May 25, 2018. https://money.cnn.com/
2018/05/25/media/gdpr-news-websites-la-times-tronc/index.html
\37\ Roslyn Layton (@Roslyn Layton), ``Alas, from the EU I can't
read @CapTimes and 60 other newspapers across 20 stats in the Lee
Enterprises group because of the #GDPR. Freedom and First Amendment
R.I.P.,'' July 26, 2018, 9:47 a.m., https://twitter.com/RoslynLayton/
status/1022508758252113920.
---------------------------------------------------------------------------
Blocked media is not only a problem for the one million Americans
who live in the EU and can no longer read news and information about
their hometowns, but for Europeans who wish to learn more about the
U.S. from direct sources rather than the state-owned media, which
dominate the press and broadcasting in most EU countries. To access the
internet, Europeans must pay a government media license fee on top of
their broadband subscription. The penalty for failing to pay is
imprisonment.\38\
---------------------------------------------------------------------------
\38\ Roslyn Layton and Michael Horney, ``Innovation, Investment,
and Competition in Broadband and the Impact on America's Digital
Economy,'' Mercatus Center, August 12, 2014, 10, https://
www.mercatus.org/publication/innovation-investment-and-competition-
broadband-and-impact-america-s-digital-economy.
---------------------------------------------------------------------------
It is not just the American media oulets which are down but their
advertisers. Given the scope of Google's advertising platform and its
affiliates on syndicated networks, its compliance to the GDPR has
caused ripple effects in ancillary markets. Independent ad changes
noted prices plummeting 20 to 40 percent.\39\ Some advertisers report
being shut out from exchanges.\40\ The GDPR's complex and arcane
designations for ``controllers'' and ``processors'' can ensnare third
party chip makers, component suppliers, and software vendors which have
never interfaced with end users, as European courts have ruled that any
part of the ecosystem could be liable for data breaches.\41\
---------------------------------------------------------------------------
\39\ Jessica Davies, `The Google Data Protection Regulation': GDPR
is Strafing Ad Sellers, Digiday (June 4, 2018), https://digiday.com/
media/google-data-protection-regulation-gdpr-stra
fing-ad-sellers/.
\40\ Catherine Armitage. World Federation of Advertisers. July 10,
2018. https://www.wfanet
.org/news-centre/life-after-gdpr-what-next-for-the-advertising-
industry/
\41\ https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/
?uri=CELEX:62016CJ0210&qid
=1531145885864&from=EN
---------------------------------------------------------------------------
Many American retailers, game companies, and service providers no
longer sell in the EU. The websites of Williams-Sonoma and Pottery Barn
are dark.\42\ The online experience of scores of other American
retailers is now polluted with pop-ups and disclosures, prompting many
customers to click away. Verve, a leading mobile marketing platform
with offices in 6 U.S. cities, closed its European operation in advance
of GDPR, impacting 15 EU employees.\43\ Valve, an award-winning video
game maker company in Bellevue, Washington, shut down an entire game
community rather than invest in GDPR compliance,\44\ similalry for Uber
Entertainment in nearby Kirkland, WA, which shut down one of its most
popular games entirely after a 6 year run because upgrading the
platform to GDPR was too expensive.\45\ California-based Gravity
Interactive no longer offers games in the EU and refunded its European
customers.\46\ The Las Vegas-based Brent Ozar Unlimited offering a
range of information technology and software support services stopped
serving the EU.\47\ Even the website of the Association of National
Advertisers is not available.\48\
---------------------------------------------------------------------------
\42\ Roslyn Layton (@Roslyn Layton), ``More #GDPR casualties.
@WilliamsSonoma group no longer selling in EU including @potterybarn
@PotteryBarnKids @potterybarnteen etc. I can't even access recipes.
@caprivacyorg do you really want to shut down this great SF company
with your misguided approach?,'' July 9, 2018, 3:10 a.m., https://
twitter.com/RoslynLayton/status/1016248093547945984.
\43\ Ronan Shields. ``Verve to focus on U.S. growth as it plans
closure of European offices ahead of GDPR.'' April 18, 2018. https://
www.thedrum.com/news/2018/04/18/verve-focus-us-growth-it-plans-closure-
european-offices-ahead-gdpr
\44\ Steam, ``Super Monday Night Combat,'' https://
steamcommunity.com/app/104700/all
news/.
\45\ Owen Good. ``Super Monday Night Combat will close down, citing
EU's new digital privacy law.'' Polygon. April 28, 2018. https://
www.polygon.com/2018/4/28/17295498/super-monday-night-combat-shutting-
down-gdpr
\46\ Warportal, ``Important Notice Regarding European Region
Access,'' http://blog.warp
portal.com/?p=10892.
\47\ Brent Ozar, ``GDPR: Why We Stopped Selling Stuff to Europe,''
December 18, 2017, https://www.brentozar.com/archive/2017/12/gdpr-
stopped-selling-stuff-europe/.
\48\ Roslyn Layton (@Roslyn Layton), ``Blocked again by #GDPR.
Thanks a lot @JanAlbrecht @EU_EDPS. Who needs to use the Internet to
read blogs and get information anyway? Government censorship parading
as privacy and data protection. Sorry @ANAGovRel,'' June 7, 2018, 4:30
a.m., https://twitter.com/RoslynLayton/status/1004671815426478081.
---------------------------------------------------------------------------
If we adopted such a measure in the US, it would likely violate the
freedom of speech, as the government requirements are so onerous that
they limit expression. As such, we should be weary of California's
privacy effort, which bills itself as an American version of the
GDPR.\49\ Indeed the GDPR's asserted jurisidiction outside the EU may
be illegal.\50\
---------------------------------------------------------------------------
\49\ Roslyn Layton, ``Privacy Regulation Insanity: Making the Same
Rules and Expecting a Different Outcome,'' AEIdeas, June 21, 2018,
http://www.aei.org/publication/privacy-regulation-insanity-making-the-
same-rules-and-expecting-a-different-outcome/.
\50\ Kurt Wimmer. Free Expression and Privacy: Can New European
Laws Reach U.S. Publishers? Media Institute. November 9, 2017 https://
www.mediainstitute.org/2017/11/09/free-expression-and-privacy-can-new-
european-laws-reach-u-s-publishers/
---------------------------------------------------------------------------
To comply with the GDPR, firms of 500 employees or more will likley
have to spend between $1 and $10 million.\51\ With over 19,000 \52\
U.S. firms of this size, total GDPR compliance costs for this group
could reach $150 billion, twice the U.S. spend on network investment
\53\ or one-third of the annual ecommerce revenue in the USA.\54\ Hosuk
Lee-Makiyama calculates that the GDPR's requirements on cross-border
trade flows will increase prices, amounting to a direct welfare loss of
E260 per European citizen.\55\ The net effect is that those companies
that can afford to will comply; the rest will exit. Hence the GDPR
becomes a barrier to market entry, punishing small firms, rewarding the
largest players, and enuring regulators into a codependent relationship
with the firms they regulate. This is a perverse outcome for a
regulation promised to level the playing field on data protection.
---------------------------------------------------------------------------
\51\ PricewaterhouseCoopers, ``GDPR Compliance Top Data Protection
Priority for 92 percent of U.S. Organizations in 2017, According to PwC
Survey,'' January 23, 2017, https://www
.pwc.com/us/en/press-releases/2017/pwc-gdpr-compliance-press-
release.html.
\52\ U.S. Census Bureau, ``2015 SUSB Annual Data Tables by
Establishment Industry,'' January 2018, https://www.pwc.com/us/en/
press-releases/2017/pwc-gdpr-compliance-press-release.html.
\53\ Jonathan Spalter, ``Broadband CapEx Investment Looking Up in
2017,'' USTelecom, July 25, 2018, https://www.ustelecom.org/blog/
broadband-capex-investment-looking-2017.
\54\ US Census Bureau, ``Quarterly Retail E-Commerce Sales 1st
Quarter 2018,'' May 17, 2018, https://www.census.gov/retail/mrts/www/
data/pdf/ec_current.pdf.
\55\ Lee-Makiyama, Hosuk, ``The Political Economy of Data: EU
Privacy Regulation and the International Redistribution of Its Costs,''
in Protection of Information and the Right to Privacy-A New
Equilibrium? (Springer International Publishing, 2014), 85-94. This
methodology is expanded in Erik Van der Marel et al., ``A Methodology
to Estimate the Costs of Data Regulations,'' International Economics
146 (2016): 12-39.
---------------------------------------------------------------------------
Moreover, the GDPR is fundamentally incompatible with Big Data,
artificial intelligence, and machine learning with its specific
regulation for purpose specification, data minimization, automated
decisions and special categories.\56\ Some of the most important
scientific advances have been the result of processing disparate sets
of information in inventive ways, ways that neither subjects nor
controllers anticipated, let alone requested. Consider the definitive
study on whether the use of mobile phones causes brain cancer.\57\ The
Danish Cancer Society analyzed the entire population of Denmark born
since 1925 by processing social security numbers, mobile phone numbers,
and the National Cancer Registry which records every incidence of
cancer by social security number. The study is the most comprehensive
investigation proving that the use of mobile phones is not correlated
with brain cancer.
---------------------------------------------------------------------------
\56\ Tal Z. Zarsky, ``Incompatible: The GDPR in the Age of Big
Data,'' Seton Hall Law Review 47, no. 4 (2017): 2.
\57\ Use of mobile phones and risk of brain tumours: update of
Danish cohort study. BMJ 2011; 343 doi: https://doi.org/10.1136/
bmj.d6387 (Published 20 October 2011)
---------------------------------------------------------------------------
Security concerns have also emerged. As AEI's Internet governance
expert Shane Tews declares, ``The right to be forgotten is pitted
against the right to be informed.'' \58\ A key example is WHOIS, the
query and response protocol use to identify those who register domain
names is threatened to be masked under the GDPR. Law enforcement,
cybersecurity professionals and researchers, and trademark and
intellectual property rights holders have a vital interest in the
transparency of WHOIS.\59\ ``The publicly available data that is used
to inform threat intelligence networks, find bad actors, and block them
from accessing networks will no longer be available under the GDPR,''
she warns.\60\ The situation harkens back to a key fallacy of so-called
privacy activists who attempted to block the rollout of caller ID
because it violated the privacy rights of intrusive callers.\61\ Today
we agree that the receivers right to know who is calling is prioritized
over the caller.
---------------------------------------------------------------------------
\58\ Shane Tews, ``Privacy and Europe's data protection law:
Problems and implications for the US''. AEI.org May 8, 2018. http://
www.aei.org/publication/privacy-and-europes-data-protection-law-
problems-and-implications-for-the-us/
\59\ Shane Tews. ''How European data protection law is upending the
Domain Name System.'' American Enterprise Institute. February 26, 2018.
https://www.aei.org/publication/how-european-data-protection-law-is-
upending-the-domain-name-system/
\60\ Supra Tews May 2018
\61\ See Justin ``Gus'' Hurwitz and Jamil N. Jaffer, ``Modern
Privacy Advocacy: An Approach at War with Privacy Itself?, Regulatory
Transparency Project of the Federalist Society,'' June 12, 2018,
https://regproject.org/paper/modern-privacy-advocacy-approach-war-
privacy/.
---------------------------------------------------------------------------
Global jurisdiction, selective enforcement
In a press conference about the GDPR,\62\ Jan Phillip Albrecht,\63\
Green Party parliamentarian and ``father of the GDPR,'' assured that
GDPR investigations would not focus on small to medium enterprises but
instead ``will concentrate on the bigger ones that pose a threat to
many consumers.'' He noted that firms ``already for quite a time now
are under suspicion of not complying with European data protection
rules'' and that they ``have been on their screen for years [and] will
be the first to be looked at.'' He indicated that it could be two years
before cases are resolved given the process for investigation,
adjudication, and appeal. Industry observers suggest that U.S. data
brokers (e.g., Axciom, Datalogix, and Equifax) will also be targeted,
as well as the auto, pharma, and health care industries.\64\
---------------------------------------------------------------------------
\62\ European Parliament, Press Conference by Jan Philipp Albrecht,
last visited June 24, 2018, https://multimedia.europarl.europa.eu/en/
albrecht-general-data-protection-regulation_I155149-A_ra.
\63\ Jan Philipp Albrecht, Auf zu neuen Ufern: Minister fur
Digitales und Draußen, (Mar. 3, 2018), https://
www.janalbrecht.eu/2018/03/auf-zu-neuen-ufern/ (Albrecht noted that he
will not run for reelection in the European Parliament in 2018 but take
a position as Minister of Digital and Outdoors in the German province
of Schleswig-Holstein where he hopes to shape climate and agricultural
policy and EU relations).
\64\ Laurens Cerulus and Mark Scott, ``Who Stands to Lose the Most
from Europe's New Privacy Rules,'' Politico, May 23, 2018, https://
www.politico.eu/article/the-gdpr-hit-list-who-stands-to-lose-from-
europes-new-privacy-rules-facebook-google-data-protection/.
---------------------------------------------------------------------------
If smaller companies are trying in good faith to comply with the
GDPR, it would be disproportionate to sanction them, Albrecht said,
noting that data protection authorities (DPAs) would more likely assist
them to become compliant. While the GDPR automatically supersedes
national law, only 4 of the 28-member states (Austria, Germany,
Slovakia, and Sweden) have completed the formal process to update their
local laws to align with the GDPR. If one country rules in a case in
its own court, it can be overruled by a majority of the EU nations.
Albrecht argues that enforcement should prioritize the companies
that have been on regulators' radar. But if the regulators already know
which companies are causing problems, why require every data processor
that serves Europeans to comply with preventative regulations? It could
be part of a ``make-work'' strategy to keep Europe's 62 privacy and
data protection authorities in business and create jobs for some 75,000
privacy professionals \65\ as data protection officers in firms--
another GDPR requirement.
---------------------------------------------------------------------------
\65\ Rita Heimes and Sam Pfeifle, Study: GDPR's Global Reach to
Require at Least 75,000 DPO's Worldwide, Int'l Assoc. of Privacy
Professionals, https://iapp.org/news/a/study-gdprs-global-reach-to-
require-at-least-75000-dpos-worldwide/.
---------------------------------------------------------------------------
Interestingly, Albrecht defends selective enforcement. While the
GDPR's stated goal is to make a common standard for every firm, the
real goal is to discipline large American firms. This is enabled by the
GDPR's enumerated rights of representation, judicial remedy, and
compensation, all of which form the basis for regulation by class
action. Activists are encouraged to create nonprofit organizations,\66\
lodge complaints,\67\ and collect damages on behalf of users.\68\
Importantly, GDPR complaints cover not just actual injury or harm--
which would be required for a class action in U.S. Federal court--but
failure to comply with regulation, even if no harm results. While class
actions can offer consumers a convenient, effective remedy for harm,
violation, and noncompliance, they can also be abused by unscrupulous
lawyers and activists seeking to bypass democratic policymaking
procedures.\69\ By legitimizing regulation by class action in the GDPR,
the EU creates an incentive for legal abuse. Historically, Europe has
largely eschewed ``US-style'' class actions, noting that they
disproportionately reward lawyers over consumers.\70\ However, policy
entrepreneurs have engineered the GDPR so that privacy activists can
bring cases without overcoming legal barriers of standing and
jurisdiction--safeguards that help preclude the abuse of the legal
system for private gain.
---------------------------------------------------------------------------
\66\ ``The Right of Data Subjects to Mandate a Not-for-Profit Body,
Organisation, or Association,'' GDPR Recital 142.
\67\ ``The Right of Data Subjects to Mandate a Not-for-Profit Body,
Organisation, or Association,'' GDPR Recital 141.
\68\ ``The Right of Data Subjects to Mandate a Not-for-Profit Body,
Organisation, or Association,'' GDPR Recital 143.
\69\ Martin H. Redish, Wholesale Justice: Constitutional Democracy
and the Problem of the Modern Class Action, Northwestern University,
2009.
\70\ Redish, Wholesale Justice, 32.
---------------------------------------------------------------------------
Notably Albrecht, European Commission representative Paul Nemitz,
and American nonprofit Electronic Privacy Information Center (EPIC) all
sit on the board of None of Your Business,\71\ a nonprofit founded
under the auspices of the GDPR by Austrian privacy activist Max Schrems
to bring complaints against American firms. Just seven hours after the
GDPR came into effect, it filed complaints against Google and Facebook
demanding $8.8 billion in damages.\72\
---------------------------------------------------------------------------
\71\ Noyb, ``Executive Board,'' https://noyb.eu/team.
\72\ Layton, ``Privacy Regulation Insanity.''
---------------------------------------------------------------------------
Schrems' 2013 lawsuit against Facebook single-handedly torpedoed
the 15 year old, transatlantic Safe Harbor agreement that processed the
data of 4,400 firms, some $250 billion annually.\73\ Indeed Schrems'
lawsuits are referenced in the brinkmanship of European Parliament, a
resolution to end the faithfully negotiated Privacy Shield by September
1, 2018 if the U.S. does not submit to its demands.\74\ Many privacy
activists are fueled by post-Snowden animus for the U.S. Government and
could organize a GDPR complaint against a U.S. Federal agency with data
from European subjects. We already see the automation of complaints--
using technology to spam data protection authorities and firms with
thousands, if not millions, of complaints at once.\75\ Indeed
government agencies may be the some of the most vulnerable entities
under the GDPR.
---------------------------------------------------------------------------
\73\ Roslyn Layton, ``Europe's Protectionist Privacy Advocates,''
Wall Street Journal, March 9, 2016, https://www.wsj.com/articles/
europes-protectionist-privacy-advocates-1457566423.
\74\ European Parliament, ``Motion for a Resolution,'' June 26,
2018, http://www.europarl
.europa.eu/sides/getDoc.do?type=MOTION&reference=B8-2018-
0305&language=EN.
\75\ Privateidentitycontrol.com, ``Retrieve the Right to Your Own
Identity. Simple and Smooth!,'' https://
www.privateidentitycontrol.com/.
---------------------------------------------------------------------------
In addition to these concerns, there are legal and administrative
issues. The GDPR assumes that regulatory authorities have more
information than consumers and firms and therefore know better how to
order transactions in the marketplace.\76\ All the same, the GDPR
imposes massive new responsibility on regulators without a concurrent
increase in training or funding.\77\ EU data supervisors must wear many
hats, including ``ombudsman, auditor, consultant, educator, policy
adviser, negotiator, and enforcer.'' \78\ Furthermore, the GDPR widens
the gap between the high expectations for data protection and the low
level of skills possessed by data supervisors charged with its
implementation.\79\ There are certainly many talented individuals among
these ranks, but the mastery of information communication technologies
varies considerably among these professionals, especially as each
nation's data protection authority is constituted differently.
---------------------------------------------------------------------------
\76\ See generally F.A. Hayek, Economics and Knowledge (1937); F.A.
Hayek, The Use of Knowledge in Society (1945).
\77\ Douglas Busvine, Julia Firoretti, and Mathieu Rosemain,
``European Regulators: We're Not Ready for New Privacy Law,'' Reuters,
May 8, 2018, https://www.reuters.com/article/us-europe-privacy-
analysis/european-regulators-were-not-ready-for-new-privacy-law-
idUSKBN1I915X.
\78\ Colin J. Bennett and Charles Raab, The Governance of Privacy:
Policy Instruments in Global Perspective (2006).
\79\ Charles D. Raab and Ivan Szekely, Data Protection Authorities
and Information Technology, Computer L. & Sec. Rev. (forthcoming),
https://ssrn.com/abstract=2994898.
---------------------------------------------------------------------------
While the GDPR's purported goal is to ensure ``fundamental
rights,'' relatively few European users are aware of it. A UK survey
found that 34 percent of respondents recognized the law, and even fewer
knew what it covered.\80\ Europeans' dissatisfaction with the EU is
well documented.\81\ Indeed, voter turnout in European Parliament
elections dwindled from 62 percent in 1979 to just 42 percent in
2014.\82\ This environment is conducive for the collective action \83\
of organized special interests to win over the diffuse majority.
Essentially privacy advocates have effectively forced citizens' consent
to heavy-handed data regulation in spite of public opinion,\84\ which
seems to favor a more nuanced approach to privacy and data protection
over the sledgehammer of the GDPR.
---------------------------------------------------------------------------
\80\ Kirsty Cooke, ``Kantar--Data Shows Awareness of GDPR Is Low
amongst Consumers,'' March 27, 2018, https://uk.kantar.com/public-
opinion/policy/2018/data-shows-awareness-of-gdpr-is-low-amongst-
consumers/.
\81\ ``Europe's Pressure Points,'' AEI, January 17, 2017, http://
www.aei.org/feature/europes-pressure-points/.
\82\ ``Turnout 2014--European Parliament,'' European Parliament,
accessed July 27, 2018, http://www.europarl.europa.eu/elections2014-
results/en/turnout.html.
\83\ Mancur Olson, The Logic of Collective Action. Harvard
University Press, January 1971, http://www.hup.harvard.edu/
catalog.php?isbn=9780674537514.
\84\ Roslyn Layton, ``How the GDPR Compares to Best Practices for
Privacy, Accountability and Trust,'' SSRN Scholarly Paper March 31,
2017, https://papers.ssrn.com/abstract=2944358.
---------------------------------------------------------------------------
Conflicting visions of rights and freedoms
Aside from these legal quagmires, the U.S. should not adopt the
EU's approach because our notions of privacy come from fundamentally
different perspectives. America was founded on the idea that human
beings are born with natural rights, such as the rights to life and
liberty. These rights are inviolable, God-given, and independent on the
laws and customs of the country and, thus, cannot be repealed or
restrained by human laws. Natural rights make no demands on others
except that they respect those rights. This has been codified in our
Constitution and confirmed with over two centuries of case law. Natural
rights should be distinguished from human rights, which are moral
principles or norms to describe standards of human behavior.
The EU approach, which only came into being in this century, is
rather a Johnny-come-lately with the concept of privacy rights bestowed
by government and a legal system, and thus can be modified, repealed,
and restrained by government. The GDPR, a legal or government-granted
right, makes specific demands of others (e.g., demanding how data
processors must govern data).
The main authority for privacy enforcement in the U.S. is 15 USC
Sec. 45, which charges the Federal Trade Commission (FTC) with
preventing ``unfair methods of competition in or affecting commerce and
unfair or deceptive acts or practices in or affecting commerce.'' \85\
The FTC took up some 200 cases in 2017 alone.\86\ In matters of
privacy, the FTC's role is to enforce privacy promises made in the
marketplace. Whereas the GDPR assumes that any data collection is
suspect, the FTC focuses its enforcement efforts on sensitive
information that should be protected against unwarranted disclosure.
This helps avoid imposing costly and draconian compliance mandates on
entities that are not a priori threats to personal privacy, such as
personal blogs, nonprofit organizations, or informational websites. The
FTC's approach seeks to allocate scarce regulatory resources to prevent
the greatest threats to online privacy. To be sure, if a small entity
behaves in an unfair or deceptive way, it can be prosecuted, but the
FTC does not assume that every entity wants to harm online users.
Additional laws form the foundation on which the FTC carries out this
charge including the Privacy Act of 1974,\87\ the Gramm-Leach-Bliley
Act,\88\ the Fair Credit Reporting Act,\89\ and the Children's Online
Privacy Protection Act.\90\
---------------------------------------------------------------------------
\85\ 15 USC Sec. 45 (2012).
\86\ Federal Trade Commission, ``Privacy & Data Security Update:
2017,'' January 2017-December 2017, https://www.ftc.gov/system/files/
documents/reports/privacy-data-security-update-
2017-overview-commissions-enforcement-policy-initiatives-consumer/
privacy_and_data_security
_update_2017.pdf.
\87\ 5 USC Sec. 552a.
\88\ 15 USC Sec. Sec. 6801-6809.
\89\ 15 USC Sec. 1681 et seq.
\90\ 15 USC Sec. Sec. 6501-6506.
---------------------------------------------------------------------------
The current vogue of normative models for data protection such as
the GDPR demonstrate the danger of ``privacy overreach,'' in which the
drive to protect privacy becomes absolute, lacks balance with other
rights, and unwittingly brings worse outcomes for privacy and data
protection.\91\ The pace of privacy and data protection law is
significantly faster than other laws, leading one scholar to suggest
that it threatens to upend the balance with other fundamental
rights.\92\
---------------------------------------------------------------------------
\91\ Supra Hurwitz
\92\ See Maja Brkan, The Unstoppable Expansion of the EU
Fundamental Right to Data Protection, Maastricht Journal of European
and Comparative Law 23, no. 5 (2016): 23, http://journals.sagepub.com/
doi/abs/10.1177/1023263X1602300505?journalCode=maaa.
---------------------------------------------------------------------------
The principle of rational, limited government protects us against
the Kafkaesque bureaucratization of regulation in which government
agencies enshrine themselves in power in the name of protecting
citizens. Totalitarian regimes are built on the premise that power must
be increasingly centralized to ensure individual freedom. Every senator
on the dais knows what it means to be responsible to the people. Both
sides of the aisle and both houses of this Congress care deeply about
the issues of privacy and data protection and have attempted to address
them in a thoughtful way, respecting the rule of law and individual
freedoms, notably Sen. Klobuchar (D-MN) with her bill.\93\
---------------------------------------------------------------------------
\93\ Social Media Privacy Protection and Consumer Rights Act of
2018, https://www.congress
.gov/bill/115th-congress/senate-bill/2728/text.
---------------------------------------------------------------------------
Indeed, there are conflicting visions within the EU itself about
which elements of data protection are valuable. A study of Polish
university students' monetary valuation of specific GDPR provisions
using stated preference discrete choice experiments highlights the
enormous gap between research and policy.\94\ Researchers estimate that
users are willing to pay =6.5/month for a subset of GDPR provisions,
notably =1.4/month for erasure and =0.80/month not to be profiled.
Interestingly while data portability is valued by policymakers, it was
not valued by students. The study also suggests that users could value
data protection differently at different points in time and depending
on the application used.
---------------------------------------------------------------------------
\94\ Sabolewski, Maciej and Palinski Michal. How much consumers
value on-line privacy? Welfare assessment of new data protection
regulation (GDPR). International Telecommunications Society Conference,
Passau. July 31, 2017
---------------------------------------------------------------------------
If users are willing to pay for specific data protection services,
why not allow companies to charge for such services or align their
business models based upon their specific consumer preferences? Instead
the GPDR increases the cost across the board without meaningfully
addressing individual preferences. By requiring all companies to
implement such rules, the EU reduces competitive parameters by forcing
companies to evolve when the market would otherwise make them obsolete.
Informed policy would use randomized controlled trials to find which
set of preferences is most valued and efficient. Simply put, the 17
enumerated ``rights'' represents the wish list of activists, not the
evidenced-based request of citizens.
Challenging the GDPR as an Illegal Trade Barrier
We should recognize the GDPR for what it is--a standards war--and
make the appropriate response. For years Europe has fallen behind in
the digital economy. It continues to watch the US, and increasingly
China, capture the world market for Internet innovation and revenue. So
rather than compete on making better Internet products and services,
the EU competes on regulatory standards. While the EU claims that the
GDPR regulates data processing for ``mankind,'' its motives are
geopolitical, not humanitarian.\95\ While the GDPR's supporters claim
its benefit for ``everyone'', only a select few were involved in its
development. Non-Europeans were never consulted on this legislation,
nor were they able to vote on its passage. Moreover, the European
Parliament didn't consult with global institutions or multistakeholder
group before making the GDPR.
---------------------------------------------------------------------------
\95\ GDPR Paragraph 4
---------------------------------------------------------------------------
The EU made a similar gambit for world dominance in mobile
standards by forcing the adoption of 3G/GSM, hoping to trounce the
code-division multiple access (CDMA) platform that American operators
had invested in. For a time, the strategy gave the European mobile
industry (including its six phone manufacturers) a leg up, but the U.S.
jumped ahead to 4G and became the world leader in mobile. We should not
copy the GDPR but rather leapfrog it with a better approach to data
protection.\96\
---------------------------------------------------------------------------
\96\ Roslyn Layton, ``Four Ways the U.S. Can Leapfrog the EU on
Online Privacy,'' AEIdeas, May 22, 2018, http://www.aei.org/
publication/four-ways-the-us-can-leapfrog-the-eu-on-online-privacy/.
---------------------------------------------------------------------------
The EU's GDPR is a form of mercantilism, an economic policy
promoting government regulation of the economy to augment state power
at the expense of rival nations. It was widely practiced in Europe from
the 16-18th century and led to colonial expansion as well as war.
Mercantilism is the opposite of the American system, the classic
political economy.\97\ The GDPR likely violates the World Trade
Organization and the Information Technology Agreement and should be
challenged as such.\98\
---------------------------------------------------------------------------
\97\ Lars Magnusson, Mercantilism: The Shaping of an Economic
Language. Routledge, 2015.
\98\ Julie A. Hedlund and Robert D. Atkinson. ``The Rise of the New
Mercantilists: Unfair Trade Practices in the Innovation Economy.''
ITIF, June 2007. http://www.itif.org/files/ITMer
cantilism.pdf
---------------------------------------------------------------------------
Based on the scientific evidence, the keys to improving trust
online are consumer education and incentives for innovation in privacy
enhancing technologies. These topics have little to no mention in the
GDPR and represent the path for the U.S. to develop a superior
approach.
Leapfrogging the GDPR
Consumer Education
While the GDPR claims to empower people, it offers nothing in the
way to empower people to educate themselves about how to engage online
responsibly. This is likely on purpose because regulatory advocates
realize that if people were educated and empowered, they could make
their own decisions about how to engage with platforms and would not
require government supervision on their online activities.
The GDPR perpetuates a fallacy that making consent more explicit
makes consumers more informed. It is like speaking more loudly to a
person who speaks another language in the hope that she will better
understand. The GDPR requires enterprises to make consent ever more
detailed, burdensome and granular without increasing the user's
knowledge of the transaction. This creates an increasing chasm between
consumer empowerment and bureaucratic control.
Public choice theory also suggests that the EU data supervisors'
preferences are not necessarily aligned with the ``public interest,''
what is best for European welfare in the long run. Increasing user
knowledge and the quality of data protection technology could
legitimately make people better off, but it could also render
regulators less important. While data supervisors will not necessarily
reject policies that improve user knowledge and technology design, it
is in their interest to promote inputs that increase their own
resources and legitimacy in conducting compliance and adjudication.
As my research details, the EU's official statistics, the
Eurobarometer, notes that more than half of all Europeans fail to
practice basic privacy-enhancing behaviors.\99\ This situation is ripe
for improvement and represents a classic example of how consumer
education can improve outcomes better, more quickly, and at a lower
cost than regulation. Indeed, the first principle of consumer education
in data protection, buyer beware, is the first principle for how
citizens should protect themselves in cyberthreats in Michael
Chertoff's new book on cybersecurity: ``Be mindful of what data you
transmit and what you connect to your own network.'' \100\ He also
recommends practicing cyber hygiene, taking advantage of layered
cybersecurity technology, and to outsmart scams with a phone call.
Consumers need to practice the same kind of vigilance and personal
responsibility in cybersecurity as they do in the data protection
domain. Outsourcing the job to bureaucrats will not cut it.
---------------------------------------------------------------------------
\99\ See Roslyn Layton, How the GDPR Compares to Best Practices for
Privacy, Accountability, and Trust, at 14 (Mar. 31, 2018), https://
papers.ssrn.com/sol3/papers.cfm?abstract_id=2944358.
\100\ Michael Chertoff. Exploding Data: Reclaiming Our Cyber
Security in the Digital Age. Atlantic Monthly Press, 2018.
---------------------------------------------------------------------------
Several private and public organizations have outlined the role of
consumer education in online privacy more than a decade ago, but these
assets were purposely ignored by the European Parliament in crafting
the legislation. Notably, the Organisation for Economic Co-operation
and Development (OECD) published a study on Consumer Education for
Digital Competence.\101\ Key learning points include:
---------------------------------------------------------------------------
\101\ Organisation for Economic Co-operation and Development,
``Consumer Education Policy Recommendations of the OECD'S Committee on
Consumer Policy,'' 2009, http://www.oecd.org/sti/consumer/44110333.pdf.
Linking the concept of digital competence with critical
---------------------------------------------------------------------------
thinking on technology and the media;
Educating to provide a basis for developing an understanding
of the structures and conceptual relationships understanding
digital media (e.g., functioning of online market, e-commerce
marketing techniques, and user tools);
Learning the how and why of protecting personal information
when using digital media;
Using media to promote the education of digital competence
in compelling ways (e.g., games, videos, blogs, and virtual
worlds);
Age-appropriate education;
Implementing teacher training; and
Strengthening multi-stakeholder cooperation to create
educational partnerships.
The OECD also published a book to describe prevailing consumer
education practices across the member nations, including the
institutional frameworks and policy evaluation tools.\102\ For example,
in the U.S.., the ``Teaching Privacy Curriculum'' by Serge Egelman et
al., offers interactive instruction on 10 principles of online privacy
over three weeks in a university setting, a method which has also
proved effective to educate and empower users to manage their
privacy.\103\
---------------------------------------------------------------------------
\102\ Organisation for Economic Co-operation and Development,
``Promoting Consumer Education: Trends, Policies and Good Practices--
OECD,'' March 2009, http://www.oecd.org/sti/consumer/
promotingconsumereducationtrendspoliciesandgoodpractices.htm#howto.
\103\ Serge Egelman et al., ``The Teaching Privacy Curriculum,''
2016, 591-96.
---------------------------------------------------------------------------
Innovation in Privacy-Enhancing Technology
The second area with only limited discussion in the GDPR is the
role of privacy-enhancing technology. In its report ``Privacy Enhancing
Technologies: Evolution and State of the Art,'' the European Union
Agency for Network Information and Security (ENISA, now called the
Cybersecurity Agency) describes privacy-enhancing technologies (PETs)
as ``a system of ICT measures protecting informational privacy by
eliminating or minimizing personal data thereby preventing unnecessary
or unwanted processing of personal data, without the loss of the
functionality of the information system.'' \104\ The ENISA report
describes a wealth of technologies, but the GDPR only mentions two:
encryption/pseudonymisation and data minimization.
---------------------------------------------------------------------------
\104\ European Union Agency for Network and Information Security,
``Privacy Enhancing Technologies: Evolution and State of the Art--
ENISA,'' March 9, 2017, https://www.enisa.europa.eu/publications/pets-
evolution-and-state-of-the-art.
---------------------------------------------------------------------------
ENISA's related report ``Privacy and Data Protection by Design''
explains privacy enhancing technologies including not only encryption
but also protocols for anonymous communications, attribute-based
credentials, and private search of databases in addition to a range of
strategies of multiple practices that firms can employ.\105\ It
describes a large body of literature on privacy by design but that its
implementation is weak and scattered. Indeed, privacy and data
protection features are relatively new issues for engineers, designers,
and product developers when implementing the desired functionality. To
address this, ENISA has stewarded the discussion on how to develop a
repository of such technologies.
---------------------------------------------------------------------------
\105\ European Union Agency for Network and Information Security,
``Privacy and Data Protection by Design--ENISA,'' January 12, 2015,
https://www.enisa.europa.eu/publications/privacy-and-data-protection-
by-design.
---------------------------------------------------------------------------
Consider how technology and innovation could create better outcomes
that prescriptive regulation. The GDPR has extensive reporting,
auditing, and compliance requirements, necessitating that enterprises
hire data protection officers and that data protection authorities hire
workers. These requirements will vastly increase the paperwork created
and stored in databases, itself a cybersecurity risk. If the goal is to
ensure that entities are practicing data protection, a better system
could the audit on demand, or even auditable systems, software which
exposes the relevant information to those users who are interested,
like ratings used on peer to peer platforms.
It could be that because privacy by design technologies are
nascent, policymakers are reluctant to describe them in further detail,
though this also contradicts the implicit assumption of the GDPR that
data supervisors know best. However, the GDPR-chosen approach of
regulation creates path dependency and inevitable outcomes. It clearly
puts the thumb on the scale in favor of regulation over innovation.
Such frameworks can have indirect effects in that firms, concerned
about inadvertently violating many of the tenets of the regulation and
facing steep fines, will choose not to innovate. The GDPR's Article 25
on privacy by design and by default offers little in the way of
incentives. There is no safe harbor for data processors to experiment
or to implement new privacy by design technologies, so firms risk
significant fines if their technologies fail, even if they have an
entrepreneurial willingness to employ improved technologies.
A review of the literature on the impacts of economic regulation in
the information communications technology sector shows a detrimental
impact of regulation on innovation.\106\ Regulation can create a
deadweight loss in the economy as resources are diverted to regulatory
compliance and away from welfare-enhancing innovation. A study across
all major industries from 1997 to 2010 found that less-regulated
industries outperformed overregulated ones in output and productivity
and grew 63 percent more. Overregulation increases barriers to entry
for entrepreneurs, which slows economic growth.\107\ Moreover,
regulation can crowd out efforts to create new and better systems.\108\
---------------------------------------------------------------------------
\106\ Luke Stewart, ``The Impact of Regulation on Innovation in the
United States: A Cross,'' Information Technology and Innovation
Foundation, June 2010, 18, http://www.itif.org/files/2011-impact-
regulation-innovation.pdf.
\107\ Antony Davies, ``Regulation and Productivity,'' Mercatus
Center, May 7, 2014, https://www.mercatus.org/publication/regulation-
and-productivity.
\108\ Patrick McLaughlin and Richard Williams, ``The Consequences
of Regulatory Accumulation and a Proposed Solution / Mercatus,''
Mercatus Center, February 11, 2014, http://mercatus.org/publication/
consequences-regulatory-accumulation-and-proposed-solution.
---------------------------------------------------------------------------
As early as 2010, the International Conference of Data Protection
and Privacy Commissioners resolved that efforts to promote privacy by
design needed to be more deeply embedded in policy.\109\ The EU could
offer grants or rewards for designing better technologies, but those
approaches were declined in the regulation. Instead the EU freezes in
time one view of data governance to which all controllers must adhere,
creating a monolithic attack surface. A better approach is to adopt a
policy declaring the importance of data protection and allow entities
to evolve the most salient approaches.
---------------------------------------------------------------------------
\109\ European Data Protection Supervisor, ``International
Conference of Data Protection and Privacy Commissioners,'' October 27,
2010, https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/
Documents/Cooperation/Conference_int/10-10-27_Jerusalem_Resolutionon
_PrivacybyDesign_EN.pdf.
---------------------------------------------------------------------------
The National Institute of Standards and Technology framework offers
the most salient way forward to design a 21st-century paradigm of data
protection. The focus on the scientific approach ensures the
engineering trustworthiness of technology and its incorporation into
society. Measurement science and system engineering principles can
support the creation of frameworks, risk models, tools, and standards
that protect privacy and civil liberties.\110\ As such, Americans can
develop a better regime through science, technology, and innovation.
Policymakers can incentivize this with partnerships for grants, prizes,
award, competitions, and safe harbors for innovation to ensure that
innovators can innovate without punishment.
---------------------------------------------------------------------------
\110\ Paul Hernandez, ``Cybersecurity and Privacy Applications,''
National Institute of Standards and Technology, August 23, 2016,
https://www.nist.gov/itl/applied-cybersecurity/cybersecurity-and-
privacy-applications.
---------------------------------------------------------------------------
Data Localization
Related to the protectionist GDPR is data localization.
Increasingly, countries are forcing firms to store data locally,
inhibiting the free flow of information and creating a Balkanized
internet. Some 34 countries have enacted barriers \111\ to restrict
data--whether financial, personal, government, telecommunications, or
others against digital services. The United States International Trade
Commission describes the importance of global digital trade and the
many barriers.\112\
---------------------------------------------------------------------------
\111\ Nigel Cory, ``Cross-Border Data Flows: Where Are the
Barriers, and What Do They Cost?,'' Information Technology and
Innovation Foundation, May 1, 2017, https://itif.org/publications/2017/
05/01/cross-border-data-flows-where-are-barriers-and-what-do-they-cost.
\112\ United States International Trade Commission, ``Despite Huge
Growth in Global Digital Trade in Recent Years, Some Countries Seek to
Slow Adoption, Reports USITC,'' press release, September 28, 2017,
https://www.usitc.gov/press_room/news_release/2017/er0928ll836.htm.
---------------------------------------------------------------------------
Countries claim that they need data localization to ensure data
privacy and cybersecurity, help the local digital economy, and ensure
government access to data, but these reasons are unfounded. Cyber
threats transcend borders, and the data's location is not a deterrent
to criminals. While firms take advantage of multiple locations for data
centers, these centers offer limited support to economic growth. The
proper strategy to support the local digital economy is to focus human
capital to create digital goods and services in the country itself.
Governments can get access to data when they need to with the
appropriate court orders; the length of time of delivery is a matter of
seconds.
Data localism should be addressed appropriately by the rule of law,
at the World Trade Organization, and with other appropriate
institutions.
Intellectual Property
Just as we can describe Title II Internet regulations as government
taking the physical property of networks, the GDPR is government taking
the intellectual property of algorithms. Both regulations deny their
owners their rights of ownership and innovation.\113\
---------------------------------------------------------------------------
\113\ Roslyn Layton and Bronwyn Howell, ``How Title II Harms
Consumers and Innovators,'' American Enterprise Institute, July 14,
2017, http://www.aei.org/publication/how-title-ii-harms-consumers-and-
innovators/.
---------------------------------------------------------------------------
Protection of intellectual property is enshrined in our
Constitution.\114\ James Madison reiterated the Copyright Clause in
Federalist Paper No. 43 noting, ''The utility of this power will
scarcely be questioned. The copyright of authors has been solemnly
adjudged, in Great Britain, to be a right of common law. The right to
useful inventions seems with equal reason to belong to the inventors.''
\115\ The product that a person creates with his hands is no different
than what he creates with his voice or brain. The creator has the right
to decide how to monetize his creations.
---------------------------------------------------------------------------
\114\ The Constitution of the United States (Article I, Section 8,
Clause 8) grants to Congress the powers to promote ``the progress of
science and useful arts'' by providing inventors the limited but
exclusive right to their discoveries. This applies to copyrights and
patents, with trademarks similarly protected by Congress under the
Commerce Clause (Article I, Section 8, Clause 3). Together, they are
all protected under the umbrella of intellectual property.
\115\ James Madison. Federalist No. 43. January 23, 1788
---------------------------------------------------------------------------
As of December 2016, copyrighted works contributed an estimated
$1.2 trillion to the U.S. GDP,\116\ accounting for 6.88 percent of the
U.S. economy, almost as large as the $1.6 trillion Internet economy
itself.\117\ The Internet intermediaries enjoy intellectual property
(IP) protection for their software and algorithms. It is illogical that
the software property protections are honored internationally but not
the content they deliver. The U.S. loses about $300 billion annually
from the theft of copyrighted materials.\118\
---------------------------------------------------------------------------
\116\ Stephen E. Siwek, ``Copyright Industries in the U.S.
Economy,'' International Intellectual Property Alliance, 2016, https://
iipa.org/files/uploads/2018/01/2016CpyrtRptFull-1.pdf.
\117\ Comp TIA, ``Cyberstates,'' https://www.cyberstates.org/. 2018
\118\ Supra Siwek.
---------------------------------------------------------------------------
Fortunately, advances such as machine learning and cloud computing
enable online intermediaries to accurately and efficiently identify
known-infringing content, particularly content that rightsholders have
shown belongs to them. Technologies and business models continue to
improve making detection of pirated, unlicensed content more efficient,
meaning that we can have a strong copyright standard without
overburdening intermediaries. For example, ad networks can restrict the
use of advertising on sites with known infringing content, which helps
restrict revenue to those criminal enterprises designed to illegally
exploit copyright-protected content. Such tools combat not only pirated
content but also harmful and pirated goods such as counterfeit
medicines.\119\
---------------------------------------------------------------------------
\119\ Daniel Castro, ``PIPA/SOPA: Responding to Critics and Finding
a Path Forward,'' Information Technology and Innovation Foundation,
December 5, 2011, https://itif.org/publications/2011/12/05/pipasopa-
responding-critics-and-finding-path-forward.
---------------------------------------------------------------------------
Like the network regulation debate, the copyright-free movement is
a coalition of some large tech companies aligned with anti-IP groups
that want to restrict if not abolish copyright protections.\120\ Some
copyright ``minimalists'' argue that since they would not have paid for
the products, stealing improves consumer welfare. Others see piracy as
merely a form of societal redistribution from rights owners to
consumers. They leverage databases of millions of users to overwhelm
political process and create the appearance of grassroots support, for
example one million signatures on a Change.org petition. This is not an
authentic reflection of the people but rather the amplified support of
the digital elite.\121\ Some countries recognize that they do not
produce a significant amount of exportable digital content, so they see
no strong incentive to have strong digital copyright enforcement.
Instead, they see opportunities to create digital platforms that
leverage the content produced by others, particularly U.S. creators.
---------------------------------------------------------------------------
\120\ Richard Bennett, ``Europe's Piracy Dilemma, High Tech Forum,
July 5, 2018, http://hightechforum.org/europes-piracy-dilemma/.
\121\ Roslyn Layton, ``Net Neutrality: A Numbers Game,'' AEIdeas,
July 25, 2016, http://www.aei.org/publication/net-neutrality-numbers-
game/; Change.org, ``Stop the Censorship-Machinery! Save the
Internet!,'' https://www.change.org/p/european-parliament-stop-the-
censorship-machinery-save-the-internet; and Roslyn Layton, ``Dominated
by the Digital Elite,'' US News & World Report, August 8, 2017, https:/
/www.usnews.com/opinion/economic-intelligence/articles/2017-08-08/the-
digital-elite-dominates-debates-over-net-neutrality-and-title-ii-rules.
---------------------------------------------------------------------------
Another hypocrisy has emerged in that many advocates of the
copyright-free moment want regulation to ensure their unfettered access
to content regardless of the copyright concerns but see no problem when
the onerous GDPR requirements force content owners to stop serving the
EU. Similarly, they celebrate the liability protections of the
Communications Decency Act \122\ and the Online Copyright Infringement
Liability Limitation Act \123\ afforded to highly regulated common
carriers in telecommunications, but don't see that the same common
carriage should apply to their preferred Internet platforms which are
also granted immunity under the Acts. Such legal policy inconsistencies
should be investigated and resolved.
---------------------------------------------------------------------------
\122\ 47 USC 230
\123\ 17 USC 512
---------------------------------------------------------------------------
Ideally, by creating transparency to the competing interests, the
debate can move forward on the merits of the arguments. In any case,
without copyright, the individual creator has no protection for his
work, so supporting this position is vital to ensure individual rights.
Some reasons for the decline in U.S. Internet leadership
The U.S. had a leadership role in Internet governance, but lost it.
When the U.S. fails to uphold the rule of law in its own country, it
gives license to other nations to do the same. Moreover, the U.S.
failed to challenge those countries that violate digital trade
agreements. During this period in which the U.S. has slackened in it
own practice of the rule of law, there has been a shift of the
international view of America over the past 20 years from one of
respect and reverence to one of resentment. The Pew Research Center's
Global Attitudes and Trends reports that other nations' opinions of the
U.S. have diminished from preeminence to a tie with China for the
world's most popular nation.\124\
---------------------------------------------------------------------------
\124\ Global Indicators Database, ``Do You Have a Favorable or
Unfavorable View of the U.S.?,'' Pew Research Center, http://
www.pewglobal.org/database/indicator/1/.
---------------------------------------------------------------------------
To a number of foreign nations, the explosion of free speech
restrictions on American college campuses legitimize the efforts to
clamp down on journalists, dissidents, and other critics of government.
In the Internet space, a recent and egregious example was in 2014-15.
The Federal Communications Commission pronounced that one of its
greatest inventions--the internet--is a mere extension of the telephone
network and thus a utility to be regulated by the government. It was a
slap in the face to engineers and inventors whose life's work was
creating an alternative to the telephone. It disrespected their
inventions and the technologies of freedom. In addition, it trampled
the rule of law, in which the people certified through Congress that
the Internet is to be free and unfettered from state and Federal
regulation. The move to declare the Internet a utility was welcomed by
many unsavory nations as perfect justification to apply their favorite
form of government control on the internet. It is no surprise that
dozens of nations have engaged in harmful regulation toward the US, a
country they once respected. Moreover, Internet freedom has been
declining for the past seven years despite increasing regulation around
the world purported to protect consumers and ``openness.'' \125\
---------------------------------------------------------------------------
\125\ Roslyn Layton, ``The Link Between Net Neutrality and
Declining Internet Freedom,'' AEIdeas, December 15, 2015, http://
www.aei.org/publication/link-net-neutrality-declining-internet-
freedom/. For an updated report, see Freedom House, ``Manipulating
Social Media to Undermine Democracy,'' https://freedomhouse.org/report/
freedom-net/freedom-net-2017.
---------------------------------------------------------------------------
This abuse is not limited to government. Leading Silicon Valley
firms have waged a campaign to impose Internet regulation on the
telecom industry to avoid interconnection fees and preclude the
development of competitive business models for content and
advertising.\126\ While it may be a rational strategy for Silicon
Valley, it is wrong and unfair to employ political means to secure
price controls that undermine the efficient functioning of Internet
markets. As I have demonstrated with more than 5 years of doctoral and
post-doctoral research, these regulatory policies have been harmful in
the U.S. and abroad, concentrating Internet traffic to fewer players
and enshrining a monoculture of platform paradigms and business
models.\127\
---------------------------------------------------------------------------
\126\ Internet Association, ``Net Neutrality,'' accessed July 19,
2018, https://internet
association.org/positions/net-neutrality/.
\127\ Roslyn Layton. Which Open Internet Framework is Best for
Mobile App innovation? An empirical inquiry of net neutrality rules
around the world. Aalborg University, 2017. http://vbn.aau.dk/en/
publications/which-open-internet-framework-is-best-for-mobile-app-
innovation(b1f05c8d-b31e-47cd-b19d-bcf6893e7e5b).html
---------------------------------------------------------------------------
The imposition of price controls denies infrastructure providers
revenue to build networks (and tax revenue for governments), undermines
the emergence of business models that could support local content
development for socially beneficial goods (particularly in developing
countries), and unduly burden consumers with the full cost of networks,
a cost that falls disproportionately on the poor. Moreover, the
politicized regulatory exercise distracts scarce policymaking resources
away from real problems, which are empirically demonstrated to be the
malign acts of governments to censor people, services, and data.\128\
Indeed, many internet-related firms and industries have taken advantage
of the regulatory process to win favorable treatment for themselves at
the expense of their competitors and consumers. Foreign counterparts
have learned from the rent-seeking behavior of Americans firms, and it
has boomeranged. Now foreign governments find ways to regulate American
firms to reward their domestic players.\129\
---------------------------------------------------------------------------
\128\ Freedom House, ``Freedom on the Net 2017,'' https://
freedomhouse.org/report/freedom-net/freedom-net-2017.
\129\ Roslyn Layton, ``Net Neutrality Will Be Reincarnated as
Platform Regulation,'' AEIdeas, December 20, 2017, http://www.aei.org/
publication/net-neutrality-will-be-reincarnated-as-platform-
regulation/.
---------------------------------------------------------------------------
Moreover the U.S. has distracted itself with phantom fears and
instead of focusing on real threats. The U.S. may have been the leader
in 4G, but leadership is not assured in future generations. The Chinese
government wants its country's device, app, and service developers to
win the race for the 5G ecosystem. China has already replaced the U.S.
as the world's largest mobile app market,\130\ unseating the U.S. in
downloads and revenue in 2016. The U.S., caught up in crony squabbles
and rent-seeking regulation over the past decade, took its eye off the
ball. The real threat to Silicon Valley is not the Nation's 4,551
Internet service providers, but rather Chinese Internet giants,
including Baidu, Alibaba, and Tencent, which make the U.S. players look
tame by comparison.\131\
---------------------------------------------------------------------------
\130\ App Annie Content, ``App Annie Mobile App Forecast: China to
Surpass the U.S. in 2016,'' accessed July 19, 2018, https://
www.appannie.com/en/insights/market-data/mobile-app-forecast-china-to-
surpass-us-in-2016/.
\131\ CTIA, ``How America's 4G Leadership Propelled the U.S.
Economy''; Raymond Zhong, ``Worried About Big Tech? Chinese Giants Make
America's Look Tame,'' New York Times, May 31, 2018, https://
www.nytimes.com/2018/05/31/technology/china-tencent-alibaba.html.
---------------------------------------------------------------------------
Unless it wants to capitulate for China, American industry needs to
set aside its crony games and start to play for Team USA. Telecom,
content, software, and hardware companies should all play for the same
team. They should partner to complement each other's strengths,
leveraging the appropriate actors for the conversation. Moreover, Team
USA should grow the bench and bring new valuable actors into the fold.
The more robust our market and diversified our business models, the
less likely China will be able disrupt it.\132\
---------------------------------------------------------------------------
\132\ Sara Fischer, ``U.S. Big Tech Is Still Beating out China,''
Axios, July 24, 2018, https://www.axios.com/us-big-tech-china-silicon-
valley-fe76b105-d9d0-4b34-8632-7e91b8f6d9a2.html.
---------------------------------------------------------------------------
Earning the leadership role again
The U.S. needs to model the behavior it wants to see in the world
by upholding the rule of law and respect for individual rights. When
American enterprises operate abroad--whether they are for-profit
corporations or nonprofit entities--they want a rational, predictable,
and consistent framework across the board. Such a framework allows the
enterprise to minimize costs, maximize revenue, ensure efficiency, and
allow improvement and innovation. To ensure the ideal framework abroad,
enterprises should advocate for the ideal framework at home. Therefore,
the policy should be a consistent set of rules for all players,
grounded in modern, evidenced-based standards of antitrust and
delivered by the FTC.\133\ This also requires removing the asymmetric
regulation and regulatory prejudice that have stymied innovation in
business models and platforms.
---------------------------------------------------------------------------
\133\ Richard Bennett et al., Comments on Communications Act
Modernization, January 31, 2014, https://ssrn.com/abstract=2388723.
---------------------------------------------------------------------------
We must also let go of antique notions of Internet architecture and
outdated regulations that prohibit innovation e.g., this wooden notion
of network core and edge. It is precisely these regulatory prejudices
that have precluded the network design advancements that can improve
security.\134\ It was a reasonable to trust the digital community in
the days of the ARPANET when the users were a handful of scientists and
engineers. With billions of Internet users today, assumed trust is not
an option. Cyberattacks and threats are commonplace and demand to be
addressed within the framework of defense. Perpetrators of
cyberattacks, notably rogue states, should be punished by ending visas,
freezing assets, and other punitive tools of international law. Modern
cybersecurity requires advanced information-sharing among global
partners, a market for cyber insurance, freedom of parties to exercise
self-defense, and the augmentation government's coordination with
military, business, and hacker communities.\135\ Some suggest that the
cybersecurity crisis is the outcome of obsolete networked computer
architecture and demands a new paradigm of cryptography, the
architecture of blockchain, and its derivatives. It is suggested that
this emergent architecture will enable a new form of payments on the
Internet and topple reigning monopolies.\136\
---------------------------------------------------------------------------
\134\ Jaikumar Vijayan, ``Net Neutrality Could Hinder Efforts to
Safeguard Web, Worry Security Experts,'' Christian Science Monitor,
February 27, 2015, https://www.csmonitor.com/World/Passcode/2015/0227/
Net-neutrality-could-hinder-efforts-to-safeguard-Web-worry-security-
experts.
\135\ Jeffrey A. Eisenach et al., ``An American Strategy for
Cyberspace: Advancing Freedom, Security, and Prosperity,'' American
Enterprise Institute, June 3, 2016, http://www.aei.org/spotlight/
american-strategy-for-cyberspace/.
\136\ George Gilder, Life After Google: The Fall of Big Data and
the Rise of the Blockchain Economy (Gateway Publishers, 2018).
---------------------------------------------------------------------------
Let me close with a story that demonstrates how the U.S. pursuing
its national interest has been a force for good.\137\ Upon coming into
office, Thomas Jefferson was confronted of the problem of American
merchant ships being seized by the Barbary States of Northern Africa;
the goods were confiscated and the crews enslaved. Most countries paid
ransom so that they could traverse the Mediterranean. American
representatives had tried negotiation for some 20 years, but the
situation grew worse. Over 1 million Europeans and Americans had been
captured by the Barbary pirates over the period.
---------------------------------------------------------------------------
\137\ Gordon Wood. Revolutionary Characters: What Made the Founders
Different. Penguin Press, 2006.
---------------------------------------------------------------------------
On the eve of his inauguration, Jefferson's request to Congress was
authorized, dispatching naval ships to the region to recover the
hostages and destroy the pirate fleets. Sweden and Sicily joined the
effort because they too had suffered the Barbary scourge. After a
series of battles, the U.S. emerged victorious, returned the stolen
goods to the various European nations, and returned to the U.S. with
the American hostages. The Barbary Wars became a vindication for
Jefferson whose critics wanted him to focus inward on the Louisiana
purchase. Winning the Barbary Wars solidified free trade in the
Mediterranean.
Just as Jefferson had to secure the sea lanes for trade in the 19th
century, we must secure the information lanes for the free flow of data
in the 21st. Otherwise we appease mercantilist nations by letting them
violate international law, and the situation grows worse. Ideally the
issues can be resolved in the context of trade negotiation.
Alternatively, we can create a better regime which becomes so popular
that the rest of the world joins it, isolating the mercantilists. Or we
can fight. This is not to suggest a military war, but a war in the
court.
Senator Wicker. Thank you very much, Dr. Layton.
Ms. Zheng.
STATEMENT OF DENISE E. ZHENG, VICE PRESIDENT, POLICY, BUSINESS
ROUNDTABLE
Ms. Zheng. Chairman Wicker, Ranking Member Schatz, members
of the Subcommittee, thank you for the opportunity to testify
on behalf of the Business Roundtable.
Today, few companies can compete and succeed without making
extensive use of data and digital systems, but recently there
has been a rapid increase in the number of policies around the
world that undermines digital innovation, trade, by creating
fragmentation, uncertainty, significant compliance costs, and
other unintended consequences.
The compliance environment is increasingly cumbersome for
large companies and simply impossible for small companies and
startups to comply. The EU and China are the most active
players in rolling out digital regulations, but India, Russia,
South Korea, and other Asian and Latin American countries are
ramping up efforts to develop and enforce a wide range of
cybersecurity, privacy, and data localization policies.
China has the most aggressive regime in place, mandating
all important information and personal information be stored
locally in China. As currently defined, the law would require
any entity that owns or operates a computer network and applies
to a vast assortment of different types of data.
India, Russia, Nigeria, South Korea all have enacted laws
that prohibit transferring various types of business and
consumer data. In fact, at least 34 different countries have
data localization requirements that can raise the cost of
posting data by an estimated 30 to 60 percent for covered
companies.
Approximately 120 countries currently have data privacy
laws and many more countries are considering legislation in
this area. Some companies have decided to discontinue offering
products and services in the EU because of GDPR compliance
costs which are so high that they can no longer justify being
in the market.
For example, some firms are blocking EU-based users from
their products and services, including from visiting their
websites, to avoid facing steep fines of 20 million Euros or 4
percent of annual revenue, whichever is higher. The GDPR alone
is costing Global Fortune 500 companies a combined total of
$7.8 billion this year to comply.
Fragmentation of domestic policy regulations in the United
States is also on the rise. In addition to several existing
sector-specific Federal and state privacy regulations,
California recently passed a privacy bill that applies broadly
across many sectors. Numerous other privacy proposals are
pending in state legislatures that, if passed, would further
increase the complexity of privacy regulations across the U.S.
Cybersecurity regulations are also expanding globally. The
financial services industry is an example of a sector that
faces an expanding number of international cybersecurity
requirements with more than 40 different policies, including
overlapping mandatory risk assessments, penetration testing,
and incident reporting to multiple authorities in each country.
Now don't get me wrong. Cybersecurity is a serious matter.
We should have mechanisms in place to ensure adequate
protection, but uncoordinated policies across countries means
that companies must reconcile competing regulations that divert
resources away from security toward compliance.
A fragmented international digital policy landscape will
likely have the most significant impact on startups and small-
and medium-sized companies with limited resources to comply
with ambiguous requirements and pay-for-views in countries like
China with excessive paperwork associated with EU policies.
And emerging technologies, like artificial intelligence and
block chain, are also hindered by regulatory uncertainty. For
example, the data minimization, automated decisionmaking, and
right to erasure provisions of the GDPR could create barriers
to the commercial development of these important technologies.
In light of these trends, I would like to end by outlining
four areas for congressional focus.
The first is to work on establishing alliances,
particularly with like-minded countries, to counter technology
restrictions as a condition to accessing foreign markets. We
are more effective with strong partners and allies.
Second, the U.S. must lead in the development of
international norms, best practices, and standards for
cybersecurity, privacy, and cross-border data flows, as well as
emerging technologies, such as AI and block chain, because
rules for those technologies do not yet exist.
Third, the U.S. must work to align and harmonize policies
to avoid global fragmentation. We cannot afford to be missing
from the important international forums on additional policy
issues as China and other countries are actively seeking to
rewrite the rules of the Internet that are fundamentally at
odds with open markets and democratic values.
And, finally and perhaps most immediately, Congress should
act to protect transatlantic border data flows under the
Privacy Shield by making the ombudsperson a permanent position
within the State Department.
It should also act swiftly to confirm the nominees for the
Privacy and Civil Liberties Oversight Board, which plays a
critical role in fulfilling the requirements under the Privacy
Shield.
Mr. Chairman, thank you for your leadership in holding this
hearing and for encouraging a dialogue. I look forward to
taking questions.
[The prepared statement of Ms. Zheng follows:]
Prepared Statement of Denise E. Zheng, Vice President, Policy,
Business Roundtable
Chairman Wicker, Ranking Member Schatz, Members of the
Subcommittee, thank you for the opportunity to testify on behalf of
Business Roundtable regarding international policies related to the
Internet and digital platforms--more broadly referred to as
``information and communications technology'' (ICT)--and their impact
on competitiveness, investment, and innovation.
Business Roundtable is an association of chief executive officers
(CEOs) of the world's largest multinational companies. Collectively,
our member companies employ more than 16 million people across all
sectors of the economy. It is a commonly held misperception that ICT
policies only affect the technology industry. The reality is that few
companies can compete and succeed today without making extensive and
effective use of data and digital platforms.
Recently there has been a rapid increase in the number of complex,
conflicting, and uncoordinated ICT public policies from governments
around the world. This trend undermines global digital innovation and
trade by creating policy and regulatory fragmentation, business
uncertainty, overwhelming compliance costs, and other unintended
consequences.
Trends in Global ICT Policy
Governments have a responsibility to develop ICT policies that
provide for national security, protect public safety, and ensure
individual privacy. But too often, countries are defining security,
privacy, and safety in an overly broad manner, resulting in a wide
array of laws and regulations that erect barriers to an interoperable
and open global internet. In some cases, nations impose ICT policies
for the stated purpose of cybersecurity and privacy, even though the
policies are designed primarily to keep U.S. companies out and protect
local industries. In other cases, the global patchwork of various
cybersecurity and privacy requirements creates a compliance nightmare
that is cumbersome and costly for large companies and impossible for
small companies and startups.
The European Union (EU) and China are currently the most active
players in developing and implementing ICT policies. But India, Russia,
South Korea, and other Asian and Latin American countries are ramping
up efforts to develop and enforce a wide range of cybersecurity,
privacy, and data localization policies. Already at least 34 different
countries have data localization requirements, while approximately 120
countries have data privacy laws and many more countries are
considering legislation in this area.\1\
---------------------------------------------------------------------------
\1\ Pfeifle, S. (2017, September) Is the GDPR a data localization
law? Retrieved from https://iapp.org/news/a/is-the-gdpr-a-data-
localization-law/
---------------------------------------------------------------------------
The following sections highlight a selection of ICT policies that
have a significant impact on Business Roundtable members and other
U.S.-based companies.
Data Localization
China has the most aggressive data localization laws. China's
Cybersecurity Law that went into effect in June 2017 requires all
``important information'' and ``personal information'' to be stored in
China. Under this regime, ``network operators'' are prohibited from
transferring covered data outside of China without undergoing a
government-mandated security assessment. As currently defined, the law
could cover any entity that owns or operates a computer network and
applies to a vast and ambiguous assortment of different types of data.
China is not the only country with data localization requirements:
India, Russia, Nigeria, and South Korea all have enacted laws that
prohibit the transfer of a range of business and consumer data outside
of their respective jurisdictions. In some cases, these laws mandate
physical servers be installed in-country as a condition of doing
business.
This growing number of localization requirements is already proving
costly for many industry sectors, including health, retail, finance,
insurance, energy, manufacturing, and technology. These mandates are
making it increasingly difficult for U.S. companies to do business in
key markets such as Asia and Latin America.
Cybersecurity
Cybersecurity regulations are expanding globally. For example,
China, which has some of the most heavy-handed regulations, requires
companies in industries deemed to be ``critical'' to demonstrate that
their technology systems are ``secure and controllable.'' Such
companies must undergo inspections and assessments of company networks
and are mandated to disclose computer program source code to the
Chinese government for review. The European Council recently proposed a
new cybersecurity regulation (the EU Cybersecurity Act) that would
create a security certification regime for ICT products and services.
If the law takes a mandatory, rather than voluntary, approach, it could
have the effect of dictating how American firms design, develop,
manufacture, and deliver ICT products and services.
The financial services sector, in particular, faces an expanding
number of international cybersecurity regulations, with more than 40
different international cybersecurity policies already in place,\2\
ranging from risk assessments to penetration testing to incident
reporting. In this environment, companies must reconcile competing and
redundant cybersecurity regulations that divert significant resources
from truly effective cybersecurity measures toward time-consuming
compliance activity, such as certifications and questionnaires.
---------------------------------------------------------------------------
\2\ World Bank Group, Financial Sector Advisory Center (2017,
October) Financial Sector's Cybersecurity: A Regulatory Digest.
Retrieved from http://pubdocs.worldbank.org/en/5249
01513362019919/FinSAC-CybersecDigestOct-2017-Dec2017.pdf
---------------------------------------------------------------------------
Privacy
In May 2018, the EU's General Data Protection Regulation (GDPR)
went into effect and established the most expansive privacy regime in
the world. The GDPR covers nearly all types of personal data and
affects business-to-consumer as well as business-to-business firms. The
GDPR has an extraterritorial application meaning that its scope covers
any company, regardless of whether it is based in the EU or not, that
meets the law's threshold requirements for processing personal data of
individuals in the EU.
This means that some companies, such as those that cannot justify
spending the resources necessary to demonstrate compliance with the
GDPR, are forced to take steps to block EU-based users from using their
products and services, including from visiting their websites, to avoid
facing steep fines of up to 20 million euros or 4 percent of annual
revenue, whichever is higher. The GDPR limits transfers of personal
data outside of the EU unless certain adequacy standards are met; it
also requires companies to notify EU and national regulators of
security breaches of personal data within 72 hours of the incident.
The EU is actively promoting the adoption of the GDPR as a model
for privacy regulations in other countries. In addition, Brazil and
other Latin American countries are proposing or have enacted laws that
adopt many aspects of the GDPR.
The risk of domestic regulatory fragmentation within the United
States for privacy is also high. In addition to several existing
sector-specific Federal and state privacy regulations, California
recently passed a consumer privacy bill that applies broadly across
many sectors. Numerous other data privacy legislative proposals are
pending in state legislatures that, if passed, would further increase
the complexity of privacy regulations across the United States. That is
why Business Roundtable is working to develop privacy principles that
strengthens protections for consumers but also preserves innovation in
the digital economy.
Government Access to Data
The growth of digital communications over the past two decades has
created new challenges as well as opportunities for law enforcement.
For instance, several countries have sought to restrict the use of
encryption or imposed data localization mandates to facilitate law
enforcement's access to data for investigative purposes or government
surveillance.
Both China and Russia mandate companies decrypt and localize data
for law enforcement and surveillance. In 2016, Russia passed a law that
explicitly required Internet service providers to provide backdoor
access to encrypted data and store all consumer communications for six
months. France, the United Kingdom, Brazil, India, and other countries
have also enacted laws that regulate the use of encryption in digital
communications.
Not only do these laws erode security and privacy on the internet,
they also have a significant impact on the interoperability of digital
platforms across borders and undermine consumer trust in technology.
Consequences of Uncoordinated International ICT Policies
The current state of global ICT policy is complex, chaotic, and
fragmented and could undermine growth and innovation in the digital
economy and emerging technologies.
Fragmentation and Legal Uncertainty
As CEOs that run the largest American companies, Business
Roundtable members operate in many jurisdictions and serve customers
around the globe. The international regulatory environment for ICT
policy is forcing companies across all sectors to reconcile
overlapping, duplicative, and sometimes conflicting requirements. The
legal uncertainty that results from policy and regulatory fragmentation
undermines investment, growth, and job creation. Ambiguous requirements
and inconsistent enforcement in some countries increases the risk of
doing business and can lead companies to reject, defer, or reconsider
investments.
Compliance Costs
The GDPR alone is estimated to cost Fortune 500 companies a
combined $7.8 billion to comply, or about $16 million per firm.\3\
Another survey found that large organizations of 25,000 or more
employees each are budgeting an average of $30 million to comply with
the GDPR. Much of the cost is related to ``check the box'' exercises
that demand significant investment from companies regardless of their
risk profile. Some companies have decided to discontinue offering
products and services in the EU because compliance costs are so high
that they can no longer justify being in the market. It is not unusual
for those surfing the web in the EU to come across websites from
vendors that have nothing more than a note saying that due to GDPR
requirements, the site cannot be accessed.
---------------------------------------------------------------------------
\3\ IAPP-EY (2017) IAPP-EY Annual Privacy Governance Report 2017.
Retrieved from https://iapp.org/news/a/survey-fortune-500-companies-to-
spend-7-8b-on-gdpr-compliance/
---------------------------------------------------------------------------
Data localization requirements can impose significant compliance
burdens that raise the cost of hosting data by 30 to 60 percent for
companies that are covered by such requirements.\4\ A study done by the
European Centre for International Political Economy estimates that
enacted or proposed data localization mandates in China could cost up
to 1.1 percent of its GDP and the cost of data localization
requirements in the EU could cost nearly 0.4 percent of its GDP.\5\
---------------------------------------------------------------------------
\4\ Leviathan Security Group (2015). Quantifying the Cost of Forced
Localization. Retrieved from https://static1.squarespace.com/static/
556340ece4b0869396f21099/t/559dad76e4b0899d97726a8b/1436396918881/
Quantifying+the+Cost+of+Forced+Localization.pdf
\5\ European Centre for International Political Economy (2016
March). Unleashing Internal Data Flows in the EU: An Economic
Assessment of Data Localisation Measures in the EU Member States
Retrieved from http://ecipe.org/app/uploads/2016/12/Unleashing-
Internal-Data-Flows-in-the-EU.pdf
---------------------------------------------------------------------------
Unintended Consequences
A fragmented international ICT policy landscape will likely have
the most significant and adverse impact on startups and small- and
medium-size companies with limited resources to navigate ambiguous
requirements and opaque reviews in countries like China or excessive
paperwork associated with complying with EU policies. These compliance
costs will make it more difficult for such promising and innovative
companies to thrive and expand.
Emerging technologies such as artificial intelligence and
blockchain are also hindered by regulatory uncertainty and are the next
likely targets for policy and regulatory fragmentation. The data
minimization, automated decision-making, and ``right to erasure''
provisions of the GDPR can create barriers to the commercial
development of important emerging technologies which improve and
innovate new products and services for consumers. I will give you two
specific examples of this: First, the GDPR imposes restrictions at
every stage that a company collects, processes, uses, and retains
personal data, and the impact of these restrictions on the development
of machine learning tools is uncertain. Some companies may decline to
integrate machine learning into their business to avoid such hurdles.
Second, companies using blockchain and distributed ledger systems,
technologies rooted in the notion that information should not be
unilaterally amended or deleted from networks, will face difficulty in
responding to data subject requests, authorized by the GDPR, to amend
and delete their own data.
Recommendations
Congress has an important role in creating and fostering a global
policy environment for an open, interoperable, and global Internet and
to promote the continued economic growth of the digital economy. To
that end, Business Roundtable recommends the following actions:
Establish Alliances with Like-Minded Countries to Counter
Protectionist ICT Policies. The U.S. Government should build
alliances with like-minded countries to counter technology
restrictions, protectionist cybersecurity and data localization
requirements, and requirements for businesses to transfer
technology and intellectual property as a condition to
accessing foreign markets.
Lead in Development of International Norms, Best Practices,
and Standards for ICT. The U.S. Government and U.S. companies
should lead in developing norms, best practices, and standards
for the Internet and digital platforms. Areas of focus include
cybersecurity, privacy, and cross-border data flows. At the
same time, emerging technologies such as artificial
intelligence, autonomous vehicles, blockchain, Internet of
things, and robotics require serious attention, because rules
do not yet exist.
Seek to Align or Harmonize Requirements to Avoid Global
Fragmentation. In the face of an already fragmented
environment, the U.S. Government should play a leadership role
to align or harmonize where possible existing ICT policies,
regulations, and standards globally, and maintain that same
approach for emerging technologies to avoid costly
fragmentation. The United States cannot afford to be missing
from important international forums on ICT issues, as China and
other countries are actively seeking to rewrite the rules of
the Internet and digital economy that are fundamentally at odds
with open markets and democratic values.
Protect Transatlantic Cross-Border Flows. Congress should
act to protect the EU-U.S. Privacy Shield by making the Privacy
Shield Ombudsperson a permanent position of the U.S. Department
of State. It should also act swiftly to confirm the nominees
for the Privacy and Civil Liberties Oversight Board, which
plays a critical role in fulfilling the requirements of the EU-
U.S. Privacy Shield.
Mr. Chairman, Ranking Member Schatz and Members of the
Subcommittee, thank you for the opportunity to present Business
Roundtable's views on information and communications technology and
their impact on competitiveness, investment, and innovation. The global
policy environment around ICT represents a serious concern to leaders
of these American companies that drive economic growth and job creation
in the United States and across the world.
Senator Wicker. Thank you very much.
Mr. Painter.
STATEMENT OF CHRISTOPHER M.E. PAINTER,
COMMISSIONER, GLOBAL COMMISSION ON
THE STABILITY OF CYBERSPACE
Mr. Painter. Chairman Wicker, Ranking Member Schatz,
members of the Subcommittee, it is a pleasure to be here today
to discuss the impact of global Internet governance on American
businesses, end users, and the U.S. policy of promoting and
maintaining an open, interoperable, and secure Internet.
For over 26 years, I have devoted my life to cyber and
Internet issues, including, most recently, serving as the first
coordinator for cyber issues at the Department of State. In
that role, I worked with components across the department, the
interagency, and outside stakeholders to advance the U.S.
vision of cyberspace and combat both technical and policy
challenges.
I'll focus today on some of the policy challenges and
recommendations to address them.
First, it's important to note that the policy threats we
face, though distinct, are often interrelated and have
economic, human rights, and security elements. For example,
when China claims absolute sovereignty over its cyberspace and
erects a digital wall around its territory in the name of
security that has profound economic and human rights
implications.
It is vital, therefore, that our response to these
challenges not be left silent but be coordinated. We need to go
to the full range of departments, agencies, and other
stakeholders to advance an integrative and strategic U.S.
policy.
Second, cyber and Internet issues are now being debated in
virtually every country and every international and regional
organization. Indeed, I believe we've reached an inflection
point where the issues discussed and the decisions reached in
these multiple forums will have a major impact on the future of
the Internet and cyberspace.
Accordingly, advancing the U.S. vision of cyberspace,
including U.S. commercial interests, requires unprecedented
U.S.-international engagement and strategic U.S. leadership.
Among the many policy challenges we face are threats by
repressed regimes to replace the system of multi-stakeholder
Internet governance with one that is driven by government-only
multilateral bodies, in part to control content and curtail the
free flow of information, threats posed by China, Russia, and
others to online freedom to have both negative human rights and
economic impacts, mandatory data localization requirements that
are not scalable or economically practicable and are often used
by repressive governments to help monitor and control their
citizens, and countries and multilateral bodies around the
world enacting or considering regulatory policy or legal
regimes dealing with some aspect of cyberspace, including
online privacy, cybersecurity, market access, and emerging
technology that conflict with the U.S. values and interests or
risk creating conflicting regimes that fragment the Internet.
And, finally, threats by nation states, organized criminal
groups, and other bad actors that threaten to undermine our
confidence in the Internet and network technologies and strike
at the very core of our economy and democracy.
My overarching recommendation to address these challenges
is for the U.S. to step up its international engagement on
these issues and make them a true national priority. This
requires enhanced structure of resources and a whole of
government cross-cutting strategy.
On structure, I applaud the continued efforts of my former
colleagues at State, Commerce, and other agencies, but I
believe those efforts have been hampered by the lack of a
sufficiently high-level office at the State Department and the
recent abolition of the cyber coordinator position at the White
House.
I commend the House and Senate efforts to restore,
strengthen, and institutionalize my former office in the Cyber
Diplomacy Act, and I'm particularly pleased that these efforts
were bipartisan, reflecting the bipartisan nature of most of
these issues.
In the past, necessary whole of government coordination on
these cross-cutting issues has been significantly boosted by
the cyber coordinator position of the National Security
Council. The loss of that high-level position, coupled with at
least the temporary demotion of my prior office, complicates
interagency coordination and also sends an unfortunate signal
to both our friends and our adversaries that the Administration
is not really prioritizing these issues.
Resources are also vital. This, importantly, includes
funding for capacity-building that was severely cut last year.
Capacity-building includes working with foreign governments on
aspects of Internet governance or regulatory policy, helping
countries enact appropriate laws and strategies, and working
with countries to boost their ability to combat cyber crime and
have strong cyber-security capabilities.
For a relatively small amount of money, targeted capacity-
building not only helps the U.S. by helping other countries
gain the ability to work with us, but it also helps win the
support of developing countries for our vision of the Internet
and cyberspace.
It's also important for the private sector, civil society,
and other stakeholders to continue to engage in these efforts
and enhance their participation. Though many companies and
civil society groups are already making valuable contributions
in a variety of international forums, given what is at stake,
we must find ways to help increase participation.
Finally, it is important that the U.S. has a high-level
cross-cutting integrated strategy that leverages all relevant
government agencies, outside stakeholders, and like-minded
countries to deal with the many challenges we face
internationally and help to direct and prioritize our
engagement.
I make a number of other suggestions in my written
testimony, including strengthening multi-stakeholder
institutions, including the Internet Governance Forum, showing
leadership on privacy and other Internet policies, addressing
data localization through, among other things, the CLOUD Act,
and supporting cybersecurity/cyber crime and stability efforts,
but all are dependent on an effective and strategic
international engagement plan.
I look forward to your questions.
[The prepared statement of Mr. Painter follows:]
Prepared Statement of Christopher M.E. Painter, Commissioner, Global
Commission on the Stability of Cyberspace
Chairman Wicker, Ranking Member Schatz, members of the Senate
Subcommittee on Communications, Technology, Innovation and the
Internet, it is a pleasure to appear before you today to discuss the
impact of global Internet governance and policies on American
businesses, end users and the U.S. policy of promoting and maintaining
an open, interoperable, secure and reliable communications and
information infrastructure that is the foundation for economic
prosperity, innovation, social growth and the exercise of human rights.
For over twenty-six years I have devoted my life to cyber and Internet
issues, serving as a Federal prosecutor specializing in cybercrime, a
senior official at the Department of Justice and the FBI, a Senior
Director of Cybersecurity Policy at the National Security Council and,
most recently, as the first Coordinator for Cyber Issues at the
Department of State. I have continued to work on these issues since
leaving the Federal Government, among other things, serving as a
Commissioner on the Global Commission for the Stability of Cyberspace
and a Board member of the Center for Internet Security.
My role as Coordinator for Cyber Issues at the State Department was
the first such office established in a foreign ministry. There are now
over twenty-five such offices in foreign ministries around the globe.
In recognition of the cross-cutting and interdependent nature of cyber
and Internet issues--including economic, human rights and security
issues--my former office had a broad mandate, and worked with
components across the Department, the interagency, the private sector,
civil society and other stakeholders, to advance the U.S. vision of an
open and secure cyberspace. In my six and a half years as Coordinator,
I worked to help realize the many benefits of cyberspace while
combatting the ever mounting technical and policy threats we face. For
purposes of this hearing I will focus on some of the policy challenges,
including threats to the multi-stakeholder system of Internet
governance, threats to freedom of expression and other human rights
online, challenges relating to cybersecurity and stability, and the
threat of inconsistent or misguided regulatory or policy regimes that
threaten to fragment the global Internet and undermine its economic and
social value. I will also make some recommendations to address these
challenges.
First, I would like to make some general observations. The policy
threats we face, though distinct, are also inter-related and have
economic, human rights and security elements. For example, when China
claims absolute sovereignty over its cyberspace and erects a digital
wall around its territory in the name of security, that has profound
economic and human rights implications. Similarly, when a country
enacts a regulatory regime for cybersecurity, privacy or some other
goal, it could, intentionally or unintentionally, significantly affect
the free flow of information over the Internet and act as market
barrier. It is vital therefore that our response to these challenges
not be siloed but be coordinated--bringing together the full range of
departments, agencies and other stakeholders to advance an integrated
and strategic U.S policy. Second, cyber and Internet issues are now
being debated in virtually every country and every international and
regional organization (including the G7, G20, OECD, ITU, OAS, ASEAN,
OSCE and multiple committees in the UN devoted to security, human
rights, economic and development issues). Indeed, I believe we have
reached an inflection point, where the issues discussed and the
decisions reached in these multiple forums will have a major impact on
the future of the Internet and cyberspace--determining whether we can
all continue to benefit from this incredible technology based on the
free flow of information and multi stakeholder governance or whether
the growing technical and policy threats will lead to fragmentation and
undermine its incredible potential.
Accordingly, advancing the U.S. vision of cyberspace, including
U.S. commercial interests, requires unprecedented U.S. international
engagement and strategic U.S. leadership. Both structure and resources
need to be addressed to enable the level of engagement that is now
required.
Challenges
Though I won't attempt to catalogue the all of the many policy
challenges we face in cyberspace, some of those relevant to this
hearing include:
Maintaining Multi-stakeholder Internet Governance
The U.S. has long advocated a multi-stakeholder approach to
Internet governance that is characterized by a transparent, bottom-up,
consensus driven process in which all stakeholders--including
governments, the private sector, civil society, the technical community
and academia--participate on an equal footing. This relatively novel
approach is responsible for the tremendous growth of the Internet
around the world and has enabled the free flow of information, vast
commercial opportunity, innovation, resilience and robust technical
evolution. Among others, the organizations responsible for the
technical operation of the Internet and multi stakeholder discussions
of policy issues include the International Corporation for Assigned
Names and Numbers (ICANN), the Internet Engineering Task Force (IETF)
and the Internet Governance Forum (IGF). Though these and other
institutions can and should be further strengthened, through, for
example, more inclusive participation, they have served the community
well. Nevertheless, for many years, a number of more repressive
countries, and Russia and China in particular, have sought to impose
greater state control on the Internet and have pushed for an intra-
governmental body, such as the United Nations, to take over technical
governance and Internet policy. In part, their push for intra-
governmental control is based on their desire to control information
and expression that they believe can threaten regime stability.
Imposing a multilateral government control mechanism would
fundamentally change the Internet as we know it, and would seriously
affect the free flow of information, human rights online and thwart
innovation and growth. Fortunately, the U.S. working with like-minded
partners around the world, has succeeded so far in pushing back against
these efforts so far but they are likely to continue to be raised in
the future. For example, the Plenipotentiary of the International
Telecommunications Union, a meeting that occurs every four years to
chart the ITU's mandate, is happening this fall. The ITU is a UN body
that is made up of country representatives who largely have
telecommunications expertise and, although other stakeholders can
participate in discussion, they are excluded from decisions--a far cry
from a multi-stakeholder body. In past meetings, some governments have
tried to expand the ITU's scope to include technical Internet
governance and the ITU has often itself has tried to expand its role
beyond its area of expertise to deal with a number of cyber and
Internet policy issues. The U.S. must continue to be on high alert to
these and other efforts and strategically work with other countries and
stakeholders to thwart attempts to undermine the multi-stakeholder
approach that has served us well.
Ensuring Freedom of Expression and Human Rights Online
The global Internet has enabled unprecedented communication and
expression and that free flow of information has had tremendous human
rights and economic benefits. Yet despite the economic and social
benefits of an open Internet, some states see that openness, as
discussed above, as a threat to regime stability and seek to curtail it
by censorship, repression and restricting Internet access. The Freedom
on the Net Report 2017, published by Freedom House, details a sobering
picture of declining Internet freedom around the world and the actions
of many repressive countries to control and manipulate speech and
content. In addition, network shutdowns are a growing problem around
the world where a government restricts the public's access to the
Internet during an election or other political event. Some
cybersecurity policies can also have human rights implications. While
the U.S. encourages countries to have cybersecurity strategies that
fully incorporate human rights and economic interests, some states,
like China and Russia have ``cybersecurity'' policies and laws that are
aimed at controlling discourse and dissent. These countries both claim
``absolute sovereignty'' in cyberspace and do not recognize that
international human rights transcend international borders. Restrictive
policies curtailing the free flow of information have both negative
human rights and economic impacts. The U.S. has been a leader in
advancing Internet freedom in the past including helping found the
Freedom Online Coalition, a group of thirty countries dedicated to
advocating for these issues in multiple forums around the world. The
U.S. must continue to lead to guarantee both human rights and economic
benefits of the Internet.
Fighting Data Localization
A number of countries have enacted or are considering data
localization mandates that require data belonging to residents,
companies or entities of that country to be stored in that country.
Though these laws or policies arise in part from concerns about
surveillance or difficulty in accessing data for law enforcement
investigations when stored abroad, and are often described as privacy
or security measures, they instead, in many cases, act as trade
barriers and mechanisms to enable greater state control of content.
Data localization requirements, essentially mandating that U.S. and
other global providers construct data centers in localities around the
world, are not scalable or economically practical, and are particularly
anticompetitive to new or smaller players. These mandates also
completely undercut many of the benefits of the cloud architecture
including increased efficiency, access and the possibility of greater
security. Moreover, some states, like Russia, enact such requirements
to better control dissent. Of course, there are legitimate concerns
that some states have raised with respect to access to data. When data
is stored in the U.S., our electronic privacy laws make access for a
foreign government difficult in a law enforcement investigation even if
the crime and participants all were in that country. The U.S. has
attempted to address this recently through the Clarifying Lawful
Overseas Use of Data (CLOUD) Act. Though negotiating bilateral
agreements pursuant to this law should be a priority, the U.S. must
also continue to push back against data localization in all of its
engagements.
Addressing Potentially Conflicting, Misguided or Unfair Regulatory and
Legal
Regimes
Countries and multilateral bodies around the world are enacting or
considering regulatory, policy or legal regimes dealing with some
aspect of cyberspace and the Internet. Among other things, these
frameworks attempt to address online privacy, cybersecurity, market
access and emerging technology such as the Internet of Things (IoT).
Though some of these measures are meant to address real concerns in a
country or region, they often have unintended (and sometimes intended
effects) that extend well beyond their borders. In some cases, if the
locally developed standard is made the global default, there is a risk
of impacting freedom of speech or other strongly held U.S. values. In
other cases, there is the risk of a multiplicity of conflicting regimes
that serve to fragment Internet commerce and create a confusing
landmine for global companies. And in some cases, the policies are
explicitly aimed at encouraging ``indigenous innovation'' and act as
market access barriers.
For example, many of China's laws and regulations, including its
Cybersecurity Law, are deliberately vague but have broad implications
for data localization, mandatory testing, cooperation with Chinese
authorities, forced technology transfer and market access in China.
Though China presents this and other laws and policies as best
practices for cybersecurity, it can act as a significant impediment to
U.S. and other companies doing business in China, as well as serious
human rights concerns, and will create even further barriers if adopted
by other countries as a best practice.
The European Union has been addressing a number of issues in
cyberspace including privacy and cybersecurity. The General Data
Protection Regulation (GDPR) is now the law in the E.U. Among other
things, it creates privacy related requirements for entities processing
E.U. citizen data that extends to most U.S. Internet and global
companies. Yet, extraterritorial application of the GDPR may create
conflicting obligations for U.S. companies. For instance, the GDPR
enshrines the ``right to be forgotten'' that mandates that E.U.
individuals can force service providers to remove certain information
about themselves. However, such a mandate may well conflict with the
First Amendment right of freedom of expression and unduly infringe
public access. In cybersecurity terms, though the GDPR creates a
standard for cybersecurity protections of personal data, and has a
carve out for data that must be shared for network defense purposes, it
has had an unintended consequence in potentially rendering WHOIS, an
important tool used by industry and law enforcement to combat online
crime, less accessible and useful. The E.U. has also been working on a
Cybersecurity Act that mandates a mostly voluntary certification regime
for Internet connected devices. This law has evolved significantly with
a lot of U.S. and other industry input and could end up becoming a de-
facto global standard.
Other countries and regional organizations are also addressing a
myriad of other issues including cyber breach reporting and potential
policies around the Internet of Things. Unless these efforts are
compatible, or at least interoperable, and unless they adopt a risk
based approach, they will pose significant challenges for U.S. global
entities.
Promoting a Secure and Stable Cyber Environment
The future viability of the Internet as a platform for commerce and
social good depends on that platform's security and the long term
stability of cyberspace. Threats by nation states, organized criminal
groups and other bad actors threaten to undermine government, business,
consumer and individual confidence in the Internet and networked
technologies. Moreover, a number of recent cyberattacks and intrusions
amply demonstrate that malicious cyber activity can have large economic
impact.
With respect to cybercrime, consistent laws and strong enforcement
are paramount. The U.S. has championed the Budapest Convention on
Cybercrime which creates consistent substantive laws and procedures.
Sixty countries have now joined that Convention. Russia has long
opposed Budapest and, instead, is set to promote a new cybercrime
convention in the United Nations this fall. A new convention will take
many years to negotiate, be less strong than the Budapest Convention
and will likely seek to deal with content issues that are protected in
the U.S. More importantly, if countries wait for a new convention, it
will undermine the real need for every country to address this issue
now.
On cybersecurity, it is in the U.S. interest for countries to have
comprehensive national strategies that are drafted with multi
stakeholder input and take into account security, economic and human
rights perspectives and for countries to have institutions and the
ability to cooperate with the U.S. in sharing information and
addressing online threats. With respect to both cybercrime and
cybersecurity, targeted capacity building is important to building the
capability of other countries to work with us in addressing online
threats.
Malicious nation-state activity, such as Russian interference with
our elections and democratic processes around the world or their
sponsorship of the economically destructive NotPetya ransomeware worm,
requires both a short term deterrence strategy and a long term effort
to achieve cyber stability. On deterrence, we need to do a much better
job of imposing timely and credible costs on adversaries, particularly
nation states, who do us harm in cyberspace. On stability, it is
important that we continue to advance internationally a framework of
cyber stability that includes voluntary rules of the road, or norms,
for nation state conduct. The U.S. has made a good deal of progress on
that front, including getting agreement from many countries on
voluntary norms that countries should not attack critical
infrastructure in other countries in peacetime and should not steal
trade secrets or intellectual property through cyber means to benefit
their commercial sector. The Commission for the Stability of
Cyberspace, on which I serve as a Commissioner, is a multi-stakeholder
group that has sought to advance this work, including by proposing two
norms: 1. That state and non state actors should not take actions that
substantially damage the general availability of the public core of the
Internet and 2. That state and non state actors should not allow cyber
operations intended to disrupt the technical infrastructure supporting
elections. Getting other countries to embrace these voluntary norms and
a larger stability framework that includes the application of
international law in cyberspace and certain confidence building
measures, will pay both national security and economic dividends but
more needs to be done.
Some Thoughts on the Way Ahead
Increased Coordinated International Engagement
Given that every country and virtually every international and
regional multilateral organization is now dealing with some aspect of
cyberspace or the Internet, my overarching recommendation is that it is
imperative that the U.S. Government and U.S. stakeholders step up
diplomatic engagement on these issues around the world and that this is
made a true national priority. This recommendation is also echoed in a
number of the submissions to the recent Notice of Inquiry on
International Internet Policy Priorities issued by the National
Telecommunications and Information Administration (NTIA). To up our
game on international engagement requires enhanced structure,
resources, and a whole of government cross-cutting strategy.
I applaud the continued efforts of my former colleagues at State,
Commerce and other agencies, but I believe those efforts have been
hampered by the lack of a sufficiently high-level office at the State
Department and the recent abolition of the Cyber Coordinator position
at the White House. On the first, as I noted above, my former office,
among many other things, facilitated coordination across the government
and helped provide high level representation with other governments to
advance U.S. policies on a range of issues. I commend the House and
Senate efforts to restore, strengthen and institutionalize my former
office. The House passed the Cyber Diplomacy Act several months ago and
the Senate Foreign Relations Committee recently voted a companion bill
out of committee. I am particularly pleased that these were bi-partisan
efforts reflecting the bi-partisan nature of most of these issues.
Hopefully, the Department of State will take action on this matter
soon.
Given the cross-cutting nature of these issues, international
engagement on them requires a whole of government approach that
leverages not just the State Department and the Commerce Department but
the full range of U.S. agencies in a coordinated and strategic way. In
the past, that coordination has been significantly boosted by the Cyber
Coordinator at the National Security Council. Though the coordinator
sat in the NSC and had a focus on security issues, he also brought
together and worked with other parts of the White House, including the
National Economic Council, the Office of Management and Budget, the
Office of Science and Technology Policy, and the interagency on a range
of policy issues including Internet governance. Indeed, when the
position was first suggested in the Cyberspace Policy Review in 2009,
it was to be dual hatted between the NSC and NEC to fully account for
the wide range of issues in cyberspace. In any event, the loss of that
high-level position, coupled with the at least temporary demotion of my
prior office, complicates interagency coordination and also sends the
unfortunate signal to both our friends and our adversaries that the
Administration does not really prioritize these issues.
Resources are another important consideration. For example,
assuming my old office is resurrected, it still needs sufficient
personnel and funding to be effective. This importantly includes
funding for capacity building that was severely cut last year. Capacity
building can take many forms, including working with foreign
governments and emerging leaders on aspects of Internet governance or
regulatory policy, helping countries enact appropriate laws and
national strategies, and working with countries to boost their ability
to combat cybercrime and have strong cybersecurity policies and
institutions. For a relatively small amount, targeted capacity building
not only helps the U.S. by helping other countries gain the
capabilities to work with us, but it also has the benefit of helping to
win the support of developing countries for our vision of the Internet
and cyberspace. Convincing these countries that we want to help and
that an open, interoperable and secure Internet benefits them, is
particularly important in enlisting their support in the growing array
of multi-lateral bodies that are now addressing Internet and cyber
issues.
It is also important for the private sector, civil society and
other stakeholders to continue to engage in these efforts and enhance
their participation. Many companies and civil society groups already
work in a variety of international forums and their contributions are
invaluable. And, I fully understand there are significant resource and
time constraints both for the private sector and especially civil
society given the number of places discussions and decisions are taking
place. Nevertheless, given what is at stake we must find ways to help
increase participation.
Finally, it is important that the U.S. has a high-level cross-
cutting, integrated strategy that leverages all relevant government
agencies, outside stakeholders and like-minded countries to deal with
the many challenges we face internationally and helps direct and
prioritize our engagements. The U.S. International Strategy for
Cyberspace issued in 2011 helped guide and integrate U.S. policy and
agency actions across economic, security, and human rights issues. The
overarching goal was that ``[t]he United States will work
internationally to promote an open, interoperable, secure, and reliable
information and communications infrastructure that supports
international trade and commerce, strengthens international security,
and fosters free expression and innovation. To achieve that goal, we
will build and sustain an environment in which norms of responsible
behavior guide states' actions, sustain partnerships, and support the
rule of law in cyberspace.'' Much has happened since then and there are
many new challenges. Although the current Administration, by Executive
Order, mandated a number of important reports and recommendations from
agencies largely related to cybersecurity, no larger or comprehensive
strategy that, among other things, weaves those recommendations
together, has yet been released.
Strengthening Multi-stakeholder Internet Governance Institutions
There are a number of efforts underway to strengthen existing
multi-stakeholder Internet Governance institutions to make them more
transparent, effective and inclusive that we should continue to
support. These efforts are important not only to make these
institutions more capable but also to insulate them from those
countries trying to impose intergovernmental control over the Internet.
In addition, sustained and increased participation by governments and
other stakeholders in these institutions is also important and
increases their legitimacy. Among other things, the U.S. Government
should work to sustain and strengthen the Internet Governance Forum.
The IGF provides a valuable forum for stakeholders around the world to
engage in discourse on the full range of Internet and cyber issues.
Although its mandate was extended for ten years just two years ago, it
has suffered from a lack of sustained funding, a decrease in attendance
by senior government officials and the private sector, and issues
related to its continuity from year to year. The U.S. is and should
continue to be an advocate for this forum but should also help sustain
and improve it. The U.S. has helped fund the IGF in the past and should
do so again now and encourage other contributions. The U.S. should also
encourage and help facilitate strong senior participation particularly
by senior U.S. officials and other senior stakeholders. Moreover, the
U.S. can play a key role in helping the IGF address any perceived or
actual shortcoming without making it a decisional body or fundamentally
changing its character.
Filling the Void and Showing Leadership
If the United States wants to drive the global conversation or have
its policies serve as a global standard it has to lead by example. That
has been done in the past when, for example, we made cyber issues a
diplomatic priority or when the National Institute of Standards and
Technology promulgated their Cybersecurity Framework in partnership
with industry and very effectively promoted it around the globe. Part
of this is the high level international engagement I discuss above but
part of it is promoting concrete alternatives. For example, with
respect to privacy, the Obama Administration proposed a Consumer
Privacy Bill of Rights and there was legislative action that was
started, though not completed, to put them into law. Affirmative
privacy legislation would help push back on misperceptions by some in
Europe that the U.S does not care about privacy and can serve as an
attractive alternative for countries who are now considering privacy
legislation of their own. Federal data breach legislation has also
languished for some time even though every state has their own version
of breach legislation and other countries are moving forward with their
own proposals. I am not suggesting legislation is the only way to show
leadership and any legislation needs to solicit stakeholder input and
balance potentially competing interests, but the U.S. needs to present
an affirmative vision and concrete alternatives to policies we don't
believe serve our interests or the interests of an open and secure
Internet.
Accelerate Negotiations under the CLOUD ACT
The CLOUD Act coupled with an executing bilateral agreement takes
away one of the traditional justifications for data localization.
Accordingly, accelerated negotiations of bilateral agreements under the
Act should be encouraged and resourced. Of course, the countries or
groups of countries with whom such agreements are negotiated must have
adequate due process and privacy protections and these agreements will
not prevent governments from mandating localization if they want to do
so to repress their citizenry or to impose a market barriers, but the
potential availability of these agreements can make a real difference
with a number of partners. In addition, work should continue and
resources should be allocated to streamline and speed up the Mutual
Legal Assistance process.
Promote Cybersecurity, Cybercrime and Stability Efforts to Increase
Trust and
Security
Although this may be beyond the jurisdiction of this Subcommittee,
programs designed to increase international efforts to combat
cybercrime and promote cybersecurity should be encouraged and resourced
as these programs make cyberspace more profitable and secure for our
businesses and safer for our citizens. This includes capacity building
efforts to ensure countries have strong laws, policies and
institutions; promotion of basic cyber hygiene measures; enhanced
operational information sharing enabling prosecutions and enabling
collective response to shared threats; and increased deterrence of
malicious state actors. Finally, the U.S. should continue to
demonstrate leadership on efforts to secure the long term stability of
cyberspace and engage with other countries and other stakeholders on
this important issue.
Thank you for the opportunity to testify today on this important
and timely issue, I look forward to your questions.
Senator Wicker. Well, thank you, all, for this very, very
fine testimony. It sounds like we've got some challenges and in
that regard, Secretary Chertoff, the NTIA recently issued a
Notice of Inquiry soliciting public comment on its
International Internet Policy Priorities.
In your testimony, you mentioned how so much of the
Internet's value is in its global nature. So how do we balance
the business needs for the free flow of data with the point you
make about the need to protect our freedom of action which
requires that we take greater ownership and control of our
data, even when it is accessible to others?
Secretary Chertoff. So I think, Mr. Chairman, you're
referring to something in my book there.
Senator Wicker. On Page 4 of your testimony.
Secretary Chertoff. Right. So here's what I think in terms
of----
Senator Wicker. By the way, how's your book doing? Here it
is.
Secretary Chertoff. There is it, yes. I think it's doing
well. You're reading it.
Senator Wicker. Hundreds of people are watching right now.
Secretary Chertoff. I do think that people do need to take
ownership of their data and they do need to have more control
over their data, particularly because so much is being
generated now that really if we don't have some mechanism to
assure that we have a say in what is done with it, we really
risk our freedom.
At the same time, I'm nervous, based on the testimony we've
heard up to now, that the European method tends to be a little
bit overly bureaucratic and overly heavy-handed in terms of
regulation.
To me, the solution is to recognize that certainly with
most of the world that shares Western values, we have a common
general approach and belief in the importance of individual
freedom and individual privacy and we should acknowledge that
and work in a cooperative way to develop a system of rules that
honors that fundamental objective but doesn't get so
particularistic and so heavy-handed that it actually creates
barriers to the free flow of information.
We've succeeded in doing this in other areas, particularly
with the Europeans, and to echo what my co-witnesses have said,
this does require consistent engagement by the U.S. Government
and by U.S. civil society with counterparts in other parts of
the world.
Senator Wicker. Dr. Layton, you specifically testified, ``A
popular misconception about the EU's General Data Protection
Regulation is that it protects privacy. It does not.''
Talk about that, and if we're going to try to negotiate
with the EU on tariffs and preferences, shouldn't the GDPR be
part of our negotiation?
Dr. Layton. Short answer, yes, absolutely. Just so you
know, the word ``privacy'' only appears about three times in
the entirety of the GDPR, and it's specifically their version
of data protection, and I think it's--so our--for example, you
can go to many countries in Europe where people's mobile phone
numbers are publicly available. Their tax returns are publicly
available. People swim naked in public places. So we have very
different conceptions of privacy.
What I would like to underscore is that the GDPR is
actually a geopolitical, not a humanitarian move. It is coming
after 10 years of economic malaise in the European Union. There
is deep dissatisfaction with Brussels. Less than 40 percent of
Europeans vote in the election. So this is a reaction to that
and I would say the Europeans that I know, they want
prosperity. They want to move forward.
The public opinion was not onboard with the heavy-handed
approach that the EU took.
Senator Wicker. I believe you said that it is not evidence-
based. Is that correct?
Dr. Layton. That is correct. The idea of an evidence-based
process would include a process of data and outcome. So in the
173 provisions, you've had something over a decade of GDPR
kinds of rules that have been in place and after a decade, what
we can see is that only 20 percent of Europeans even shop
outside their own country and only 20 percent of businesses are
online.
So the rules have not worked to increase trust in their own
online system and that was the whole idea, that they would have
a digital single market the way we do in the United States, and
these rules have not helped them to achieve those goals.
Senator Wicker. Your position is it's not good for
Europeans?
Dr. Layton. No.
Senator Wicker. Is it not for Americans either?
Dr. Layton. Absolutely. And just to share one last thing
that's just happened, the European Soccer Leagues, they have
now adopted a policy that they will not trade the soccer
players and they cannot disclose the information on their
injuries. So if you want to buy a particular soccer player,
trade them to your team, you're not allowed to know what
injuries they have.
So this is also hurdling back on them, governments, as
well. The European Governments are also liable and there's
abuse.
Senator Wicker. Very good. We'll probably take another
round, if we can.
Senator Schatz.
Senator Schatz. Thank you, Mr. Chairman. Thanks to all of
the testifiers.
I'll start with Mr. Painter. You were the State Department
Cyber Coordinator for 6 years and you described the importance
of the position kind of as a policy and in a way in the
abstract.
I'm wondering if you can give me some specific examples of
what you did that made a difference in terms of the governance
of the Internet.
Mr. Painter. Sure. Among other things, I think really
central to all of this is showing U.S. leadership and building
alliances with other like-minded countries, so that we can push
back on a lot of the things we talked about today, particularly
attempts by Russia, China, other countries to take over the
Internet or to impose multilateral control over it in venues
like the ITU, the UN, and other places.
Getting that coalition of countries and having that
constant interaction with them was key to doing that and that
was the U.S. taking the lead. We weren't sitting on the back
bench. I think that was very important.
Also, incorporating issues around Internet governance,
economic issues, human rights issues in every dialogue we had
with every country. We had all these whole government dialogues
with a number of other countries and that raised these issues,
so they weren't stove-piped in one area or another.
We also helped launch the Freedom Online Coalition, which
is a group of about 30 countries, to promote freedom online and
also working in all these different international venues, and
we created and advanced a framework for cyber stability that
included the application of international law, norms of
behavior, and cyberspace confidence-building measures which
again addresses some of the instability issues of the Internet
because the Internet as a platform needs to be secure to really
underlie all the commerce that we're hoping that happens
there,----
Senator Schatz. So----
Mr. Painter.--and a number of other things.
Senator Schatz. So we should re-establish the position in
China, the statute. What else should we be doing?
Mr. Painter. So I think there are a number of other things
that we can be doing to promote this.
I mean, one is, you know, to step up this whole of
government-level engagement across the board and work with
companies and that involves forming coalitions again with like-
minded countries who would support us, who have the same basic
view, and engaging in that level.
Another thing is to provide concrete alternatives. We don't
like some of the things that are going on out there. I think we
all agree on that, but if the U.S. isn't providing concrete
alternatives when some of these countries or collections are
trying to export their laws, for instance, China or even the EU
with GDPR, if we don't have a key or an alternative that is an
attractive alternative to other countries who are looking at
this, they're going to adopt those standards and they're not
going to inure to our benefit.
So having things like there was in the Obama
Administration, the Privacy Bill of Rights, there was some
legislation to try to bring that forward, if we had a concrete
alternative that really balanced all the issues that the
panelists talked about but provided alternatives to others, I
think that helps.
And, you know, I think those are really some of the key
things we could do. There are many others, but those are two of
the important ones.
Senator Schatz. Thank you.
Secretary Chertoff, I think a lot of us struggle with the
desire to look at what happened in 2016 in terms of election
interference, especially on social media platforms, and to want
our national security agencies and the platforms themselves and
even voters to be more engaged so that we're not as vulnerable
in the future.
What we don't talk about as often is that we have to be
pretty planful and careful and precise in terms of what model
we establish for working with the Government to push back
against constitutionally protected speech and that's the
difficulty because those tools that we establish will be an
example not just for our allies and our like-minded friends
around the world but some of our adversaries and authoritarian
regimes.
I'm wondering if, you know, in the minute or so remaining
you can talk about (a) how we strike that balance and I'm not
sure you can answer that in a minute, so where we work on
striking that balance to me is the fundamental question.
Secretary Chertoff. Well, Senator, I think that's exactly
the right question.
Briefly, I would say this. I do think we have to be very
protective of the First Amendment and therefore be extremely
cautious about proposals to regulate content or say certain
content is off limits.
The First Amendment basically gives us freedom of speech,
except in a very narrow category of things. Where I do think
there's more room for actually taking some affirmative action
is in the area of disclosure of identity about who is actually
posting things.
So, for example, I know there's legislation pending about
requiring foreign entities that buy ads or otherwise pay for
space on social media platforms. I think that's consistent with
what we do offline and there's no reason not to do that.
Likewise, I don't think there's any First Amendment
protection for impersonating Americans or for bot nets or for
automated trolling or other ways of manipulating search engines
and those are areas I think we could quite usefully focus on,
working together with the social media companies.
Senator Schatz. Thank you.
Senator Wicker. Thank you, Senator Schatz.
Senator Fischer.
STATEMENT OF HON. DEB FISCHER,
U.S. SENATOR FROM NEBRASKA
Senator Fischer. Thank you, Mr. Chairman.
Dr. Layton, you had mentioned that in Europe there are some
different expectations when it comes to privacy. I would be
interested to know how you would define privacy in the digital
era.
How do we manage the privacy expectations of consumers?
Dr. Layton. Well, I'm going to give you the research the
Agency for Network Security actually developed and said that
the privacy and trust is a function of four things. It's the
level of education of the consumer or the user. It is the level
and types of technology. It's the business practices and the
institutions, and when you look at something like GDPR, it only
focuses on two of the four things.
So what I would say, if we only did one thing, we, as a
nation or individuals, we have to do more to have people be
digitally competent and digitally aware, and it's maybe not
necessarily something that the Congress defines exactly what it
is, but we have a tremendous amount of information and ability
to communicate.
So, for example, I want to recommend Mr. Chertoff's book,
which I just read, and he talked about the first thing, buyer
beware. The Number One thing in cybersecurity, you have to take
responsibility for the platforms, the networks that you use.
Senator Fischer. To define privacy in the era that we are
in now, this digital era, the first thing would be buyer
beware?
Dr. Layton. Taking responsibility.
Senator Fischer. It's up to each of us to figure out?
Dr. Layton. Well, there's a gap right now. There's a gap in
what--you know, we need to close the gap in terms of the idea
of a digital literacy or what are the 10 things I need to know
before I go online to protect myself and so that is the gap
which is missing in the GDPR today. It's what the scientific
research shows that's important and we don't even need to make
legislation to do that. We can actually--each and every person
can take a step up to take responsibility for what we do
online.
Senator Fischer. The expectation is that each individual is
responsible and the Internet is a space where you take your
chances?
Dr. Layton. No, that's not what I'm saying. I'm saying the
part of the four--the four factors that I mentioned, we're
missing two out of the four right now. OK. So we have lots of
regulations. We have lots of rules on businesses. OK. We have
lots of institutions. We're missing education and we're missing
incentives for privacy-enhancing technologies.
So I'm trying to promote as individuals we take more
responsibility for what we do.
Senator Fischer. OK. Mr. Secretary, do you feel that a lack
of any kind of unified data privacy policy could lead the
United States to becoming more isolated?
Secretary Chertoff. I do, Senator. I think that, first of
all, even within the country, you know, California's now passed
a law that deals with the issue of control of data. We could
wind up with multistate laws that are conflicting with each
other or at least inconsistent and certainly would be helpful
at least to smooth it out here.
But beyond that, to come back to the fundamental point, I
recognize that a country like Russia or a country like China is
going to be fundamentally different in their attitude to issues
like controlling data and controlling information, and so
therefore there may be limited scope for agreement there.
But I do think with Western countries, although their
particular approach tends to be different than ours, tends to
be much more regulatory, micromanaging, I think the basic value
system is very compatible and that's where I think an ability
to reach an agreement as to what our overall objective is would
open the door to them working on some of the differences which
have created barriers for our businesses as well as some
confusion about what the rules are.
So to me, this is about ultimately how do we protect
people's rights to make sure their data isn't being used in a
way that's contrary to their interests or that invades an area
that we think they ought to be in control of.
Senator Fischer. You know, many of us on this Committee
also serve on Armed Services Committee and we worry about the
security of the information that agencies have and that
agencies also share. A lot of times civilian agencies don't
have the security, say, as the Department of Defense would
have.
How can we ensure that that information that's out there is
more secure? In your role as Secretary of DHS, you were very
involved in that. What do we as policymakers need to look for?
Secretary Chertoff. I think the challenge here is unity of
effort among a lot of different agencies, many of whom don't
regard security as a core mission, and, unfortunately, Exhibit
A is the Office of Personnel Management, which probably
everybody in this room was a little bit of a victim of that
hack.
I do think the Administration has made the right decision
in designating in terms of government security DHS as playing a
lead role and I think it's important to make sure that the
department has the authorities necessary to make sure that all
the agencies live up to the requirements of basic cyber hygiene
and cybersecurity, including continuous diagnosis and
monitoring, response plans, and other kinds of elements of a
layered defense.
So that set of authorities, making sure that's firmly
lodged in one accountable agency and that it's appropriately
funded, I think would be a big step.
Senator Fischer. Thank you. Thank you, Mr. Chairman.
Senator Wicker. Thank you, Senator Fischer.
Senator Inhofe.
STATEMENT OF HON. JIM INHOFE,
U.S. SENATOR FROM OKLAHOMA
Senator Inhofe. Thank you, Mr. Chairman.
I'm glad that Senator Fischer brought up the situation on
the Defense Authorization Bill because I see a lot of
similarities here. In fact, we will be voting on that. The
conference passed the House last week and we'll probably have
it on Thursday.
I've been watching and this does change with
Administrations. We went through an Administration, eight years
of the Obama Administration that, even in all fairness, really
didn't have the priority on national defense that a lot of us
believe it should have.
As a result, we have some areas--I'm getting at trying to
determine where Russia and China are now relative to us in the
subject at hand in this Committee because I can tell you right
now there are a lot of areas in Defense, one being in the areas
of artillery. Artillery is measured by rapid-fire and range and
actually Russia and China are ahead of us in both areas.
They're ahead of us in our nuclear activities, our TRIAD, and
this hypersonic.
Hypersonic is the big thing that's coming into the Defense
system because it's a system that operates at five times the
speed of sound. So it's very significant.
So I'd like to start off by maybe--I can ask anyone. Mr.
Bladel, I keep hearing, and you folks are experts, but I hear
that, yes, we're still in our areas a little bit ahead of China
and Russia but they're catching up. Is that an accurate
characterization?
Mr. Bladel. Senator, thank you for the question. I think I
probably shouldn't speak to their capabilities as state actors.
I can say from our perspective, as a private sector company, we
see that the largest and most frequent attacks, cyber attacks
on our systems are originating from Russia and from China, and
our cooperation is primarily through private sector and
industry coalitions and coordination, both vertically and
horizontally, throughout the technology industry.
Senator Inhofe. You mentioned also, it wasn't in your
written statement, when you were speaking a moment ago, that
there are now a 120 countries that have data processing laws.
So that means there are a lot of them that don't have those and
we should have, you know, adequate protection, I think everyone
agrees with that, and we're more effective with partners.
Now the question I would ask you is we all agree that
that's right. How do we cement these relationships with the
partners that should be doing the job with us? What's the most
effective thing we can do to go out and attract partners who
would also agree that we're more effective if we do it as a
group?
Mr. Bladel. So, Senator, I think that point was made by one
of the other panelists, but I'll go ahead and build on that,
that the proliferation of different privacy regulations is
creating confusion, it's creating friction, and it is a growing
issue, as another one of the witness's testimony noticed, that
the GDPR is gaining momentum or GDPR-equivalent-type frameworks
are gaining momentum outside of Europe, and I think the answer
is that we continue to show U.S. leadership by helping to push
back on the differences and the inconsistencies between the
various frameworks and focus on those areas of commonality and
try to really around those core principles of what we believe
to be the protection of data but allowing free flow of
information and the conduct of commerce across borders.
Senator Inhofe. That's good. Secretary Chertoff, you had
made the statement that's specifically talking about the role
of the United Nations and that Russia and China want to enhance
that role. I think we all understand and agree with that, but
how effectively could we try to accomplish that?
Secretary Chertoff. I think the U.S. has generally been
consistent in saying we don't believe the U.N. is the right
forum for dealing with these issues, partly because,
particularly with the Security Council, that would essentially
politicize the process of dealing even with the technical
aspects of the Internet, which is why, of course, the Russians
and the Chinese want to do that.
I think we need to continue to look to again this multi-
stakeholder model where we go to FORA, where we can engage the
private sector, the business community, and consumers in coming
up with proposals for how to reconcile the various interests
that are a part of the Internet.
Just to follow up a little bit on the prior question, a lot
of--they used to say a lot of life is just showing up. A lot of
dealing with these issues is showing up, by being present, by
dealing with your counterparts in other countries.
My experience is you will often find there's a greater
degree of fundamental agreement than might be evident at first
but in order to be able to have the impact you've got to play.
Senator Inhofe. All right. Very good. Thank you very much.
Thank you, Mr. Chairman.
Senator Wicker. Thank you, Senator Inhofe.
Senator Capito.
STATEMENT OF HON. SHELLEY MOORE CAPITO,
U.S. SENATOR FROM WEST VIRGINIA
Senator Capito. Thank you, Mr. Chairman. Thank all of you
for being here today.
I would like to say just at the onset that the Department
of Homeland Security is in New York today announcing, I think,
a really great move on their part, which is a new Cyber Hub to
protect our critical U.S. infrastructure, sort of goes a little
bit into what we're saying or a lot of into what we're saying
today, but to be that flexus point or nexus point of the
Nation's banks, energy companies, and other industries to help
protect them from major cyber attacks. I want to say thank you
to the Secretary and I know that she probably asked for your
advice as she's moving forward. I think it's a very good thing.
All of you have talked about the GDPR and regulations that
have come from the EU. Some of you have addressed it in a
problematic way. I think, Mr. Bladel, you talked about how it's
causing you to divert assets into figuring out how to do this.
I think, Dr. Layton, you said, interestingly, that a
popular misconception is that it protects privacy. You said it
does not. It is about data protection or, more accurately, data
governance and your last statement in your written statement
says, ``Data protection is a technical issue whereas data
privacy is a legal issue.''
Do you think, as we look at governance, we need to look at
both of these issues together? If you could talk about that a
little bit.
Dr. Layton. Surely. I think the key difference is privacy,
we might see in the United States as a natural right and
something inviolable, something we're born with, versus in the
European conception, it's a government-granted right.
So the key difference there is, you know, what government
gives government can take away. A key difference from the U.S.
perspective is that our natural rights are things that are
inherent. We don't ask anything of anyone else to have those
rights versus a European approach is it's making requests and
requirements of others in order to do those things. So our
understanding of privacy is fundamentally different.
The other aspect is amongst these 173 provisions, it's
really a hodgepodge of essentially a laundry list of a set of
stakeholders that want to have certain regulations to be able
to go after American companies, to achieve outcomes that they
could not achieve in the courts or through antitrust, and the
GDPR itself actually reverse engineers a number to create a
class action lawsuit culture, so that people can have standing
in court to be able to bring lawsuits they couldn't before.
To date, the Europeans didn't want to have the sort of U.S.
style class action lawsuit culture, for better or worse, and
that has changed now so that we have now the abuse of
complaints. You could get a million complaints in a day that is
just automatically generated.
So there are 62 data protection authorities in the EU and
they don't have training on how to do this. The enforcement
will be very disjointed. It's primarily focused on U.S.----
Senator Capito. I guess if we're looking at this in terms
of the future, we need to look at lessons learned here as
they've been trying to implement theirs.
Mr. Painter, in your statement, along those same lines, you
say that the GDPR enshrines the right to be forgotten, that
mandates that EU individuals can force service providers to
remove certain information about themselves.
When I asked Mark Zuckerberg when he was in front of our
Committee, I asked him do individuals have the right to delete
their individual information, in other words, remove themselves
from Facebook, personally I believe they should have that
right, he assured me that they do have that right and that it
does happen, but I'm still not convinced it's not out there
somewhere and that it cannot be retrievable in some form or
fashion.
Do you have a statement on that?
Mr. Painter. Yes, so I think there are positive aspects of
deleting your data, and I do agree you should be able to delete
your data and control your data and have access to your data
and have transparency into your data. That's some of the data
privacy things we should be looking at.
What this does, though, I think, is create attention with
the First Amendment and human rights because what it says is
you can delete your data anywhere. You can do it perhaps as a
public figure, other newsworthy stories that people have a
right to consume, impacts First Amendment rights.
So the trick is making sure you're doing this in the right
way and the approach taken by the EU, I think, is too broad. I
totally agree with you, though, for providers, like Facebook
and other providers like that, it's your data and you should
have a chance to edit it, to remove it, et cetera, and have
access to it.
Senator Capito. Well, it seems to be just in the general
sense if we're going to figure out how to move forward
internationally on privacy, there are so many conflicts and
then we haven't even, in my questioning, you know, gotten into
what Russia and China think your right to privacy is, which
obviously vastly different.
So thank you all very much.
Senator Wicker. Before I recognize Senator Peters, was the
GDPR a statute enacted by the European Parliament or was it
written by a regulatory agency? I know it just went into effect
in May. Who can answer that? Dr. Layton?
Dr. Layton. Sure. So if you will ask Jan Philipp Albrecht,
who's the member of Parliament who--he's called the ``Father of
GDPR,'' he said that essentially formalized existing laws in
the European Union.
Senator Wicker. Of course, that's not----
Dr. Layton. That would be parliamentary laws and then there
would be an EU----
Senator Wicker. Who issued it?
Dr. Layton. The Parliament. So that's their Congress, if
you will, the EU Congress.
Mr. Painter. But, I mean, it's important, as I understand
the EU regulation-making or law-making, it's the Parliament,
it's the Council, which is all the member states, and it's the
Commission, which is essentially the bureaucracy, and they come
together and, in fact, they're looking at something around
certification for cybersecurity products right now, which the
U.S. has been engaging in.
So this is perhaps a cumbersome process but there are
chances for the U.S. to intervene, to have input, and we need
to make sure that's happening.
Senator Wicker. Would it take an act of the Parliament to
amend or change the GDPR?
Senator Peters, thank you for allowing me to interject.
STATEMENT OF HON. GARY PETERS,
U.S. SENATOR FROM MICHIGAN
Senator Peters. Thank you, Mr. Chairman. Thank you for
holding the meeting, and Ranking Member, thank you, and to our
panelists, appreciate the discussion.
You know, as we talk about the GDPR going into effect, we
have to remember that the United States, if we're going to show
some leadership, we probably should have some comprehensive
policy regime ourselves, which we are still lacking in this
country. It's hard to show leadership to the rest of the world
if we can't even get our act together here in this country.
And as all of you know, our largest tech companies are
under some pretty intense global scrutiny right now for their
mistreatment of data and while other countries are beginning to
levy fines against these companies, we are just now beginning
to ask the questions of whether or not they're too big and
perhaps in need of being reeled in somewhat.
So amidst some of these antitrust discussions, Mark
Zuckerberg and other tech giants are now recognizing that
perhaps some privacy regulation may be necessary. However,
there still seems to be a lack of will to participate in
productive discussions about what these regulations should
basically look like.
So my question to the panel is, as we talk about GDPR as it
relates to global e-commerce and the impact that it's going to
have on U.S. companies, from your perspective, were companies
that were affected by regulation, were they at the table? Were
they part of the discussion as it went forward or was their
lack of participation resulting in why we are in the position
that we're in today and the concerns that you've raised? We can
start down here with Mr. Chertoff.
Secretary Chertoff. Well, you know, I was not involved in
these discussions, but my understanding and impression is a lot
of these companies do have a significant presence in Brussels
and did attempt to lobby and interact, but I think the effect
of that is diminished if the U.S. Government's not fully
engaged for obvious reasons.
Senator Peters. Mr. Bladel.
Mr. Bladel. Yes, Senator. Our company was not engaged in
the development of GDPR. However, we were engaged as part of
the Multi-Stakeholder Governance Forum, particularly in ICANN,
in understanding what to do with GDPR and particularly how it
impacted our industry.
Senator Peters. Did you see it coming?
Mr. Bladel. We probably had less notice than we would have
liked, Mr. Chairman, probably about a year to 18 months in
advance was all we received.
Senator Peters. Dr. Layton.
Dr. Layton. Well, first of all, I would say I have been
very pleased by the response of Congress to look at these
issues. I've found it has been bipartisan. I think that there
has been a good faith effort on both sides of the aisle to
address the issue and I'm very encouraged by that.
What I would say about our American approach, the merit of
it is that we have focused traditionally on sensitive
information. We know there are things that are inherently
sensitive, health, financial, information about children. So
the advantage of that, well, certainly for the taxpayers'
perspective, we focused our resources where we know there was a
threat.
So under GDPR world, me as an academic, I have the same
liability as a major company. So there are concerns about small
entities being unduly burdened and so I think that there is
real value to the American approach we have taken.
Ms. Zheng. So Business Roundtable represents some of the
largest American companies, not just in the technology sector
but across all sectors of the economy, and I would say that our
member companies were definitely engaged in GDPR. They do have
a presence on the ground in Europe.
However, you know, the European Union is going to take
their opinions with a grain of salt, right, because it's
ultimately, you know, these are American companies,
headquartered in the United States, American jobs. It's about
the growth of American companies. They're willing to hear, you
know, our concerns but I don't know how interested they are in
addressing them.
That said, I think that companies, you know, are very much
willing to come to the table now and have an honest discussion
about a national standard for data privacy in the United States
and how to engage with the European Union and countries in
Asia, as well, to promote an interoperable framework. So we
look forward to working with members on that.
Mr. Painter. And I would emphasize that word
``interoperability.'' We're not going to change the GDPR now
that it's in effect likely.
However, I think it's important that we have regimes that
are interoperable and we also put forward our own views on
this. I think there was a lot of engagement by U.S. companies
and U.S. trade associations, frankly the Government, too, with
the EU to try to push back or guide this, just like we do in a
lot of other areas.
I think that can always be stepped up. I'll use the recent
example--and it also reflects, I think, a view in Europe or for
many in Europe that the U.S. doesn't care about privacy, which
is just wrong. I mean, the FTC does probably more actual
enforcement of privacy than most of the European entities.
However, we need to fill that void. We need to show
leadership in this area so there are alternatives and this
doesn't become a global standard, and I'll use the example of
the certification regime I talked about a little earlier. I was
just in Europe talking to parliamentarians and others about
that, a lot of industries over there, talking to them, and
there has been changes in that draft law that incorporates a
lot of the things that U.S. industry and U.S. stakeholders and
global stakeholders wanted, making sure these are industry-
driven, making sure they're voluntary, making sure this
reflects a risk-based approach.
That's important. That level of engagement needs to be
continued.
Senator Peters. Great. Thank you for all your thoughts.
Appreciate it.
Senator Wicker. Thank you, Senator Peters.
Senator Gardner.
STATEMENT OF HON. CORY GARDNER,
U.S. SENATOR FROM COLORADO
Senator Gardner. Thank you, Mr. Chairman. Thank you to the
witnesses for your time and testimony today.
I had the opportunity a month ago or so to visit some
nations in Southeast Asia. I visited Vietnam, I think it was
the same week that they were considering legislation requiring
data localization and what that would mean for Vietnam. I was
trying to understand it and explain it.
Ms. Zheng, when you talk to businesses and when they
interact with you, do they talk about the need to share with
foreign governments democratic values, ideals, things that we
believe in in America?
Ms. Zheng. Yes, absolutely, and I would add that there are
various forums where we could be pushing that agenda more
aggressively. So, for example, in our negotiations on NAFTA,
digital trade should be a part of that negotiation. A lot of
their, you know, sort of underlying open market, open data
flows priority should be included as part of that.
There are also other forums that we should be more actively
engaged in, such as the APEC CVPR Forum on Privacy. OECD is
also, I think, taking another look at their privacy principles
next year.
We need to make sure that not only, you know, companies but
also the American Government, that we're fully engaged in those
forums.
Senator Gardner. Dr. Layton, what does a country or
government like Vietnam, intend to do with data localization
policies?
Dr. Layton. I'm not sure what Vietnam has in mind but
certainly a concern to me. I'm going to punt that question to
another person on the panel.
Senator Gardner. Mr. Painter, Secretary Chertoff, what does
a China do or Vietnam do with them?
Mr. Painter. So, you know, especially with China but
Vietnam has some of these tendencies, too, there are various
reasons countries have done this.
One is to limit market access, which is a concern. One is
for a realistic concern, which is it's very hard to get data
for law enforcement purposes. That's addressed by the CLOUD
Act. I think we need to do more of these bilateral agreements.
But the third is to monitor and control their citizens
better and Russia is a good example of this. China is a good
example. If you have all the data there, it's much easier to
see what your citizens are doing, to monitor them, to have
mandatory data turnover legislation to make sure that the
intelligence and other services have access to it. That's often
what the goal is and that's harder and that's why we also have
to push back on this human rights agenda along with the
economic agenda.
Senator Gardner. I think that's exactly right. Secretary
Chertoff, what role then should the U.S. businesses play
because a lot of these telecom companies will be involved--
excuse me--technology companies will be involved in the buildup
of a localization or data center? So how does--what
responsibilities does U.S. business have then at that point?
How do you balance the need for economic opportunity and growth
and market access with the fact that a government that may be
using it to target individuals within its own country?
Secretary Chertoff. You know, I think that's a challenging
ethical problem for companies. It's a little bit like the issue
about whether you furnish intrusive surveillance technologies
to countries that are going to use it to oppress their own
citizens.
Now, on the one hand, I think some companies take the view
that if you're--as long as we're talking about China's desire
to have data about Chinese citizens held in China, that that's
really a matter for the Chinese and they're agnostic. Others
view that as enabling something that they see as inconsistent
with the culture of openness and they withdraw.
So I do think that we need to think very carefully about
the extent to which we enable the kind of behavior on the
Internet that's really fundamentally inconsistent with our
values.
Senator Gardner. You mentioned in your testimony a Cyber
NATO. Could you talk a little bit more about that?
Secretary Chertoff. Yes. I think, you know, we have a
regular NATO, which I do think has a cyber dimension, but I
think it's Toomas Hendrik, the former President of Estonia, who
has talked about really having a community of like-minded
nations that would defend our cyber assets against attacks and
not necessarily rising to the level of war that would get into
Article V but even something less than that, something that
attempts to manipulate the political process or engages in
systematic espionage or things of that sort.
Senator Gardner. So, Mr. Painter, when SISA passed the
Congress, I included legislation that required a U.S. cyber
diplomacy strategy. You were there. We had a lot of
conversations about it at the time.
So given this need for a Cyber NATO or at least this idea
of a Cyber NATO kind of approach, given the idea of a need to
have more agreements with like-minded nations as it relates to
cyber behavior data issues, et cetera, are we on the right
strategy? Do we need a new strategy? Where are we?
Mr. Painter. So I very much worry that it's not being
prioritized, that we're not showing the kind of leadership from
the top that we need to do, and, you know, there was a lot of
work we did really starting this issue from the ground up
because it wasn't really a diplomatic issue before and just a
number of years ago it was established as one.
We were the first office in the State Department that did
this. Now 26 other countries, including China and Russia, have
those offices. But I think it's important to always look and
revise the strategy we have and make it stronger and that
strategy not only helps direct the efforts of the particular
agency but really across the Government and other stakeholders
so they know where we are and other countries and so there have
been a number of things that were ordered as part of an
Executive Order early in the Administration on cybersecurity
issues.
We still haven't seen the strategy come out of that. We
haven't seen a comprehensive strategy of how you pull all these
agencies and others together. Obviously, you know, the 2011
International Strategy was a good document but that was 2011.
Things, you know, have continued to advance. So we need to make
sure we're fine-tuning and prioritizing.
I'd say one other thing we did in the State Department is
we had every regional bureau did engagement strategies around
all these issues and we had two versions of them to really
fine-tune those efforts. That needs to be done, too.
Senator Gardner. Do we need an ambassador, cyber Ambassador
at State Department?
Mr. Painter. I think we do. I mean, I'm very supportive of
the Cyber Diplomacy Act. I testified in the House about it. I
think it's a really good approach. I hope it passes this
Chamber, as well. I think it really will help elevate our game
and I think that'll be important and it's not just the
Ambassador position. It's really the structure that gives this
heft and priority.
Senator Gardner. Thank you. Thank you, Mr. Chairman.
Senator Wicker. Are the panelists all in agreement on the
concept of a Cyber NATO? Does anyone wish to take issue with
that?
[No response.]
Senator Wicker. No one steps up.
Mr. Painter. I think it depends on how it's formed. I mean,
I know Toomas Hendrik is a friend of mine, as well, and it just
depends on the details and how this gets put but certainly the
idea of having like-minded countries come together in the
common defense against shared threats, that's an important
concept.
Mr. Bladel. And based on that description, it's something
that would be interesting but we haven't formed any sort of a
position on that yet. We're just hearing about it.
Senator Gardner. Mr. Chairman, it surprises me we don't
have such a thing. I mean, why don't we have it? What's the
closest thing we have to such an agreement?
Secretary Chertoff. NATO does actually work together. They
have Center of Excellence and they do----
Senator Gardner. Right.
Secretary Chertoff.--address this issue. Now the issue
becomes, I think, in part at what stage you reach the level of
actually invoking Article V and whether that needs to be
somehow adjusted in the context of cyber activity.
I will say that in 2007, when I was Secretary, we did work
with Estonia when they were attacked by the Russians with a big
denial of service attack. So I don't think this is a big
stretch. It may just be more a question of kind of formalizing
what has been operating for awhile.
Mr. Painter. And it could be also upping NATO's game more
on this. I mean, I think NATO has done a lot of things. Cyber
is one of the key concepts of NATO and that was back now about
seven or 8 years ago and in the last few communiques from NATO,
cyber has played a key role. There's a lot of focus on both
defending NATO countries' assets but also what they can do in
terms of responding to threats and then part of this is going
to be beyond NATO.
If we're going to impose costs on adversaries, like Russia,
that's going to be us working with other allies. It's not
necessarily going to be all of NATO but there's going to be a
subset of us and we need to be able to do that.
Senator Wicker. Important testimony. Thank you, Senator
Gardner.
We now have Senator Hassan.
STATEMENT OF HON. MAGGIE HASSAN,
U.S. SENATOR FROM NEW HAMPSHIRE
Senator Hassan. Well, thank you, Mr. Chair, and thank you,
Ranking Member, for this hearing, and thank you to all of the
panelists for being here today.
I want to just start with a question to you, Secretary
Chertoff. On the topic of cybersecurity, I want to address
Russia's ongoing attacks on our election system and our
electrical grid.
Last week, the Wall Street Journal published a story that
stated that Russia's military and intelligence had consistently
sought to hack U.S. utilities and critical infrastructure. In a
few instances, Russia's state-sponsored hackers even gained
access to the utility control systems.
As one DHS official stated, this is a quote, ``The Russian
hackers got to the point where they could have thrown
switches.'' The Russian penetration of one of our nation's most
important utilities certainly conjures up fears of a Russia
cyber attack that would leave American communities without
electricity for days, weeks, or even months.
While serving as Secretary, Mr. Chertoff, you helped stand
up to the National Protection and Preparedness Directorate,
NPPD, at the Department of Homeland Security, which is charged
with defending against cyber attacks and strengthening the
security around our Nation's critical infrastructure.
Given your history with this mission, could you please
discuss how DHS can better defend against these Russian attacks
on our utilities and what sort of tools and relationships are
needed to stop these attacks?
I know there was a discussion about this new hub that
they're thinking about and it sounds to me like a good first
step, but what should we be doing?
Secretary Chertoff. So I agree, I think this hub is a good
first step. You know, when I was in office, we actually talked
about co-locating the principal actors in the private sector
critical infrastructure together with our government officials
so we could really work in real time in identifying threats.
We're not there yet but I think this is a good step
forward. I would continue to press that as well as giving
clarity to some of the elements of critical infrastructure
about exactly what they need to do.
One of my recommendations has been to take the Safety Act,
which applies in giving liability protection for certain
counterterrorism technologies and extend that to cybersecurity,
so you'd create economic incentive for companies to invest in
processes and technologies that would lower their risk of
cyber. So I think that's one area we ought to be focused on.
The second, candidly, is we need to have a clear doctrine
about how we respond to various kinds of intrusions by enemy or
adversary nations into our critical infrastructure.
You know, we know what we did in 1963 during the Cuban
Missile Crisis when missiles were positioned in Cuba. What
happens when malware's positioned in critical infrastructure?
Do we treat that as espionage and reconnaissance? Do we treat
it as positioning a potential weapon?
I think we need to have clarity and a discussion about what
our strategic response is to these varying levels of threat. I
know in the NDAA there's a provision for a Project Solarium in
cyber which would be the equivalent of what we did after the
invention of the Atomic Bomb to develop a doctrine, and I think
having a doctrine and having a strategy and a set of rules of
engagement would go a long way in creating some element of
deterrence to what right now, I think, is a very ambiguous and
challenging environment.
Mr. Painter. If I could say one thing on that?
Senator Hassan. Sure.
Mr. Painter. I think there's a critically important part
that's missing. We don't even have a declaratory statement that
things like Russian interference in our election, the big
NotPetya Worm that caused economic damage with its
prepositioning is something we're going to take action on and
impose costs on. We need to do that. We need to do that now.
Senator Hassan. Well, that's very helpful, and on the issue
of the private-public not only interaction and partnership
being important, it's something that I agree with you on and
that's why today, Senator Portman and I are introducing a bill
that would establish the DHS Cyber Incident Response Team Act
and it would authorize in law DHS's Cyber Hunt and Incident
Response Team and allow select private sector cyber experts to
participate in these teams. So we're trying to move this
forward.
I appreciate that insight very much. I also take to heart
the point about having a doctrine and really treating cyber
attacks as the threats that they are and the attack on our
country that they are.
Mr. Chairman, I'm just about out of time. So I will yield
it back. Thank you very much, and thank you all to the
panelists again.
Senator Wicker. We didn't have a doctrine in 1963 until it
happened, did we, Secretary Chertoff?
Secretary Chertoff. In 1963, what we relied upon was the
view that essentially positioning missiles very close to the
United States was sufficiently a war-like act that we could
engage in a blockade. I think we called it a quarantine to kind
of fuzz it up a little bit, but I think it relied upon
principles in the physical world that were relatively well
accepted.
It gets much more complicated in cyber because, first of
all, people loosely use the word ``attack.'' Sometimes it just
means espionage, which we've never regarded as an act of war.
Sometimes it means literally something that could result in
loss of life, which is unquestionably an act of war, and then
you have this middle position.
So this is, I think, a much more ambiguous set of
circumstances than the physical world.
Senator Wicker. Thank you very much.
Senator Udall, you've been very patient. Senators have come
and gone and you've stayed here.
STATEMENT OF HON. TOM UDALL,
U.S. SENATOR FROM NEW MEXICO
Senator Udall. Thank you, Chairman Wicker.
Senator Wicker. You're recognized for five and a half
minutes.
Senator Udall. Thank you. Thank you, Senator Schatz.
Appreciate the panel being here today.
As a member of the Foreign Relations Committee, I'm
particularly concerned about how powerful tech-savvy countries,
like Russia and China, limit access to the Internet in their
own nations by banning and controlling any dissent online while
simultaneously using the same banned platforms, like Facebook,
to sponsor and promote disinformation in the West and in the
U.S.
We are now all too aware of Russia's pervasive misuse of
social media in our 2016 election and the Brexit vote in the
U.K. The U.S. has a critical role, I think, as all of you have
been talking about here, to play in ensuring that we are
deterring this kind of state-sponsored disinformation campaign
while promoting an open and global Internet.
Russia's, and I guess this first question but others can
comment, as Mr. Chertoff and Mr. Painter, Russian militia cyber
activity remains a national security threat, no doubt about
that. They attacked our 2016 election and sponsored the
destructive NotPetya malware.
What are the most important actions our Government should
be taking to deter Russia from this type of malicious activity?
Just focus on, say, one or two or three like that, I think
would be good.
Secretary Chertoff. Well, I think when you deal with
ransomware, particularly ransomware that can potentially affect
industrial control systems and have an impact on human life, I
think that deserves the kind of response that we would do with
respect to a physical attack that might have a threat to human
life, which means we have to have the ability to respond either
in kind or in another way to deter that.
When it comes to information operations, which, to be
honest, go back a hundred years to the Comintern, when the
Soviet Union existed, I don't regard that as an act of war. I
do think it's a matter where there are things we can do in
terms of calling out who's really responsible for putting posts
up or things like the Internet Research Agency in St.
Petersburg where they use armies of trolls to drive stories,
but I think legally as well as in terms of our, in general, set
of values, we don't want to actually censor content, even if we
know it to be untrue and false because the cure for falsity
tends to be truth and once you go down the road of censorship,
it doesn't really stop.
Mr. Painter. And I would add to that, I think that, you
know, we've seen a lot of malicious activity from Russia and
the DNI has said that Russia is one of the foremost damaging
cyber actors or capable cyber actors, China, Russia, North
Korea, and Iran, but Russia really at the top, and Russia has
hit us in a variety of ways, including NotPetya, including the
election interference, including this prepositioning, and yet
we haven't really done anything to affect Russian's calculus in
any event.
And so we obviously don't want to be overly escalatory.
We're not going to shut off the lights in Moscow, for instance,
but we should do something that will actually affect Putin in
his decisionmaking in the future and there has been this effort
now to call out things. There has been a NotPetya. A number of
countries got together and I think that's good to build those
alliances and have countries to come together and say that
Russia was responsible. Great. But you're not going to name and
shame Russia. You actually have to do something that's going to
have an effect and that goes to the doctrine question.
And then, also, I would think in the U.S., there are other
things we could be doing, like having a task force, a high-
level task force to deal with election interference. As a cyber
guy, I don't think we really saw this coming. We saw threats to
infrastructure. We saw espionage, but this hybrid attack is
something that requires a real concerted approach.
The declaratory policy I talked about is important, too,
and, look, we can do the sanctions. We can do all the tools we
have, diplomatic sanctions, law enforcement, and others, but if
we don't have high-level messaging and consistent messaging
from the top, that undercuts all those efforts.
So if you send a message that this is unacceptable and then
send a message, well, maybe it's OK, that just undercuts
everything we're doing.
Senator Udall. Mr. Chertoff or any of the other panelists
want to weigh in on that?
Dr. Layton. So I wanted to say thank you for bringing up
this concern and I certainly agree with the panelists.
What I just want to emphasize, I think when you--we can
think about the threats to our security, not just from--maybe
from military, but there are economic threats, and if I have
any bit of advice for Congress, I think we haven't paid
attention to the rise of Chinese platforms.
Two years ago, the Chinese app market exceeded the United
States in revenue and downloads and I know a lot of people who
already use the Chinese versions of Amazon and Google and so
on, and they don't want to open their markets to the United
States. They want an indigenous technology strategy, but they
want to come and take our markets.
So I would like to put up that the threat of China from an
economic perspective for our digital economy is just as great
as the cybersecurity threat from Russia.
Senator Udall. Do I still have my 30 seconds?
Secretary Chertoff. Could I just add one other thing I
think we need to focus on? The Chinese have indicated that in
the next few years, they want to become global leaders in
artificial intelligence. The way you build artificial
intelligence or machine learning is with data and it's not a
surprise that we've seen some incredibly large data thefts in
the last few years, like the OPM theft, Yahoo, one of the other
credit companies, but I think we need to be mindful that these
kinds of data thefts, while they may not seem that critical,
actually can be feeding a very significant growth in artificial
intelligence capability which may be what we're talking about
in a committee like this in 5 years.
Senator Udall. You mentioned, Mr. Chertoff, on the
misinformation and the answer is truth. We should be mindful
because the frustrating thing is there's an old saying in the
West. The lie gets halfway around the world before the truth
puts on its boots. So we need to realize by being open like
that, we're also taking a hit at the front end but we have
faith that it will prevail in the end, that the truth will
prevail.
Thank you very much. Thanks to the panel.
Senator Wicker. Senator Markey, are you ready?
Senator Markey. Ready to go.
Senator Wicker. Jump in front of Senator Cantwell.
STATEMENT OF HON. EDWARD MARKEY,
U.S. SENATOR FROM MASSACHUSETTS
Senator Markey. It's a privilege to be at such an important
hearing today and, Mr. Painter, in your written testimony, you
state that, ``The future viability of the Internet as a
platform for commerce and social good depends on that
platform's security and the long-term stability of
cyberspace.''
I share your belief in the importance of cybersecurity and
I'm particularly concerned about cyber threats of the IoT, the
Internet of Things or the Internet of Threats, which it is
simultaneously, where our devices, our appliances, our machines
all connect with one another.
Mr. Painter, the EU is currently considering a
cybersecurity act, which would create a single cyber-security
certification standard for information and communication
technology devices.
I have introduced similar legislation in Congress, the
Cyber Shield Act. My bill would establish an advisory committee
of cybersecurity experts from academia, industry, consumer
advocacy communities, and the public to create cybersecurity
benchmarks for IoT devices, such as baby monitors, cameras,
cell phones, laptops, and tablets.
IoT manufacturers can then voluntarily certify that their
products meet those industry-leading cybersecurity and data
security benchmarks and display the certification to the
public.
Mr. Painter, are you supportive of establishing voluntary
standards like this in order to inform consumers and catalyze
industry investment in cybersecurity?
Mr. Painter. Senator, I think the U.S. has a history of
advancing these things, NIST, for instance, with a critical
infrastructure, the NIST Framework.
I think in this area, this is a lot like a UL----
Senator Markey. UL?
Mr. Painter. Underwriters Laboratory on electric devices,
and I think it has a lot of merit. I think it makes a lot of
sense, particularly if you look at a couple things.
One, voluntariness, two, built with the industry that it's
meant to apply to, so the industry and it's not a one-size-
fits-all and I don't read your bill to be that. I read your
bill to be built with industry, with this advisory committee.
I think also it needs to be risk-based, so you're not
necessarily prescribing a particular technology but you're
looking at what the risks are. I think all those are good
things.
I think there are a lot of comments that the U.S.
stakeholders have had in the EU Cybersecurity Act that they've
taken. The one thing I'd also be cautious of is to make sure
that it's not creating a conflicting regime with what's being
done in the EU but at the same time, I think would show U.S.
leadership because a lot of countries are thinking about this.
I know Singapore and a number of other countries are
creating consortiums and other people to look at IoT regulation
and artificial intelligence regulation.
I know DHS and Commerce put out some principles on this
about a year and a half ago, but I think this kind of voluntary
regime built with industry has a lot of merit.
Senator Markey. Do any of the rest of you agree that a
voluntary regime could work in the United States using that
kind of framework? Yes, Mr. Secretary.
Secretary Chertoff. I agree with that and something I
suggested a little bit earlier might also be relevant here,
which is to take the Safety Act concept, which we use with
respect to counterterrorism technologies, and apply that over
here, as well, because it creates an economic incentive to get
the certification since the Safety Act caps liability and
damages. So I think that kind of approach would be very
worthwhile.
Senator Markey. Thank you. Ms. Zheng.
Ms. Zheng. I was just going to add, I think I want to
reiterate on Chris Painter's point, which is interoperability
is a key issue here.
One concern is that if there is a voluntary regime here in
the United States for IoT that dictates how IoT products are
designed or developed or maintained, that other countries would
also feel that that gives them license to develop their own
national approach and there again you have tremendous
fragmentation.
So, you know, I'm happy to hear that the approach that
you're thinking is inclusive of industry and developing it, but
I think that fragmentation concern is real.
Senator Markey. Mr. Painter, if I may, Secretary Tillerson
chose to downgrade the cyber coordinator position, your former
position, last year, even as we know there's an intensification
of cyber attacks on our country. We know that there is
malicious cyber activity coming from North Korea, from Russia,
from China, from other places.
What's your recommendation as to what our Government should
be doing in order to elevate rather than downgrade this role?
Mr. Painter. So I think the threats are only increasing.
The policy threats are increasing. The technical threats are
increasing. The actors that are attacking us, whether they be
transnational or organized criminal groups or nation states,
are increasing.
We have to make this a national priority. We can't afford
to demote this issue or make it a boutique issue that's only
dealt with it by the cyber people. This has to be an engrained
national priority from this Administration, from every
Administration, and I think downgrading these roles and
downgrading the roles at the White House sends the wrong
message to both our friends and our adversaries. We need to
lead in this area.
Senator Markey. Yes. I hear you. I think the Trump
Administration made a big mistake. We will in fact put the laws
on the books that we need. I'm afraid it's just going to come
after we have a catastrophic event in our country and then
everyone will say who knew this could happen. We know this can
happen. That's what you're testifying today. We should put the
preventive laws on the books.
Thank you, Mr. Chairman.
Senator Wicker. Thank you very much, Senator Markey.
Senator Cantwell.
STATEMENT OF HON. MARIA CANTWELL,
U.S. SENATOR FROM WASHINGTON
Senator Cantwell. Thank you, Mr. Chairman, and thanks for
having such an important hearing, and I really appreciated the
testimony of the witnesses. You've all said very illuminating
things as it relates to our challenge as a nation, both on the
commercial side of working together on tightening up where we
are and certainly, Mr. Chertoff, talking about the attacks to
the grid and the large-scale efforts on things like Ukraine can
be very devastating to the United States, and, Mr. Painter,
thank you for articulating that we need to be doing much, much
more than we're currently doing.
That's why last week, my colleague and I, Senator Graham,
sent a letter to the President saying please step up, both on
the assessment side and the resource side because this is a
pretty big issue.
But one thing I wanted to ask about, writ large, given all
of your testimony, because I agree, I don't think provocation
comes anymore with a foreign sticking its, you know, nose in
U.S. waters or a plane flying over. I think provocation comes
from, you know, this kind of hacking of a power plant or a
pipeline or something of that nature that we are seeing in
other parts of the world.
So I think this debate has gotten a little off course as it
relates to what we do and what other people do and I just want
to be clear since you're all articulating an international
focus.
Should it be clear and should the United States lead such
an effort that any attack on an election system, that is the
actual system itself, to interfere with an election, should be
something that we should unite the entire world, that that is a
cyber crime, and should be prosecuted?
Mr. Painter. Well, we saw two aspects of this. One, the
attempted attack on the election infrastructure itself and also
the influence operations, so we meet those in two different
ways.
But, absolutely, if you look at critical infrastructure,
yes, we're working about prepositioning on power grids and
other things, but if there's an attack that really undermines
the democratic foundation of our system, that's a huge deal and
we need to take that seriously.
In this Commission that both Secretary Chertoff and I are
on, this Commission for the Civil Society, we just recently
released a proposed norm for governments and others to take up,
which is exactly that, you should not attack the systems, the
devices, the mechanisms that are used for elections, for
democratic and other elections, and I think that's a key thing.
So, absolutely, and I think that's one of the things we
should continue to have discussions with other countries on. We
know that the Dutch, we know the Germans, the French, and
others have also and the Estonians and almost all the Baltic
countries have seen this. So it is absolutely a big deal.
Senator Cantwell. Is everybody else in agreement with that?
Dr. Layton. What I would just like to add, I really welcome
that Congress is taking the concern, taking this up, but what I
think it's important to say that there has been desire by other
countries to influence our elections for decades.
So, you know, this isn't the first time it's happened. I
think it's great that Congress responds now but this has been
going on for a long time and just to pick up the point, I
applaud that Congress is going to pick up legislation to look
at particular areas we need for cybersecurity.
Senator Cantwell. No. I'm asking you whether you believe in
an international--that we should be leading the charge
internationally to say that anybody who tries to influence with
the election process in a cyber way is a cyber crime and that
we should unite the world against that? That's what I'm asking.
Dr. Layton. OK. No, what I would like to express to you is
I think that the cyber concern has been maybe for 25 years now
and we have been slow to fully integrate it into the military.
So I don't think we need to make the silo. I think it
should be fully part of the military from the ground up. So I
don't need to have to call it that and so there has been some
resistance because of maybe the way the established Defense
Departments are. They have their turfs that they have been
reluctant to bring cyber in and integrate it as they should.
Senator Cantwell. Trust me, that's why I'm working with
Senator Graham, because the two of us are going to keep
focusing on this.
Mr. Chertoff.
Secretary Chertoff. I have to say I completely agree that
we ought to work with all of our like-minded colleagues
overseas to see that interfering with the actual infrastructure
of elections is completely off limits and unacceptable.
The information operations gets challenging because while
we should resist them, we need to be careful how we articulate
it because if you go to Moscow, they'll say, great, let's get
rid of, you know, the National Endowment of Democracies and,
you know,----
Senator Cantwell. I agree. That's why I'm bringing this up,
Mr. Chertoff, because I do not want to lose action on the first
part.
Secretary Chertoff. Correct.
Senator Cantwell. And we should be leading the charge. No
government should be involved in interfering with the actual
election operations. End of story. We should be leading the
charge, but there are some people running around this town
basically saying, oh, well, there's this other stuff and we all
do it and we should let this go. We should not let this go, so.
Secretary Chertoff. I agree with you. They're totally
different. We should not blur the lines in a way that blunts
our ability to respond.
Senator Cantwell. Thank you, Mr. Chertoff. Thank you.
Senator Wicker. Thank you, Senator Cantwell.
Senator Cruz.
STATEMENT OF HON. TED CRUZ,
U.S. SENATOR FROM TEXAS
Senator Cruz. Thank you, Mr. Chairman. Good morning.
Welcome to each of the witnesses. Thank you for being here.
Dr. Layton, this past January, as you know, a memo leaked
from the National Security Council which called for
nationalizing the 5G Mobile Broadband Networks and since then,
the Administration has been less than clear in rejecting that
idea.
I and many members of the Senate consider that to be a
profoundly bad idea. That's why Senator Cortez Masto and I
together introduced the E-Frontier legislation last week, which
would prohibit the Federal Government from nationalizing our
Nation's commercial telecommunications network without
authorization from Congress.
Dr. Layton, in your judgment, what would it mean if the
Federal Government were to nationalize our Nation's 5G
networks?
Dr. Layton. There would be a disaster. I saw the press
release today, and thank you and Senator Cortez Masto for your
leadership. It certainly helps me sleep well at night.
But I would say if there's one point that we know in
telecommunications policy that we have evidenced over and over
again is that governments should not be running the
telecommunications network. It has been a colossal waste of
money, colossal waste of energy, and it's not where we should
put our resources, particularly when we have private companies
who are willing to put up $300 billion to have all kinds of
competitive 5G networks. So it's not where we should put our
money.
Senator Cruz. In your judgment, is the E-Frontier Act the
right direction for this committee and Congress to go?
Dr. Layton. Absolutely.
Senator Cruz. Does anyone on the panel disagree? Does
anyone think that the Federal Government nationalizing 5G is a
good idea?
[No response.]
Senator Cruz. Secretary Chertoff, what are your thoughts on
the implications, if the Government were to try to nationalize
5G?
Secretary Chertoff. Well, again, I'm not sure exactly what
that would look like. I'm not sure exactly what that would look
like, but, in general, I think nationalization of a function
like that stifles innovation and puts the Government in a
position which overreaches in terms of what its proper role is.
Senator Cruz. Mr. Bladel, there has been considerable
attention devoted in Congress and in the national discussion to
the role of tech companies and social media companies engaging
in political censorship.
What do you think the role and what does GoDaddy think the
role should be of tech companies censoring the speech of
others?
Mr. Bladel. So thank you, Senator. I can't speak for the
entire industry but from GoDaddy's perspective, we do not want
to be an arbitrator of free speech. We don't believe that's an
appropriate role for us as a private sector company. We are
supporters of an open Internet that supports free expression
and welcomes all views.
That said, we do have Terms of Service for using our
platform for communication and there are some very specific
cases that would cause us to suspend or terminate service,
illegal activities, threats of violence, and pharmaceutical
sales and things that are called out in our Terms of Service.
So any content complaints that we receive are subject to a
case-by-case review and then we decide according to our Terms
of Service, but as a private sector company, we do not want
that role.
Senator Cruz. So I think you would not find disagreement
when it comes to shutting down criminal enterprises conduct
that clearly violates criminal law. What does obviously raise
questions is when it's not criminal conduct, it is simply
content that may be offensive, that may be wrong, but that is
not illegal, and then the question becomes who should be the
gatekeeper. Who decides what speech is permissible and what
speech is not.
Have there been instances in your company's history where,
because of disagreement with content, you have shut down access
to a website?
Mr. Bladel. So typically as part of that review, the
content would have to contain illegal materials or rise to the
level of a direct call for or threats of violence for us to
take action.
Senator Cruz. You obviously operate within the tech space.
Should social media companies, in your judgment, be neutral
public forums? Should they respect First Amendment principles
and allow, as John Stuart Mill put it, the cure for bad speech
to be more speech rather than a priori censorship?
Mr. Bladel. So in my view, and I think this is shared by
GoDaddy and other companies in our space, is that we want the
Internet to be as open and welcoming as possible for free
expression and that it's not the role of the platform to judge
content on whether it's offensive or whether it's allowable. It
should only be on those narrow cases of illegal materials.
Senator Cruz. Thank you.
Senator Wicker. Thank you very much, Senator Cruz.
Senator Klobuchar.
STATEMENT OF HON. AMY KLOBUCHAR,
U.S. SENATOR FROM MINNESOTA
Senator Klobuchar. Thank you very much, Mr. Chairman. Thank
you to all of you.
We have a Judiciary hearing going on. So I just snuck down
here and I want to thank you for your work.
As many of you know, I've worked, because of my role on
Judiciary and Rules and this Committee, I've worked really hard
on this issue and I really see this, what happened to us in the
last election, as a cyber attack and there are plenty of good
issues that were raised here by my colleagues about the power
grid and other things, but I want to focus on this, and I'll
start with you, Mr. Chertoff.
I know you mentioned the bill I have with Senator Lankford,
the Secure Elections Act, which would basically streamline
information-sharing between Federal and State agencies. It was
quite an outrage that our 21 states that were hacked and too
many of them didn't find out for a year and that way they can't
protect themselves because they don't know what other hack was
going on in another state.
So my first question is, do you think our states are
adequately prepared? You know, we got the $380 million out in
the last budget agreement, and what else should we be doing to
protect our voting equipment?
Secretary Chertoff. Well, I think there's greater
understanding now they have to get engaged and they have to get
engaged with DHS.
When I was at Aspen a couple weeks ago, I mean, the word we
got from DHS was that all the states to some degree are
engaging now, but to be honest, this ship is going to take
awhile to turn around.
You've got aging infrastructure in many places. I think
some states are not even fully aware of how much they're
connected to the Internet.
Senator Klobuchar. You also have 14 states that have either
no paper ballot or partial paper ballot.
Secretary Chertoff. Right. And that's going to require a
change in equipment and change in protocol.
So the short answer is we're not where we need to be. We're
moving in the right direction. We ought to press the
accelerator on this. I don't know that we're going to have this
problem fixed by 2018. I would be very doubtful, but certainly
we're going to have elections in 2020 and by then, we should
have had the problem fixed. So we've got to step it up.
Senator Cantwell. And what's Microsoft's Defending
Democracy Initiative doing to help state and local officials?
Secretary Chertoff. What they're trying to do is, and I
think it's a relatively new initiative, is work with a lot of
different groups to both help people understand what the
threats are--I mean, I think at a public forum we had in Aspen,
they indicated that in fact they identified some candidates
whose databases had been hacked.
I think raising awareness, sharing the information about
technical solutions, and working both in terms of raising the
game on infrastructure protection and more generally on
information operations. They're looking at kind of supporting
all these efforts.
Senator Klobuchar. And then also on the front of the
political ads, as you know, it wasn't just about elections and
candidates, it was also disrupting democracy with issue ads.
That's why I've introduced the Honest Ads Act with Senators
McCain and Warner.
Do you agree that it's important that we have uniform
standards across platforms for these ads?
Secretary Chertoff. Yes. Absolutely. It's crazy to say that
we can require for television ads or newspaper ads but not to
do it for platforms, and let me just add one other thing. This
is not just about elections.
I think that we are seeing and will continue to see Russian
efforts to motivate people to have civil disorder where they
get both groups on the right and the left to come to the same
place and they try to gin up violence.
Senator Klobuchar. Thank you. Those are the issue ads that
are included in our bill but some of the platforms are saying,
well, we should just do candidate ads, which is not the
standard for radio or TV or newspaper, and we've seen what they
were doing in energy issues and other things where they
actually had a financial interest, Russia did.
Secretary Chertoff. Yes.
Senator Klobuchar. And I think they've been overlooked
because of the obvious focus on the 2016 election.
Secretary Chertoff. That's exactly right.
Senator Klobuchar. OK. Dr. Layton, my last question here.
Over the last few years, we've seen personal information be
disclosed. We are proud of our social media and Internet
companies in the U.S. They're incredibly innovative and a lot
of smart people are working there, but yet even Mr. Zuckerberg
at his hearing has said that we need to put some rules of the
road in place. They don't have to be exactly what Europe did.
We can do our own.
Could you comment on the Social Media Privacy Protection
and Consumer Rights Act that Senator Kennedy and I introduced?
Dr. Layton. Well, you know, I want to applaud you for your
leadership and I think if anybody thinks Congress is not up to
task, you've proven them wrong. You know, you guys were very
quick to turn something around and I'm very grateful for that.
So, I mean, I think in this hearing, this is exactly the
steps that we need to take. In terms of--and this is the
conversation. It would be wrong to say, oh, you know, Europe
did this, let's hurry up and get our version. I think that's a
mistake. I think that this committee is going through the
necessary steps. It's taking the input from all the
stakeholders and, you know, I think my particular feedback
today is the two important components that we haven't included
that's very important is the consumer education component as
well as we need incentives for privacy-enhancing technologies
and that's why a safe harbor that would allow a company to
innovate a new technology, they wouldn't be punished for it,
for example, because we know the first time you make a version
of your product, it may not work, and so there's no kind of--we
need a safe harbor for that permissive innovation.
I think that your bill had a provision for that and I thank
you for that. I think ultimately we'll win this through
innovation, science and technology.
Senator Klobuchar. Thank you very much, and the rest of the
questions I will do on the record because I'm out of time, but,
Ms. Zheng, I did have a question about data localization and
the problems that creates and will just do that on the record,
and then, Mr. Painter, I'm sure I'll have some cyber attack
questions to ask you about.
So thank you very much.
Senator Wicker. Thank you, Senator Klobuchar.
I have a letter, dated today, to Senator Schatz and me,
from Pat Kane, Senior Vice President of Verisign, Incorporated,
and I ask unanimous consent to place it in the record at this
point. Without objection, that will be done.
[The letter referred to follow:]
July 31, 2018
Hon. Roger Wicker,
Chairman,
Subcommittee on Communications, Technology, and the Internet,
Committee on Commerce, Science, and Transportation,
Washington, DC.
Hon. Brian Schatz,
Ranking Member,
Subcommittee on Communications, Technology, and the Internet,
Committee on Commerce, Science, and Transportation,
Washington, DC.
Dear Chairman Wicker and Ranking Member Schatz:
Thank you for holding today' s hearing, which provides Committee
members the opportunity to explore important issues regarding the
global Internet and digital communications issues. Verisign is an
important stakeholder in the global Internet ecosystem. Our company
operates the critical infrastructure that helps keep the world's
digital economy online. We perform critical and unique services that
keep the Internet running. We publish the authoritative root zone file
daily, we operate 2 of the world's 13 root servers, we operate the
network infrastructure for the most important top-level domains, .com
and .net, and we are trusted to provide the back-end operations to the
United States government for the critical .gov TLD. We are proud that a
few weeks ago we marked our 21-year anniversary for operating the .com
and .net Domain Name System without any service interruption.
With this background in mind, we are writing to offer Committee
members our perspective--based on the company's 25-year history of
providing critical infrastructure services for the global Internet
community--on policy issues surrounding the domain name system (DNS),
and in particular, issues related to the Cooperative Agreement between
Verisign and the Department of Commerce. Arguments related to the
Cooperative Agreement arise in the written testimony of Mr. James
Bladel, GoDaddy's Vice President of Global Policy. That testimony does
not, however, adequately describe the vibrant and competitive landscape
in the DNS that has taken root after 25 years of U.S. Government policy
that established competition in the DNS as an important objective at
the dawn of the Internet era. We will help complete that record today.
While GoDaddy asserts that Verisign's share of the ``legacy generic
Top-Level Domains (gTLDs) is over 80 percent,'' this presents an
unrealistic and incomplete snapshot of the global DNS. Indeed, since
2012, roughly 20 million domains have been registered in other TLDs,
including new gTLDs (like .attorney and .bank) and ccTLDs (like .uk and
.de), all of which compete for registrations in this industry. In fact,
.com and .net make up only about 44 percent of the total world wide
registrations, a number that has been shrinking since the introduction
of new gTLDs by ICANN in 2012. Verisign is limited by regulation that
requires it to sell domain names only to accredited retailers at a
fixed price of $7.85. Verisign is also prohibited by regulation from
selling directly to consumers. These retailers, of which GoDaddy is by
far the dominant market power, sell to consumers and, because they are
unregulated, they sell domain names for any price they choose.
Furthermore, GoDaddy sets market prices both in the U.S. and abroad
unfettered by government or ICANN regulation.
Second, Mr. Bladel discusses the negative impact of .com pricing on
small business who are ``very sensitive to price increases'' and that
``any increase has the potential to suppress their ability to grow. . .
.'' Mr. Bladel however, does not disclose that GoDaddy sets the price
for domain names and that for many names, it charges prices that are
many thousands of times the wholesale price of $7.85. GoDaddy sets
these prices and charges consumers, including its small business
customers, the prices it believes the market will bear.\1\ In fact,
recently, GoDaddy has become one of the biggest players in the
secondary market--having bought hundreds of thousands of these domain
names so that it can sell them to consumers at prices far in excess of
their wholesale price of $7.85. Some estimate that the secondary market
exceeds $1.6 billion per year. Indeed, GoDaddy has a platform that it
uses and allows other to use to sell these domain names in addition to
the many hundreds of thousands of names it has already purchased. For
example, offered on GoDaddy's website today:
---------------------------------------------------------------------------
\1\ The benefits from the regulatory price caps on .com that
GoDaddy and others do not want changed have not been uniformly passed
on to consumers.
``Olemiss.com'' offered at $9,499 (Ole Miss is a registered
---------------------------------------------------------------------------
trademark of the University of Mississippi)
``BestUsedCars.com'' offered at $27,900
``Yoursenator.com'' offered at $9,999
``MariaCantwell.com'' offered at $9,888
``SenatorMarcoRubio.com'' offered at $5,000
``SenatorLee.com'' offered at $5,000
``SenatorCruz.com'' offered at $5,000
``Blackburn.com'' offered at $127,400
Third, Mr. Bladel recommends that the .com Registry Agreement
between ICANN and Verisign be ``put out for competitive bid.'' Again,
Mr. Bladel's testimony fails to disclose a critical fact and that is
that every single registry agreement with I CANN, not just .com but
over a thousand of other such agreements, contain a presumptive right
of renewal that requires I CANN to renew the agreement unless the
registry operator does not perform its obligations under the agreement.
As Mr. Bladel admits, there are ``no complaints'' with our performance
under this agreement and therefore, there is simply no basis to raise
this issue.
Finally, the Committee should recognize that Mr. Bladel's testimony
with respect to the Cooperative Agreement, could be seen as that of a
distributor who seeks to constrain the wholesale price \2\ of its best-
selling product in the name of consumers without acknowledging its own
substantial commercial interest in doing so, or its own practice of
reselling domain names at exorbitant prices. And while completely
ignoring the critical infrastructure services Verisign provides not
just to GoDaddy and its customers, but to Internet users world-wide,
who, for 21 straight years have had uninterrupted availability of our
networks in order to reach their online destinations.
---------------------------------------------------------------------------
\2\ Consumers can avoid any price increase in any lCANN top-level
domain by purchasing a ten=year registration as permitted under all
ICANN registry agreements.
---------------------------------------------------------------------------
Verisign thanks the Committee for the opportunity to provide this
perspective given our experience as a leading critical infrastructure
provider for global Internet services.
Sincerely,
Pat Kane,
Senior Vice President
VeriSign, Inc.
Senator Wicker. We are told that another distinguished
Member of the Committee may be on his way.
Senator Schatz, I think this has been a very excellent
hearing. Perhaps we can filibuster for another moment or two.
There are dozens of questions we could ask.
You know, Dr. Layton, are you speaking for AEI or on your
own behalf?
Dr. Layton. No. Thank you for giving me that opportunity to
clarify. As my submitted testimony shows that I do not
represent the positions of AEI or any other entity. I'm
speaking purely in my own capacity. I also am a visiting
researcher at Aalborg University in Copenhagen, Denmark. We
have a center that works on privacy and security research. So
my work is--I'm not speaking for that center but it is informed
by the research that we do there.
Senator Wicker. And, Ms. Zheng, you are speaking today on
behalf of Business Roundtable, are you not?
Ms. Zheng. That's correct, sir.
Senator Wicker. Yes. You know, I noticed that AEI published
an article just a few days ago with regard to the $5 billion EU
fine against Google and it stated that EU's record $5 billion
fine for antitrust violations involving its Android operating
system is protectionism masquerading as consumerism.
It strikes me that AEI's got a point there, Dr. Layton.
Dr. Layton. Well, AEI doesn't make any official positions.
We have many--we have over 200 scholars. We all have different
views. We have major debates within our organizations.
Sometimes we have more anger against each other than people
outside the AEI. So we actually take very disparate positions
because we believe in the competition of ideas.
Senator Wicker. Very good. Would anyone else like to
comment on that? Mr. Bladel.
Mr. Bladel. Senator, thank you, yes. I think that from our
perspective, it just shows what we're up against in terms of
the EU's willingness to impose fines on U.S. tech firms,
whether that's coming from this particular incidence, which is
involving mobile operating systems, or whether that's coming
from something like GDPR. It's one of the reasons why we're
proceeding very cautiously in our compliance efforts with
regard to those European regulations.
Senator Wicker. It seems that all is not well between our
Government and the EU.
The hearing record will remain open for two weeks. During
this time, Senators will be asked to submit any questions for
the record. Upon receipt, the witnesses are requested to submit
their written answers to the Committee as soon as possible.
Thank you all and this hearing is now adjourned.
[Whereupon, at 11:55 a.m., the hearing was adjourned.]
A P P E N D I X
Prepared Statement of Hon. Bill Nelson, U.S. Senator from Florida
Each day, around the world, billions of dollars in digital commerce
is conducted online. And that economic value does not take into account
the enormous social and political contributions the free and open
Internet has made--and continues to make--around the world.
The internet's vast success is intertwined with its fundamentally
global nature. Thanks to the work and cooperation of many around the
world, the Internet of today truly is borderless. A small business in
Florida can create a website and instantaneously sell products and
services all over the globe. A photographer along the Space Coast can
post images of the latest commercial space launch and inspire
schoolchildren in faraway lands. A researcher at a Florida college or
university literally has at her fingertips the collected knowledge of
all of history--whether that knowledge resides in Europe, Africa or
Asia. And any of the millions of citizens of my home state can stay in
touch with friends and relations around the world through social media,
e-mail, and many other internet-based platforms.
But we cannot take for granted that the Internet of today will be
the Internet of tomorrow.
First, nefarious actors continue to exploit the global Internet to
harm democracy, human rights and trade. Each day it seems we uncover
new information about election meddling and disinformation campaigns by
state and non-state actors targeting the heart of our democracy. Cyber-
attacks are becoming a daily occurrence--many of which are launched by
our foreign adversaries. We know for a fact that these cyber-attacks
have penetrated critical parts of our infrastructure and economy--
including major defense contractors, international corporations, and
our power grid.
Second, many countries around the world are adopting policies that
threaten to fragment the global internet. Of course, each nation bears
a solemn responsibility to protect its citizens from harm--including
the unique harms to privacy and security that come from the internet.
But when those restrictions are used for digital protectionism or to
harm international competition, they start to unravel the global
internet.
Our country must continue to defend the free and open internet,
which depends on the ongoing successful multistakeholder approach to
international Internet governance. But to defend today's Internet from
fragmentation, it requires diplomacy and international engagement on
these issues at the highest level. Yet we stand at a time when the
budget of the State Department has been slashed, when our cyber-
diplomatic core has been decimated, and when our Nation's relationships
with our traditional allies (allies that in the past have supported our
approach to international Internet governance) are increasingly
strained.
We must redouble our efforts to defend a free and open Internet
throughout the world. We cannot stand for gatekeeper control to the
internet--even more so when a nation is trying to undermine the value
of the Internet as a platform for digital commerce and information
exchange. I am glad our witnesses are here today to reaffirm the need
for the U.S. to be at the table in international fora on Internet
governance and to engage in productive bilateral and multilateral
conversations on the future of the Internet with our international
partners. Failing that, I fear that the transformative and equalizing
benefits of the Internet we have seen in the last two decades could be
undone.
______
CreativeFuture
July 17, 2018
Hon. Chuck Grassley, Chairman,
Hon. Dianne Feinstein, Ranking Member,
Senate Committee on the Judiciary,
Washington, DC.
Hon. John Thune, Chairman,
Hon. Bill Nelson, Ranking Member,
Senate Committee on Commerce, Science, and Transportation,
Washington DC.
Dear Chairmen and Ranking Members:
We, the undersigned, are creatives who make our living in the
entertainment industries. Whether we work in film, television,
publishing, music, or photography, we and our colleagues have all been
affected by the rampant, illicit activity that occurs on the major
Internet platforms, including Google and Facebook.
There has been growing concern in Washington, in the press, and
among Americans about the lack of responsibility exercised by the major
Internet platforms toward harmful and illegal activity taking place on
their services.
For decades, online gatekeepers like Facebook and Google have
turned a blind eye to the proliferation of widespread societal harms on
their platforms. From sex trafficking to foreign influence over our
elections, from privacy to piracy, it has become increasingly clear
that more needs to be done to ensure platform responsibility.
In recent hearings in both the House and the Senate, Facebook's
CEO, Mark Zuckerberg, characterized Silicon Valley's failure to take an
appropriately broad view of its responsibility as a ``big mistake.''
But whether the lack of responsibility was a ``mistake'' or something
else, the failure of Facebook, Google, and others to take
responsibility is rooted in decades-old government policies, including
legal immunities and safe harbors, that treat these companies
differently than other industries and actually absolve internet
platforms of responsibility.
This must change. As long as these companies are allowed to
continue to operate in a policy framework that prioritizes their growth
and wealth over accountability, American creativity will be harmed
along with many other important societal interests.
Google needs to join Mr. Zuckerberg in stepping forward and
embracing a broader view of its responsibility. But the real problem is
not any one company. The problem is endemic in a system that applies a
different set of rules to the Internet because it's ``exceptional,''
and utterly fails to impose ordinary norms of accountability on
Internet businesses that are built around monetizing the content of
others.
We want to sincerely thank you and your colleagues for asking
Facebook to testify--and Google should be next up to the microphone. We
understand that Google has been invited to appear. This problem will
continue to affect millions of Americans, both in their day-to-day
lives and in their pocketbooks, until action is taken to correct it.
It's long past time to hold Google, Facebook, and other Internet
platforms responsible for their actions and inactions that hurt
consumers, creativity, and the American economy.
Sincerely,
Pamela Abdy
Makeready
Executive Producer: Kill the Messenger
Producer: Garden State, Identity Thief
Gina Amoroso
Co-Producer: Revolutionary Road
Dave Andron
Executive Producer: Justified, Snowfall
Eli Attie
Co-Executive Producer: House, M.D.
Producer: The West Wing
John Baldecchi
Digial Riot Media
Executive Producer: Happy Death Day
Producer: Conan the Barbarian, Point Break
George Bamber
Director: Hit the Floor
Assistant Director: S.W.A.T.
Chris Baumgarten
Producer: All I See is You, The Forgiven, Shattered Glass
Co-Producer: Hook
Peter Baxter
President and Co-Founder, Slamdance Film Festival
Susan Becker
Costume Designer: Father of the Bride, Flatliners, True Romance
Harold Becker
Director: Malice, The Onion Field, Sea of Love
Larry Becsey
Partner, Intellectual Property Group
Steve Beeks
NEXT Entertainment
Betsy Beers
Executive Producer: For the People, Grey's Anatomy, How to Get Away
with Murder, Station 19
Alec Berg
Executive Producer: Barry, Silicon Valley
Albert Berger
Bona Fide Productions
Producer: Election, Little Miss Sunshine, Nebraska
Claire Best
Claire Best & Associates
Tony Bill
Director: Flyboys
Executive Producer: Going in Style
Producer: The Sting
Jason Blum
Blumhouse
Bill Borden
Executive Producer: High School Musical, Kung Fu Hustle
Producer: El Mariachi, End of Days, La Bamba
Marty Bowen
Temple Hill Entertainment
Producer: First Man; The Fault in Our Stars; Love, Simon; The Maze
Runner Trilogy; Uncle Drew
Chris Brancato
Co-Creator: Narcos
Mark Burg
Producer: Saw, Saw II, Saw III, Saw IV, Saw V, Saw VI, Saw VII
Executive Producer: Anger Management, Two and a Half Men
Allison Burnett
Writer, Director, Producer, Executive Producer: Ask Me Anything
Writer: Autumn in New York
Eric Cady
Senior Counsel, Independent Film & Television Alliance
Alessandro Camon
Executive Producer: Wall Street: Money Never Sleeps
Writer: The Messenger
Benedict Carver
Eclipse Pictures, Inc.
Executive Producer: Eye in the Sky, Map to the Stars, Winchester
Jon Cassar
Executive Producer: 24, Forsaken
Director: 24, Forsaken, Fringe, Medici: The Magnificent, The Orville,
Revolution
Cotty Chubb
Producer: The Dinner, Eve's Bayou, Pootie Tang
Dylan Clark
Dylan Clark Productions
Producer: Planet of the Apes Trilogy
Jane Clark
Film McQueen
Producer: Elena Undone
Director, Editor, Producer, Writer: Crazy Bitches, Meth Head
Tena Clark
CEO, DMI Music
Author: Southern Discomfort
Susan Cleary
Vice President & General Counsel, Independent Film & Television
Alliance
Christopher Cleveland
Writer: Glory Road; McFarland, USA
Bruce Cohen
Producer: American Beauty, Milk, Silver Linings Playbook
Charlie Corwin
Founder, Corwin Media
Executive Producer: Dual Survival, Half Nelson
Producer: The Squid and the Whale
Julie Costanzo
Co-Producer: Miss Representation
Producer: Adventure Divas, The Virgin Suicides
Cindy Cowan
Executive Producer: Red Lights, Savior
Producer: Very Bad Things
Pierce Cravens
Metropolitan Entertainment
Theatre Producer: Oh, Hello
Producer: Concrete Kids, This Isn't Funny
Kirk D'Amico
President, Myriad Pictures
Producer: The Last Word
Executive Producer: Kinsey, Margin Call, Van Wilder
Martha De Laurentiis
Producer: Hannibal, Red Dragon, U-571
Donald De Line
Producer: I Love You, Man; The Italian Job; Ready Player One
Chip Diggins
Producer: Nancy Drew and the Hidden Staircase, A Walk in the Woods
Joshua Donen
Producer: Gone Girl, The Quick and the Dead
Executive Producer: House of Cards, Mindhunter, Spartacus
Dennis Dugan
Director: Big Daddy, Grown Ups, I Now Pronounce you Chuck & Larry, You
Don't Mess with the Zohan
Cassian Elwes
Producer: Dallas Buyers Club, Mudbound
Executive Producer: Lee Daniels' The Butler, Margin Call
Clay Epstein
President, Film Mode Entertainment
Blye Faust
Rocklin | Faust
Producer: Spotlight
Adam Fields
Producer: Brokedown Palace, Donnie Darko, The Wedding Ringer
Wendy Finerman
Producer: The Devil Wears Prada, Drumline, Forrest Gump, P.S. I Love
You
Cesar Fishman
Senior Vice President of Communications, CreativeFuture
John Flock
Executive Producer: The Good Shepherd
Producer: Bullet, Fortress
Christopher Floyd
Chief Operating Officer, Amblin Partners
Gary Foster
Producer: Daredevil, Ghost Rider, Sleepless in Seattle
Lucas Foster
Producer: Jumper, Man on Fire, Mr. and Mrs. Smith
Anne Marie Fox
Still Photographer: Dallas Buyers Club, Lee Daniels' The Butler, Sharp
Objects, The Zookeeper's Wife
Kevin Goetz
Founder and CEO, Screen Engine/ASI
Neil Goetz
Executive Creative Director, The Engine Room
Co-Director of Development and Acquisitions, BBMG Entertainment
Norman Golightly
Executive Producer: Ghost Rider, The Sorcerer's Apprentice
Producer: Lord of War
Keith Gordon
Sidetracked Productions Inc.
Director: Better Call Saul, Fargo, Homeland, The Leftovers, Legion, A
Midnight Clear, Mother Night, Waking the Dead
Mark Gordon
Entertainment One
Executive Producer: Quantico, Grey's Anatomy, Designated Survivor,
Criminal Minds, Ray Donovan
Producer: The Nutcracker and the Four Realms, Murder on the Orient
Express, Saving Private Ryan, Speed
Michael Gracey
Director: The Greatest Showman
Don Granger
Skydance Media
Executive Producer: Geostorm
Producer: Jack Reacher, Jack Reacher: Never Go Back, Mission
Impossible: Rogue Nation
Bonnie Greenberg
Co-Producer/Music Supervisor: The Hunting Ground
Executive Music Producer: RBG
Music Supervisor: How The Grinch Stole Christmas, My Best Friend's
Wedding
Jeffrey Greenstein
Co-President, Millennium Media, Inc.
James V. Hart
Writer: August Rush, Bram Stoker's Dracula, Contact, Hook
Founder, HartChart
Lisa Henson
CEO, The Jim Henson Company
Patricia Herskovic
Producer: Deadly Blessing, Mother's Boys, Toy Soldiers
Author: Escape to Life
Marshall Herskovitz
The Bedford Fall Company
Producer/Writer: The Last Samurai
Producer: Blood Diamond, Legends of the Fall
Executive Producer: Thirtysomething, My So-Called Life
David Hoberman
Mandeville Films
Producer: Beauty and the Beast, The Fighter, The Muppets, The Proposal,
Wonder
Matthias Hoene
Director: Cockneys vs Zombies, Enter the Warriors Gate
Gale Anne Hurd
Valhalla Entertainment
Executive Producer: Fear The Walking Dead, Lore, The Walking Dead
Producer: Aliens, The Terminator, Terminator 2: Judgment Day,
Terminator 3: Rise of the Machines
Allison Jackson
Founder and CEO, The Allison Jackson Company
Jon Jashni
Raintree Ventures
Executive Producer: Lost in Space
Producer: Godzilla, Kong: Skull Island, Pacific Rim, Warcraft
Dan Jinks
Producer: American Beauty, Big Fish, Milk
Ryan Kavanaugh
Producer: Mirror Mirror
Executive Producer: The Fast and the Furious: Tokyo Drift, Little
Fockers, Talladega Nights: The Ballad of Ricky Bobby
Brad Kembel
Executive Vice President, Distribution & Operations, Global Road
Entertainment, LLC
Tim Kittleson
Director, UCLA Film & Television Archive (ret.)
Jason Kliot
Open City Films
Producer: Coffee & Cigarettes, Enron: The Smartest Guys in the Room,
Redacted
Executive Producer: Bubble, Capernaum, Lovely & Amazing
Hawk Koch
Former President, Academy of Motion Picture Arts and Sciences
Executive Producer: Heaven Can Wait, Primal Fear, Source Code, Wayne's
World
Tony Krantz
Flame Ventures
Executive Producer: 24
Producer: Mulholland Drive
Adam Krentzman
Executive Producer: The Domestics, Elephant Tales, Oh My God
John Krokidas
Director: American Crime, Kill Your Darlings
Michelle LeClair
Author, Speaker, CCO, LeClair Beauty
Author: Perfectly Clear
Mark Leibowitz
President, Leibowitz Pictures
Adam Leipzig
Producer: Plastic Ocean
Co-Producer: Titus
Peter Lenkov
Executive Producer: Hawaii Five-0, MacGyver, Magnum P.I., Salvation
Harry Lennix
Actor: The Blacklist, Man of Steel, The Matrix Reloaded, Matrix
Revolutions
Avi Lerner
Chairman and CEO, Millennium Media, Inc.
Todd Lieberman
Mandeville Films
Producer: Beauty and the Beast, The Fighter, The Proposal, Wonder
Michael London
Groundswell Productions
Executive Producer: Confirmation, Milk
Producer: Sideways
Laurence Mark
Producer: Jerry Maguire; I, Robot; Dreamgirls; Julie & Julia; The
Greatest Showman
Ron Maxwell
Writer/Director: Copperhead, Gettysburg, Gods & Generals
Craig Mazin
Writer: The Hangover Part II, Identity Thief
Mary Mazzio
50 Eggs Films
Director/Producer: I Am Jane Doe, Apple Pie, The Apple Pushers, A Hero
for Daisy, TEN9EIGHT, Underwater Dreams
Nat McCormick
Executive Vice President of Sales & Distribution, The Exchange
Michael Menchel
Producer: One Chance, Only the Brave
Executive Producer: Ain't Them Bodies Saints
Tory Metzger
Executive Producer: Arrival
Producer: The Forest
Gev Miron
Co-Founder and Creative Director, MVH CreativeWorks
Bobby Moses
Mavrick Artists Agency
Eric Newman
Screen Arcade
Executive Producer: Narcos
Producer: Bright, Children of Men
Rick Nicita
RPMedia Producer, Former Co-Chairman of Creative Artists Agency
Jerry Offsay
Executive Vice President, Hamburger Hill
Executive Producer: As Seen Through These Eyes, Eight Men Out, Six
Dance Lessons in Six Weeks
MJ Peckos
President, Dada Films
Executive Producer: Burning Secret, Paper House
Maggie Phillips
Music Supervisor: The Handmaid's Tale, Moonlight
Pamela Pickering
Berlin International Film Festival Delegate, Former Chairman of IFTA
Lou Pitt
CEO, The Pitt Group and Alton Road Productions
Producer: The Exception, Hollywood Homicide
David Poland
President, Outside Voice
Gavin Polone
Pariah
Executive Producer: Curb Your Enthusiasm
Producer: Zombieland
Dawn Prestwich
Executive Producer: Carnivale, Flashforward, The Killing, The Riches,
Z: The Beginning of Everything
Jean Prewitt
CEO, Independent Film & Television Alliance
John Ptak
Owner, Arsenal Films
Executive Producer: Let Me In, The Way Back
Samantha Ramirez-Herrera
Founder, Offtharecord Inc.
Linda Reisman
Producer: Leave No Trace
Executive Producer: The Danish Girl
JB Roberts
Partner, Thruline Entertainment
Doug Robinson
Executive Producer: Breaking In, The Goldbergs, Rules of Engagement
Lise Romanoff
Managing Director/CEO, Vision Films, Inc.
Karen Rosenfelt
Producer: Max, Me Before You, The Twilight Saga: Breaking Dawn--Part 1,
The Twilight Saga: Breaking Dawn--Part 2, The Twilight Saga: Eclipse,
The Twilight Saga: New Moon
Executive Producer: Twilight
Howard Rosenman
Producer: Call Me By Your Name, The Family Man, Father of the Bride
Danny Rosett
Executive Producer: Capote
Eric Roth
Executive Vice President of Business Affairs, New Regency Productions
Aaron Ryder
Co-President of Production & Acquisitions, FilmNation Entertainment
Producer: Arrival, Transcendence
Nina Sadowsky
Author: The Burial Society, Just Fall
Executive Producer: The Wedding Planner
Robin Sax, JD & MSW
Law Offices of Robin Sax
Teddy Schwarzman
Producer: The Imitation Game, Mudbound
Lloyd Segan
Partner, Piller/Segan
Keri Selig
President and Founder, Intuition Productions
Executive Producer: The Kennedys After Camelot, The Secret Life of
Marilyn Monroe, The Stepford Wives
Jeff Sharp
Producer: Boys Don't Cry, The Yellow Birds You Can Count on Me
Stacey Sher
Producer: Django Unchained, Erin Brockovich, The Hateful Eight, Into
the Badlands, World Trade Center
Jon Shestack
Producer: Air Force One, Before I Fall, Dan in Real Life
Meyer Shwarzstein
CEO, Brainstorm Media
Sigurjon (Joni) Sighvatsson
Palomar Pictures
Producer: Killer Elite, The Weight of Water
Executive Producer: Arlington Road, Wind River
Paul Alan Smith
Founder, Equitable Stewardship for Artists
Ellen Steloff
Executive Director and Founder, Rabbit Hole Screenings
Executive Producer: Dream A Little Dream, Far From Home, A Gnome Named
Norm, The Underachievers
Michael Sucsy
Director: Every Day, Grey Gardens, The Vow
Michael Sugar
Sugar23
Producer: Spotlight
Executive Producer: The Knick, The OA
Kurt Sutter
Executive Producer: Sons of Anarchy, Mayans M.C., The Shield
Executive Producer and Writer: Southpaw
Andrew Tennenbaum
Producer: Water for Elephants
Co-Producer: The Bourne Identity, The Bourne Legacy, The Bourne
Supremacy, The Bourne Ultimatum, Jason Bourne
John Toll, ASC
Director of Photography: Almost Famous, Braveheart, Cloud Atlas, The
Last Samurai, Legends of the Fall, The Rainmaker, The Thin Red Line,
Vanilla Sky
Bob Tourtellotte
Film McQueen
Executive Producer: Crazy Bitches, Meth Head
Jeff Vespa
Vespa Pictures
Hunter Via
Editor: The Chi, Snowfall, The Walking Dead
Michele Vice-Maslin
Sweetersongs & Mob Force Productions
Songwriter: Blue Bloods, Downsizing, Guiding Light
Joana Vicente
Executive Director, Independent Filmmaker Project (IFP)
Ruth Vitale
CEO, CreativeFuture
Executive Producer: American Crime, Don Juan DeMarco, Gummo
Nick Wechsler
Nick Wechsler Productions
Producer: Magic Mike, The Road
Robert B. Weide
Director/Executive Producer: Curb Your Enthusiasm, Mr. Sloane
Producer/Writer: Mother Night
Writer: The Giver
Chris Weitz
Writer: Cinderella, Rogue One: A Star Wars Story
Director: A Better Life, The Twilight Saga: New Moon
Ron West
Partner, Thruline Entertainment
Brett Williams
Senior Vice President of Public Affairs, CreativeFuture
Frank Wuliger
Partner, The Gersh Agency
Janet Yang
Executive Producer: The Joy Luck Club
Producer: The People vs. Larry Flynt
Ron Yerxa
Bona Fide Productions
Producer: Election, Little Miss Sunshine, Nebraska
Graham Yost
Executive Producer: Justified
Writer: Speed
Jonathan Yunger
Co-President, Millennium Media, Inc.
______
Response to Written Question Submitted by Hon. Roger F. Wicker to
Hon. Michael Chertoff
Question. What is your experience with the WHOIS database from a
cybersecurity perspective and can you comment on its importance in this
regard?
Answer. An unexpected side-effect of Europe's adoption of the
General Data Protection Regulation (GDPR) was the decision of the
Internet Corporation for Assigned Names and Numbers (ICANN) to redact
some registration information from its WHOIS database. ICANN is the
non-profit organization that manages the global domain name system,
which acts as a sort of address book or telephone book for the
internet, directing users to specific servers based on the domain name
information that they enter into their browser. This allows end users
to type in the domain www.whitehouse.gov rather than having to memorize
the specific server address associated with the White House's public
website, which could be a series of up to 32 alpha-numeric characters.
ICANN's WHOIS database allows for the pubic, and security researchers,
to look up key information about individual domains, including who
registered or controls them.
ICANN has interpreted GDPR as requiring the redaction of several
fields of data traditionally included in WHOIS data, including the name
of the person who registered the domain, their phone number, physical
address, and e-mail address. While this information is not always
publicly available through WHOIS (and can be of dubious quality) as a
result of varying practices from various domain name providers, this
data can be very useful to researchers, criminal investigators, and
other parties seeking to investigate potential cybercrimes or malicious
activity associated with a specific domain (which may, for example, be
used to mimic a major retailer in order to steal user credentials or
serve as a command and control server for malicious software). As a
result of this change, ICANN has proposed creating an ``accreditation''
system to restore access to this information to law enforcement and
researchers. It has yet to fully develop such a system and has
indicated that it would be ready until at least December 2018. It would
then likely take several months for domain providers to adopt the new
system.
As a result, for at least the next few months, researchers and law
enforcement will be unable to utilize a tool that has historically been
useful in shutting down cyber criminal enterprises and in the conduct
of cyber criminal investigations. I would encourage ICANN to move
quickly to remedy the problem and restore access to this information to
both law enforcement and researchers in order to help them combat cyber
criminal activity.
______
Response to Written Questions Submitted by Hon. Catherine Cortez Masto
to Hon. Michael Chertoff
Question 1. There are nearly a quarter of a million small
businesses in Nevada. They're working to try to navigate the
increasingly complex cyber world and I hear a lot from them about
cybersecurity and other Internet issues.
Can you talk about GDPR, as well as other international
regulations, and how we can ensure that small businesses have the tools
to navigate these as well as rules that are being put in place at the
state level?
Answer. Certainly, such regulations can be difficult for small
businesses to deal with. Often companies lack the in-house resources
and expertise to develop a strong understanding of their requirements
and the steps that may be needed to implement required changes. This is
particularly true if a small business does all of its own in-house data
management and processing. However, many small businesses rely upon
third-party vendors for data management and processing, meaning that
their compliance is effectively handled by that vendor. Many cloud
vendors, for example, have marketed their products to smaller
businesses by highlighting their in-built GDPR compliance, such as data
management and security capabilities that meet EU standards. It is also
worth noting that many small businesses in the U.S. are unlikely to be
impacted by international regulations as their customers are located
exclusively in the United States.
State-level regulations in the U.S. are likely to have a much
larger impact on small businesses, just as varying state sales tax
regimes do. The one advantage of GDPR is that it has created a single
standard and compliance regime for all 28 EU member countries, and
arguably for the slightly larger number of European countries in the
European Economic Area (EEA). The prospect of fifty different state-
level data security and privacy regulations is far more daunting and
potentially impactful for U.S. small businesses, which are far more
likely to conduct business across state lines than they are across
international borders. While many are likely to rely upon their third-
party vendors to aid them in their compliance with such requirements,
the possibility of fifty different regulatory regimes and the magnitude
of potential business impact makes the scale of the issue much greater
for small businesses. As I indicated in my earlier testimony, I would
encourage policy makers to work toward a single, national regime with
robust data security and privacy protections rather than allowing a
patchwork of state-level requirements to develop.
Question 2. Countries and increasingly imposing data localization
requirements, which require companies that collect personal data to
store it on servers within the geographic boundaries of the country, as
a requirement for companies to do business there.
Are there logistically feasible ways for American entities to
process data internationally with the data localization polices that
were discussed at the hearing?
Answer. It may be feasible for certain companies to comply with
such requirements in certain instances. For example, Microsoft has
built a data center in Germany with a local partner to comply with some
initial data-localization requirements. This is unlikely to have a
major impact on their business given the size of the German market and
the likelihood that the company would need in any event to build at
least one, if not several, data centers in the country to offer its
cloud services to customers in that country while maintaining a high
level of service. That said, a smaller provider may not have the volume
of business in Germany to justify constructing a dedicated data center
in that country, potentially making it infeasible for them to operate
there. This could pose a significant barrier to entry for new market
entrants.
These calculations also change if you consider a smaller country,
such as Luxembourg, or a series of smaller countries geographically
proximate to one another. For example, the Baltic countries (Estonia,
Latvia, and Lithuania) taken together may be a large enough market to
justify a company such as Google or Amazon building a data center to
serve all three countries, perhaps constructing the data center in
Estonia. However, if each country were to have its own data
localization requirements a provider would be expected to build a data
center not just in Estonia, but in Latvia and Lithuania as well. Such a
change could make it economically infeasible for the provider to offer
its services in all three countries.
Question 3. How does this impact academia or the private sector?
Answer. These requirements generally do not distinguish between
sectors and, as such, they would impact both the academic and private
sectors. In the academic world, such requirements could make
collaborative research extremely difficult, if not impossible, limiting
the ability for researchers to transfer data between collaborators in
different countries or process research data from country A in country
B. For the private sector, such requirements could effectively prevent
foreign companies from operating in a country with these requirements
as they could prove so costly as to be a barrier to entry.
Question 4. With the various data localization laws taking effect,
can you discuss whether those typically explicitly forbid data transfer
over national borders or would they allow a country, Germany for
example, to host data on German made servers in a neighboring country?
Answer. The most stringent of these requirements effectively
prohibit the transfer of data belonging or relating to a citizen of the
country to an entity or location outside of that country's physical
borders. I am unaware of any existing or proposed requirements that
would allow for the transfer of affected data outside the country
provided that the transfer was to servers manufactured within the
country. Instead the EU, and some countries outside the EU, have only
allowed for data to be transferred beyond their jurisdiction when the
company conducting the transfer and the country to which the data is
being transferred agree to store and process the data in a manner that
complies with their own domestic requirements. For example, the US-EU
Privacy Shield Agreement, and the preceding Safe Harbor agreement,
require U.S. companies and the U.S. Government to ensure that all
European data transferred to the U.S. is handled in a manner consistent
with EU data protection requirements.
Question 5. Additionally, if a U.S. company, for example, was
expected to store data on a data center in a country like China, would
it be mandated to use Chinese materials or technology in the
construction of the data center? Please answer generally with respect
to the multitude of data localization laws.
Answer. It certainly is possible that a country could have such a
requirement, but practically speaking, few countries have a domestic
industry capable of supporting such a requirement. China, specifically,
is where a large volume of technology components used in cloud
computing are manufactured, so it would be relatively easy for Chinese
authorities to mandate the use of servers or other components
manufactured in country. Frankly, supply-chain risks associated with
the widespread use of technology components manufactured in China is a
serious concern across the U.S. technology and national security
sectors and merits a much broader and in-depth discussion.
Question 6. The EU-U.S. Privacy Shield is a program that allows
companies to transfer personal data to the United States from the
European Union (EU) in a way that is consistent with EU law. However,
the European Parliament passed a non-binding resolution in July
claiming the United States was not complying with European law and
called on the European Commission to suspend Privacy Shield by
September 1 ``unless the U.S. is fully compliant.''
What would the impact to U.S. businesses be if the EU Commission
suspends Privacy Shield?
Answer. The suspension of the Privacy Shield agreement would likely
have an impact similar to that seen when the European Court of Justice
(ECJ) effectively suspended Privacy Shield's predecessor, Safe Harbor,
through its ruling in the Schrems case. That is, it would create
significant uncertainty for U.S. providers operating in Europe and
leave them in a legal limbo as they sought to comply with EU data
protection requirements via alternative means, such as binding
corporate rules or standard model clauses.
For the largest U.S. technology providers, the impact would likely
be limited as these companies, Google, Microsoft, and Amazon, for
example, already have these alternative means of compliance in place.
However, the impact on smaller providers would be much greater. Binding
corporate rules can be difficult to implement and standard model
clauses can present legal issues to some companies. Smaller companies
are also unlikely to have the in-house expertise needed to achieve
compliance through these alternative means, increasing their costs and
potentially disrupting their operations.
It seems likely that the European Commission will seek some sort of
renegotiation of Privacy Shield with the U.S. to ensure it properly
reflects GDPR's requirement. Max Schrems, the plaintiff in the earlier
court case that led the ECJ to effectively invalidate Safe Harbor, has
already filed a challenge to Privacy Shield claiming it does not
adequately protect European's privacy rights under GDPR. The case will
ultimately need to make its way through European courts and back to the
ECJ, meaning that there will be some level of uncertainty surrounding
Privacy Shield's future for at least several years.
______
Response to Written Questions Submitted by Hon. Jon Tester to
Hon. Michael Chertoff
Question 1. Many members of the panel mentioned the United States
needs to step up our level of engagement and join other like-minded
countries. In your opinion, which countries closest align with our
values on Internet freedom, privacy, and Internet of Things?
Answer. Our traditional allies are the countries who are most like-
minded on these issues. The United Kingdom, Canada, Australia, and New
Zealand (the so-called ``Five Eyes'') are the most closely aligned with
the U.S. on these issues. The countries of the EU are also similarly
minded but have differing views on what constitutes privacy and how to
balance those rights with others, such as free speech. As such, we are
unlikely to find easy agreement on issues such as ``the right to be
forgotten.'' Other traditional allies, such as Japan, South Korea, and
Taiwan, also share broadly similar views.
Question 2. What forum (e.g., the United Nations, NATO, etc.) do
you recommend for facilitating an international discussion on rules and
definitions?
Answer. Unfortunately, there isn't an ideal forum for such a
discussion currently. NATO and other security alliances made up of
like-minded countries are focused on more traditional security needs
and are ill-suited for this type of a discussion and effort. Broader-
based organizations, such the UN, include a much wider variety of
countries, many of whom do not share our values or views on data
privacy and security, and as such would oppose our efforts. I believe
that bi-lateral or multi-lateral efforts outside of these
organizations, or the creation of a new organization, to be the likely
path forward on these issues. A number of nongovernmental
organizations, including the Global Commission on the Stability in
Cyberspace, on which I serve, continue to examine and work on these
issues and could be the basis for broader discussion between interested
countries on these issues.
Question 3. Before the United States can lead the charge
international, we must unify our own ``rules of the road.'' Does such a
forum currently exist, to your knowledge? How has private industry in
the U.S. tried to tackle how we define the rules of the road when it
comes to Internet security and governance? Which U.S. governmental
agency would you recommend take the lead and represent the United
States in international discussions?
Answer. I do not believe that we have such a consensus in the
United States on these issues at this time. Conversations on these
issues have taken place in a variety of forums, including the Aspen
Security Conference and RSA. To date, private industry has generally
avoided making specific proposals on these issues, though several have
begun to move in this direction having recognized the need for action.
Microsoft's Brad Smith, for example, has proposed a ``Digital Geneva
Convention'' to help establish these types of rules. The varying
business models and interests of major U.S. technology companies makes
it difficult for U.S. technology companies to reach their own consensus
on these issues. I believe that Congressional action and Executive
leadership will be needed in order to establish such rules. Perhaps
Congress could establish a Commission to study and make comprehensive
recommendations.
In terms of international discussions, I certainly see the U.S.
State Department as the agency that will need to take the lead, with
support in such discussions coming from the Departments of Commerce,
Homeland Security, and Defense as well as the intelligence community.
______
Response to Written Question Submitted by Hon. Roger F. Wicker to
James Bladel
Question. Mr. Bladel, the EU's General Data Protection Regulation
was intended to apply only to EU citizens (natural persons). What is
GoDaddy doing to preserve open and free access to as much of the WHOIS
record as possible by differentiating between those individuals covered
by the EU's GDPR and those who are not?
Answer. When the European Union's General Data Protection
Regulation (GDPR) took effect on 25 May 2018, GoDaddy redacted the
published WHOIS data for all impacted customers according to ICANN's
Temporary Specification (https://www.icann.org/resources/pages/gtld-
registration-data-specs-en).
This redaction only applied to those records that we determined, to
the best of our knowledge, represented natural persons who were covered
by GDPR, or equivalent privacy laws. We did not redact records that
clearly represented organizations, or with mailing addresses outside of
these regions.
GoDaddy estimates that we have redacted less than 20 percent of
WHOIS records in order to comply with GDPR.
______
Response to Written Questions Submitted by Hon. Catherine Cortez Masto
to James Bladel
Question 1. Countries and increasingly imposing data localization
requirements, which require companies that collect personal data to
store it on servers within the geographic boundaries of the country, as
a requirement for companies to do business there.
Are there logistically feasible ways for American entities to
process data internationally with the data localization policies that
were discussed at the hearing?
Answer. While it is technically possible to create localized
instances for data processing, this approach creates significant
operational costs and complexities that could prohibit us from serving
certain markets. Additionally, localization requirements disrupt our
ability to provide a uniform experience to our customers across our
product offering.
Question 2. How does this impact academia or the private sector?
Answer. I'm not able to characterize the impact on academia, and
believe that our response to Question 1 would be applicable for most
private sector companies. Generally, the aggregate effect of these laws
is to favor local providers (or affiliates) over American firms.
Question 3. With the various data localization laws taking effect,
can you discuss whether those typically explicitly forbid data transfer
over national borders or would they allow a country, Germany for
example, to host data on German made servers in a neighboring country?
Answer. Some countries (e.g., China) have strict requirements that
all data is processed and retained locally. Other countries allow for
international data sharing under certain conditions. For example, under
GDPR Germany would allow user data to ccbe transferred within the
European Union, or to countries recognized to have an equivalent data
protection framework. Currently, transfers from the EU to the U.S. are
allowed under the Privacy Shield agreement.
Question 4. Additionally, if a U.S. company, for example, was
expected to store data on a data center in a country like China, would
it be mandated to use Chinese materials or technology in the
construction of the data center? Please answer generally with respect
to the multitude of data localization laws.
Answer. I am not aware of localization laws that require us to use
domestic equipment or technology. And while laws vary across countries,
we have encountered localization requirements (actual or proposed) that
would obligate us to:
Establish a local presence or entity
Use a local bank or law firm
Obtain a license or permit from the local government (with
various obligations)
Provide local authorities with regular reports or privileged
access to data or records
Question 5. The EU--US Privacy Shield is a program that allows
companies to transfer personal data to the United States from the
European Union (EU) in a way that is consistent with EU law. However,
the European Parliament passed a non-binding resolution in July
claiming the United States was not complying with European law and
called on the European Commission to suspend Privacy Shield by
September 1 ``unless the U.S. is fully compliant.''
What would the impact to U.S. businesses be if the EU Commission
suspends Privacy Shield?
Answer. The loss of Privacy Shield would significantly disrupt our
ability to process the data of our customers in the EU, and reliably
deliver the products they have purchased from us. We note that the
September 1 deadline has passed, but the EU has not taken any steps to
suspend Privacy Shield. But because of the potential impact to our
business, we are closely monitoring these developments.
______
Response to Written Questions Submitted by Hon. Jon Tester to
James Bladel
Question 1. Many members of the panel mentioned the United States
needs to step up our level of engagement and join other like-minded
countries. In your opinion, which countries closest align with our
values on Internet freedom, privacy, and Internet of Things?
Answer. In terms of free expression and encouraging innovation and
free online markets, I consider our historical allies in Internet
Governance to be most closely aligned with the values of the US. This
includes: Europe/UK, Canada, Australia, New Zealand, and to some
extent: Japan, South Korea, and Mexico.
With regard to online privacy, my opinion is that the EU is
leading this issue globally, other countries are following
suit, and the U.S. is increasingly being viewed as an outlier.
I don't have an informed opinion on the governance landscape
as it pertains to the Internet of Things (IoT).
Question 2. What forum (e.g., the United Nations, NATO, etc.) do
you recommend for facilitating an international discussion on rules and
definitions?
Answer. In the private sector, we favor multi-stakeholder
organizations (like ICANN) as an international forum for establishing
rules and policies.
We do not find the United Nations, especially the ITU, as a helpful
forum for these topics. An exception would be the Internet Governance
Forum (IGF), which is sponsored by the UN.
Question 3. Before the United States can lead the charge
international, we must unify our own ``rules of the road.'' Does such a
forum currently exist, to your knowledge? How has private industry in
the U.S. tried to tackle how we define the rules of the road when it
comes to Internet security and governance? Which U.S. governmental
agency would you recommend take the lead and represent the United
States in international discussions?
Answer. Many of the rules and policies that govern our industry are
developed within ICANN, but issues like privacy, competition, and
cybersecurity are outside of ICANN's remit. For this reason, I'm
inclined to believe that a forum for these issues does not currently
exist.
The private sector has largely self-organized to address online
problems, and has had some success via numerous coalitions, alliances,
etc. These groups allow large firms to gather and share ideas, data,
best practices, and then disseminate these throughout the industry.
The U.S. interests are best represented by the Department of
Commerce (NTIA), and in some fora by the State Department.
Cybersecurity and online organized crime issues are more
appropriately addressed by law enforcement (FBI/DOJ) and/or Defense.
______
Response to Written Question Submitted by Hon. Roger F. Wicker to
Roslyn Layton, Ph.D.
Question. Dr. Layton, it seems that the stated intention and scope
of the recent EU General Data Protection Regulation (GDPR) is far
different from the impacts of its implementation. Can you comment on
how the GDPR has been implemented as it relates to access to WHOIS
data, which is critical to the security and safety of the open Internet
itself?
Answer. The July 31st hearing established that the stated intention
and scope of the GDPR is far different from its implementation. To
begin, Americans have different conceptions of privacy and data
protection compared to Europeans. Moreover, the process to make the
respective regimes, move in the opposite directions. Americans may have
a starting point of privacy, a deductive process from which data
protection policy and regulation flows. The Europeans on the other
hand, are inductive. They build a series of data protection
regulations, and that resulting corpus is what is referred to as
privacy. The GDPR itself only mentions ``privacy'' in three instances,
and it is more correctly understood as a model of data governance,
rather than privacy.
Moreover, the GDPR has many unintended consequences, one of which
is the undermining of the transparency of the WHOIS query and response
protocol as it needed by law enforcement, cybersecurity professionals
and researchers, and trademark and intellectual property rights
holders.\1\ The problem is best described as the conflict between the
right to be informed and the right to be forgotten.\2\ It can also be
understood within the context of the problem of ``privacy overreach,''
\3\ in which the drive to protect privacy becomes absolute, lacks
balance with other rights, and unwittingly brings worse outcomes for
privacy and data protection.\4\ The situation harkens back to a key
fallacy of so-called privacy activists who attempted to block the
rollout of caller ID because it violated the privacy rights of
intrusive callers. Today we agree that the receivers right to know who
is calling is prioritized over the caller.\5\ Similarly we can
understand that the needs of public safety will supersede data
protection, particularly in situations of danger to human life.
Moreover, we should at least expect intellectual property to be in
balance with data protection, not in the conflict we find it today with
the GDPR.
---------------------------------------------------------------------------
\1\ Shane Tews. ''How European data protection law is upending the
Domain Name System.'' American Enterprise Institute. February 26, 2018.
https://www.aei.org/publication/how-european-data-protection-law-is-
upending-the-domain-name-system/
\2\ Shane Tews, ``Privacy and Europe's data protection law:
Problems and implications for the US''. AEI.org May 8, 2018. http://
www.aei.org/publication/privacy-and-europes-data-protection-law-
problems-and-implications-for-the-us/
\3\ See Justin ``Gus'' Hurwitz and Jamil N. Jaffer, ``Modern
Privacy Advocacy: An Approach at War with Privacy Itself?, Regulatory
Transparency Project of the Federalist Society,'' June 12, 2018,
https://regproject.org/paper/modern-privacy-advocacy-approach-war-
privacy/.
\4\ See Maja Brkan, The Unstoppable Expansion of the EU Fundamental
Right to Data Protection, Maastricht Journal of European and
Comparative Law 23, no. 5 (2016): 23, http://journals.sagepub.com/doi/
abs/10.1177/1023263X1602300505?journalCode=maaa.
\5\ Supra Hurwtiz
---------------------------------------------------------------------------
While the goal of the GDPR may have been data protection, an
overbroad application by registrars and registry operators is
threatening to jeopardize the safety of Internet users and the security
of the Internet generally, both within the EU and beyond its borders.
From its launch, WHOIS was designed to enable people to identify whom
they are dealing with on the other side of a website. This not only
promotes the trust necessary to facilitate online commerce, but is also
critical for public safety, consumer protection, law enforcement,
dispute resolution, and enforcement of rights.
The Internet Corporation for Assigned Names and Numbers, however,
announced a Temporary Specification recently that allows registries and
registrars to obscure WHOIS information they were previously required
to make public, ostensibly in order to comply with the GDPR.\6\ This
will hinder efforts to combat unlawful activity online, including
identity theft, cyber-attacks, online-espionage, theft of intellectual
property, fraud, unlawful sale of drugs, human trafficking, and other
criminal behavior, and is not even required by the GDPR, as the U.S.
Departments of Commerce and Homeland Security, the National
Telecommunications and Information Administration, and ICANN's own
Governmental Advisory Committee of more than 170 member countries and
economies have all observed.\7\
---------------------------------------------------------------------------
\6\ ICANN, Temporary Specification for gTLD Registration Data
(adopted May 17, 2018), https://www.icann.org/resources/pages/gtld-
registration-data-specs-en.
\7\ See U.S. Dept. of Commerce and U.S. Dept. of Homeland Security,
A Report to the President on Enhancing the Resilience of the Internet
and Communications Ecosystem Against Botnets and Other Automated,
Distributed Threats 23, 24 (May 2018), https://www.commerce.gov/sites/
commerce.gov/files/media/files/2018/eo_13800_botnet_report_-
_finalv2.pdf; Remarks of David J. Redl, Assistant Secretary of Commerce
for Communications and Information, ICANN 61 (March 12, 2018), https://
www.ntia.doc.gov/speechtestimony/2018/remarks-assistant-secretary-redl-
icann-61; ICANN, Governmental Advisory Committee, Communique--San Juan,
Puerto Rico (March 15, 2018), https://gac.icann.org/advice/communiques/
20180315_icann61%20gac%20communique_finall.pdf.
---------------------------------------------------------------------------
Notably the GDPR does not apply at all to non-personal information
and states that disclosure of even personal information can be
warranted for matters such as consumer protection, public safety, law
enforcement, enforcement of rights, cybersecurity, and combating fraud.
Moreover, the GDPR does not apply to domain names registered to U.S.
registrants by American registrars and registries. Nor does it apply to
domain name registrants that are companies, businesses, or other legal
entities, rather than ``natural persons.''
To protect American citizens, Congress therefore might consider
urging--both through its own diplomatic channels and in its work with
the White House and Federal agencies--that European policymakers
clarify that the GDPR does not prevent access to WHOIS data for law
enforcement, consumer protection, and rights enforcement. Congress
might also indicate to domain name registries and registrars that it
expects them to continue making WHOIS data publicly available to both
law enforcement and private entities for purposes of protecting U.S.
consumers and rightsholders. Federal legislation requiring such
disclosure also should be considered to ensure that the European
directive does not inappropriately interfere with U.S. prerogatives to
set U.S. policy and protect its citizens.
Congress should take note of some key actors driving the GDPR whio
are now in key political positions in the EU. Notably the coming
conflict between the GDPR and WHOIS was described highlighted in a 2017
academic article by law and computer science researchers at the
University of Vienna.\8\ Austria has been ground zero for GDPR
activism. The current head of the EU Data Protection Supervisor (EDPS),
Andrea Jelinek, was formerly the chief of the Austrian Data Protection
Authority which worked closely with Austrian privacy activist Max
Schrems. Schrems founded the Vienna-based non-profit None of Your
Business (NOYB) to professionalize GDPR litigation and has lodged GDPR
complaints against Google and Facebook, requesting some $8.8 billion in
damages on the day the GDPR came into effect.\9\ Jelinek has
incorporated NOYB parlance into EDPS activities and policy
arguments.\10\ In her role in the Article 29 Working Party, the group
that drove the promulgation of the GDPR, Ms. Jelinek noted that the
elimination and masking of WHOIS information is justified under the
nebulous, overbroad, and invented conceptions of the GDPR.\11\ It is
understandable that is group of GDPR supporters are willing to torpedo
internationally accepted norms and conventions in order to legitimize
the GDPR.
---------------------------------------------------------------------------
\8\ Erich Schweighofer, Vinzenz Heussler, and Walter Hotzendorfer.
``Implementation Issues and Obstacles from a Legal Perspective.''
Collaborative Cyber Threat Intelligence: Detecting and Responding to
Advanced Cyber Attacks at the National Level. Editor Florian Skopnik.
Taylor & Francis, 2017. https://www.taylorfrancis.com/books/e/
9781315397894
\9\ https://noyb.eu/wp-content/uploads/2018/05/
pa_forcedconsent_en.pdf
\10\ See the discussion of ``forced consent'', a term defined by
NOYB which has been co-opted by the EDPS.
\11\ https://www.icann.org/en/system/files/correspondence/jelinek-
to-marby-11apr18-en.pdf
---------------------------------------------------------------------------
My testimony underscores that the GDPR violates many U.S. laws and
norms and is likely illegal under international law and should be
challenged by U.S. policymakers.
______
Response to Written Question Submitted by Hon. Roy Blunt to
Roslyn Layton, Ph.D.
Question. As you know, liability protections for online platforms
were instituted, in part, so that they could filter harmful and illicit
content without the threat of civil litigation. In recent years,
however, digital piracy and other illegal digital transactions have
been on the rise, and most of the activities to counter it have been
retrospective. In your testimony, you state that technology and
business models are improving in a way that could better detect
pirated, unlicensed content, yet tech companies do not appear to be
effectively vetting and filtering content on a proactive basis--even
that which is clearly illegal. In 2017, there were an estimated 22.9
billion visits to streaming piracy sites worldwide across both desktops
and mobile devices, a 39 percent increase over the comparable figure
for 2016. Considering the rise of illegal traffic over online
platforms:
Do you believe that technology companies are doing enough to
curb the spread of illicit material online?
Do you believe that the liability protections for technology
companies as currently enacted are accomplishing their intended
goal?
Answer. The presumption some 20 years ago behind section 230 of the
Communications Act and Section 512 of the Copyright Act was that with
liability protections, online platforms would take proactive steps to
combat illegal activity over their services. Moreover, those
protections were only meant to accrue to entities that were not
profiting from illegal activity. Unfortunately, many platforms are
primarily taking steps after-the-fact (if at all), once harm as already
occurred, rather than proactively curbing abuse of their systems.
Moreover, because many platforms' business models are rooted in
advertising or the commercialization of data related to Internet users'
online behavior, some platforms generate revenue from illicit online
behavior. Clearly this was not the intent of the liability shields, and
many online platforms can and should be doing more.
______
Response to Written Questions Submitted by Hon. Catherine Cortez Masto
to Roslyn Layton, Ph.D.
Question 1. Countries and increasingly imposing data localization
requirements, which require companies that collect personal data to
store it on servers within the geographic boundaries of the country, as
a requirement for companies to do business there.
Are there logistically feasible ways for American entities to
process data internationally with the data localization polices that
were discussed at the hearing?
Answer. Not every U.S. company is similarly situated. While some
firms may be able to afford the data localization requirements, this
does not mean that the requirements improve the quality or efficiency
of business. While countries claim to benefit by data localization
(e.g., local economic development), these efforts are at best prestige
projects designed to make a symbolic show of local participation in the
Internet economy. At worst, many of these requirements are merely
fronts for increased surveillance by the foreign government and even
theft of intellectual property. Make no mistake: the goal of this
policy is to exert increasing control of the digital economic model
over the data stored and transferred in the center. There are benefits
especially in totalitarian states to apply this policy that will be
offset against cost of social policing or economic measures (e.g.,
direct taxation based on data localization). Remember that the Internet
and access to information is directly linked to better economic
opportunities, education, and political options, so it is very
sensitive for some governments.
Please note that the free flow of information is the #1 declaration
of the Organization for Economic Cooperation and Development's digital
policy recommendations.\1\ Please see the many helpful discussions on
this topic submitted to NTIA comments on International Internet
Priorities.\2\
---------------------------------------------------------------------------
\1\ http://www.oecd.org/sti/ieconomy/Digital-Economy-Ministerial-
Declaration-2016.pdf
\2\ https://www.ntia.doc.gov/federal-register-notice/2018/comments-
international-internet-policy-priorities
---------------------------------------------------------------------------
To shed further light on this topic, I attach documents prepared by
the Chamber of Commerce, which to my knowledge, offers the most
comprehensive review of the topic and is a credible and authentic voice
for American enterprise.\3\ Please note that I have no financial
relationship with the Chamber nor does my attachment of these materials
constitute an endorsement of any policy.
---------------------------------------------------------------------------
\3\ Forced Localization: Myths and Facts; Submission to ITC April
2018; Letter to Indonesian government; Letter to Indian government May
2018. See the collected reports for Brazil, EU, Indonesia, Japan, South
Korea, Nigeria, Turkey, Vietnam under the webpage ``Globally Connected,
Locally Delivered: The Economic Impact of Cross-Border ICT Services.''
https://www.uschamber.com/report/globally-connected-locally-delivered-
the-economic-impact-cross-border-ict-services.
---------------------------------------------------------------------------
While U.S. policymakers should reject forced data localization, it
is important to understand the motivations for why countries pursue
such measures and what overall changes and adjustments that U.S.
policymakers implement to preclude data localization in future. There
is a sense in many, but not all, countries that American services,
applications, content, and devices dominate the digital economy and
that local competitors cannot get a foothold. Data localization can be
a symbolic response to address what is locally seen as an economic and
digital imbalance and an attempt to compensate for lost local revenue
and taxation.
While the construction of data centers contribute little to local
digital economies, they do have a marginal impact in employment in
traditional sectors (e.g., construction, sanitation, etc) and some
ongoing services for food, transportation etc. However, the centers are
design to be self-sufficient in terms of energy or emergency services
such as fire services hence the companies setting them up are
increasingly to be rewarded for installing those data centers
offsetting the initial and temporal creation of non-technical jobs with
the long-term life of the center and environmental costs. Notably local
governments may leverage their relationships with Silicon Valley
companies for such arrangements.
This problem has also been exacerbated by so-called net neutrality
legislation (some 50 countries) which generally preclude the ability to
local Internet service providers to participate in efficient two-sided
market arrangements with companies such as Google and Netflix, reducing
the ability to invest in broadband infrastructure. Moreover, the lost
transit revenue and other imbalances reduces the total revenue in the
local economy which can be taxed and thus remunerated to the local
country government.
From the point of view of firms such as Google and Netflix, it is
rational that they desire to minimize their costs. However, the policy
creates a loss of consumer welfare in that the cost of transit is
passed on to all consumers, which increases the price of broadband
across the board, falling hardest of people of lower income. The policy
also prohibits the participation of third-party advertisers and firms
to subsidize the cost of broadband, firms which incidentally are
frequently American. This is extremely damaging for the truly poor who
cannot afford Internet access.\4\ While years of net neutrality have
helped cement the market power of Google and Netflix, they policy has
not helped foreign countries create local content and services as was
promised.\5\ It should not be surprising then that countries wish to
compensate for the imbalance, however in a sub-optimal and ineffective
way, whether by antitrust, taxation or forced localization. Had U.S.
Internet firms pursued transparent and efficient two-sided market
arrangements from the start, it is possible that the current situation
of forced localization would be significantly less.
---------------------------------------------------------------------------
\4\ https://www.forbes.com/sites/roslynlayton/2018/07/13/why-does-
california-want-to-adopt-indias-failed-internet-regulation/
#77feeaf3541a
\5\ http://www.aei.org/publication/does-net-neutrality-spur-
internet-innovation/
---------------------------------------------------------------------------
There are other ways countries could achieve consumer and
innovation protections without resorting to heavy-handed,
anticompetitive policies. Indeed, the evidence shows that countries
which have pursued ``soft'' methods for net neutrality such as multi-
stakeholder models and codes of conduct have had more successful to
produce their own Internet innovation. These countries include Japan,
South Korea, Switzerland, and the Nordic countries prior to 2015.\6\
---------------------------------------------------------------------------
\6\ http://www.aei.org/publication/beyond-net-neutrality-policies-
for-leadership-in-the-information-computing-and-network-industries/
---------------------------------------------------------------------------
There is an additional perspective from the experience from gaming
platforms. These platforms provide the same service to different users
based on their location. In countries were gambling or the trading of
virtual currencies is regulated, the gaming users cannot access those
services. Countries can use this argument to require localization,
particularly for government to gain easy access for regulated
industries (e.g., Indonesia and Turkey).
Some countries employ policy arguments in favor of forced
localization based upon distrust from the U.S. following the Edward
Snowden revelations. They see the U.S. as having a double-standard in
which the U.S. Government and firms have access to user data but want
to preclude other countries from doing the same. Naturally there are
good why the U.S. Government and firms would protect user data from
other countries, but nevertheless there is a ``feeling'' that the U.S.
is hypocritical. More broadly this speaks to need to rebuild trust with
other countries, which according to Pew has been on the decline with
some countries for years.
It is possible that some technical substitutes for forced data
localization could evolve in future, notably blockchain with its
ledger.\7\
---------------------------------------------------------------------------
\7\ https://www.amazon.com/dp/B072NYKG2G/ref=dp-kindle-
redirect?_encoding=UTF8&
btkr=1
Question 2. How does this impact academia or the private sector?
Answer. These requirements impose a cost which falls harder on
academic, non-profit, and smaller enterprises because they tend to have
smaller IT budgets and have limited IT staff to implement such
requirements. For these reasons, smaller institutions are more
vulnerable to retribution by foreign governments, particularly if
foreign governments perceive these institutions engaging in politically
sensitive or competitive activity (e.g., a university may have valuable
intellectual property and data localization could be an illicit means
to access that IP; religious organizations are growing in popularity in
China, and data localization can be a means to increase surveillance of
fundraising practices etc.\8\).
---------------------------------------------------------------------------
\8\ https://www.theatlantic.com/international/archive/2017/04/
china-unregistered-churches-driving-religious-revolution/521544/
Question 3. With the various data localization laws taking effect,
can you discuss whether those typically explicitly forbid data transfer
over national borders or would they allow a country, Germany for
example, to host data on German made servers in a neighboring country?
Answer. It appears that there are a variety of conflicting trends
with some countries forbidding transfer while other countries allowing
hosting with preferred national vendors. We can even see conflicting
policies within the same country. It is costly and inefficient to have
such contradictory approaches. For a comprehensive review of the
requirements, please see the documentation by the U.S. Chamber of
Commerce.\9\ See also the helpful report by ITIF.\10\
---------------------------------------------------------------------------
\9\ https://www.ntia.doc.gov/files/ntia/publications/
180717_comments_uscc_ntia_international
internetpolicypriorities.pdf
\10\ https://itif.org/publications/2017/05/01/cross-border-data-
flows-where-are-barriers-and-what-do-they-cost
Question 4. Additionally, if a U.S. company, for example, was
expected to store data on a data center in a country like China, would
it be mandated to use Chinese materials or technology in the
construction of the data center? Please answer generally with respect
to the multitude of data localization laws.
Answer. Please see the study the American Chamber of Commerce in
China.\11\ Indeed China may take a majority stake in the data center
ownership and operation so as to preclude any firm's complaint about
the cost of forced data localization.
---------------------------------------------------------------------------
\11\ https://www.amchamchina.org/policy-advocacy/policy-spotlight/
data-localization
Question 5. The EU-U.S. Privacy Shield is a program that allows
companies to transfer personal data to the United States from the
European Union (EU) in a way that is consistent with EU law. However,
the European Parliament passed a non-binding resolution in July
claiming the United States was not complying with European law and
called on the European Commission to suspend Privacy Shield by
September 1 ``unless the U.S. is fully compliant.''
What would the impact to U.S. businesses be if the EU Commission
suspends Privacy Shield?
Answer. The short answer is that a suspension of the agreement
would be very disruptive for business. Moreover, it would signal a
political breakdown in that the EU does not wish to be reasonable or to
engage in good faith negotiation.
It is important to note that no regulator or enterprise, whether
American or European, expressed that the 15-year-old Safe Harbor
agreement from 2000 was inadequate. However, the Safe Harbor agreement
was invalidated by a of lawsuit brought by activist Max Schrems in the
European Court of Justice in 2015.\12\
---------------------------------------------------------------------------
\12\ https://www.wsj.com/articles/europes-protectionist-privacy-
advocates-1457566423
---------------------------------------------------------------------------
At its height, the Safe Harbor facilitated $250 billion annually in
data transfer, including the salaries of millions of European workers
employed by American companies. The Obama Administration, Department of
Commerce, and other U.S. officials quickly and valiantly salvaged the
agreement into the new Privacy Shield framework. The European
Commission certified that the agreement was satisfactory and adequate
in its first annual report of the new framework,\13\ but now, certain
political factions (notably Max Schrems and the European Green Party)
want to take the Privacy Shield hostage in a self-serving, geopolitical
effort. They want to nitpick about the U.S. not having appointed an
official ``ombudsman'' for the Privacy Shield and claim that this
closes off ability for Europeans to seek redress of violation. However,
Europeans already have multiple means to pursue redress in the USA
(courts, FTC, Dept of Commerce etc.), even more than Americans have
should they wish to pursue redress in the EU. Moreover, the current
acting U.S. Under Secretary of State for Economic Growth, Energy, and
the Environment has been performing the de facto role of the ombudsman
even though it does not have the same title. The position was earlier
held by Catherine Novelli.
---------------------------------------------------------------------------
\13\ https://ec.europa.eu/transparency/regdoc/rep/1/2017/EN/COM-
2017-611-F1-EN-MAIN-PART-1.PDF
---------------------------------------------------------------------------
By way of background, the European Green Party has succeeded in
their key political goal to decommission the nuclear power industry in
Germany. Now they need to a new ``enemy'' and have thus defined it as
Silicon Valley. The Green Party lost seats in the last EU Parliamentary
election (2014). As a result, they ratcheted up the rhetoric against
Silicon Valley, including the drive to promulgate the General Data
Protection Regulation (GDPR). Note that the GDPR is an effort driven
more by geopolitics than consumer protection.\14\
---------------------------------------------------------------------------
\14\ http://www.aei.org/publication/privacy-regulation-insanity-
making-the-same-rules-and-expecting-a-different-outcome/
---------------------------------------------------------------------------
Vera Jourova, the European Commissioner for Justice, Consumers and
Gender Equality, has communicated to the U.S. on the Privacy Shield,
but this likely reflects pressure she gets from Max Schrems and the
Greens, rather than her authentic view. Jourova is part of the ANO 2011
political party whose leader Andrej Babis became Prime Minister of the
Czech Republic in December 2017. Babis is described as the ``Trump'' of
the Czech Republic. The second richest person in the country, he tapped
into the perceived conflict between the ``coffeehouse elite of Prague''
versus the country dwellers (similar to the dichotomy of U.S. coasts
vs. ``flyover country''). While Jourova is trying to help create
political wins for EU President Jean Claude Juncker, it is likely she
is attuned to the populist and nationalist fervor that is sweeping the
EU presently, in which many Europeans are skeptical of Brussels and
increasingly want to disengage from the EU.
Similarly situated is EU Commissioner for Competition Margrethe
Vestager who also comes from a center-right party and is seen as heir-
apparent to EC President Jean Claude Juncker. For these politicians,
the goal is to demonstrate that the European project still has value.
In that way, the center right can create coalitions with left, anti-
corporate parties such as the Greens to channel nationalist fervor into
fighting the invented enemy of American big tech, and thereby
demonstrating the EU is still good for something.
______
Dear Minister Rudiantara, Chairman Wimboh and Governor Agus,
We are writing you today as we understand that your ministries/
agencies are working with approximately 30 other government agencies to
review Government Regulation 82 of 2012 (GR82). We commend these
efforts and look forward to engaging with your government during the
upcoming public consultation process on this regulation. We are also
encouraged that the U.S.-Indonesia Trade and Investment Framework
Agreement (TIFA) discussions held in Washington earlier this month
identified the data localization requirement of GR82 as one of the
priority issues in the bilateral commercial relationship. It is our
hope that the issue can be resolved in a manner that is consistent with
global norms and promotes investment and innovation.
We believe that the requirement to locate data centers and disaster
recovery centers in Indonesia, Article 17.2 of GR82, and repeated in
POJK No. 69 of 2016, POJK No. 38 of 2016, MCIT No. 20 of 2016, MCIT
Circular Letter No. 3/2016, Circular 17/52/DKSP, PBI 18/40/2016, PBI
19/8/2017, and draft regulations on e-commerce and over-the-top
services (OTT)--is not in Indonesia's best interests, and therefore we
strongly advise that it be removed.
Digital technologies are essential drivers of economic growth in
Indonesia, and have the potential to contribute as much as $150 billion
to the economy by 2025,\1\ if the Indonesian government creates a
supportive and conducive regulatory environment. Requiring data centers
and disaster recovery centers to be placed in Indonesia would interrupt
data flows, thereby severely limiting Indonesia's economic development.
---------------------------------------------------------------------------
\1\ http://www.mckinsey.com//media/McKinsey%20Offices/Indonesia/
PDFs/Unlocking-Indonesias-digital-opportunity.ashx
---------------------------------------------------------------------------
Based on our discussions with various Indonesian stakeholders and
further supported by research such as the recent report by the
Information Technology and Innovation Foundation,\2\ we believe the
cost of data localization outweighs any perceived benefits. For
example, the data localization requirement would:
---------------------------------------------------------------------------
\2\ https://itif.org/publications/2017/05/01/cross-border-data-
flows-where-are-barriers-and-what-do-they-cost
Restrict Indonesian businesses' and consumers' access to
digital and e-commerce networks, causing fewer opportunities,
less choice, less service and significantly higher cost and
hampering efforts to develop Indonesia into Southeast Asia's
---------------------------------------------------------------------------
biggest digital economy by 2020.
Increase cyber security risks by creating multiple entry
points in global platforms.
Limit Indonesian businesses' and consumers' access to online
resources and innovative services.
Undermine the competitiveness of leading Indonesian and
global businesses by imposing limits on the ability to utilize
big data.
Raise costs significantly--for example, Brazil's proposed
data localization policies would have increased prices by 54
percent for cloud-computing services.\3\
---------------------------------------------------------------------------
\3\ http://www.leviathansecurity.com/blog/quantifying-the-cost-of-
forced-localization
Encourage others to retaliate leading to the fragmentation
of the Internet and greatly limiting Indonesian startups from
---------------------------------------------------------------------------
expanding regionally and globally.
Lead to lost trade and investment opportunities and reduced
competitiveness. Studies clearly show that data localization
requirements are a deterrent to investment. A 2016 report by
Fifth Era shows that 67 percent of investors surveyed are
uncomfortable investing in Internet businesses that are legally
obligated to store user data on servers located in the same
country where users are located and/or build their own data
centers locally in each country of operations. This concern is
most prevalent in countries that have discussed data
localization, namely India (81 percent) and Indonesia (82
percent).\4\
---------------------------------------------------------------------------
\4\ http://static1.squarespace.com/static/5481bc79e4b01c4bf3ceed80/
t/56f192c240261d47035
66506/1458672343753/201603+Fifth+Er+Report+-
+The+Impact+of+Internet+Regulation+on+
Investment.pdf
According to the European Center for International Political
Economy, if data localization requirements are implemented across all
sectors of the economy, Indonesia will lose 0.7 percent of GDP, see a
2.3 percent reduction in domestic investment, suffer a 1.7 percent
decrease in exports, and experience consumer welfare losses of USD 3.7
billion through higher prices and displaced domestic demand.\5\
---------------------------------------------------------------------------
\5\ http://www.ecipe.org/app/uploads/2014/12/OCC32014_1.pdf
---------------------------------------------------------------------------
Furthermore, data localization requirements and similar mandates
are contrary to global norms, as seen in the APEC Leaders Statement
adopting the APEC Cross Border Privacy Principles,\6\ the OECD
Guidelines on the Protection of Privacy and Transborder Flows of
Personal Data \7\ and the Trans-Pacific Partnership (TPP) Agreement.\8\
---------------------------------------------------------------------------
\6\ http://www.apec.org/Meeting-Papers/Leaders-Declarations/2011/
2011_aelm
\7\ http://www.oecd.org/sti/ieconomy/
oecdguidelinesontheprotectionofprivacyandtransborder
flowsofpersonaldata.htm
\8\ https://www.usasean.org/system/files/downloads/
joint_summary_of_tpp.pdf
---------------------------------------------------------------------------
By removing these barriers and taking a more liberalized approach,
Indonesia will facilitate increased job creation and economic growth. A
recent study by the U.S. Chamber of Commerce demonstrates that a more
open, competitive marketplace for data flows would create 1.74 million
Indonesian jobs, USD 1.42 billion in government revenue, USD 6.48
billion in new investments, and a USD 29.38 billion contribution to
GDP.\9\
---------------------------------------------------------------------------
\9\ https://www.uschamber.com/sites/default/files/
022925_ict_reportflyer_indonesia2.pdf
---------------------------------------------------------------------------
We recognize the Indonesian government's interest in maintaining
reliable access to company and financial data for legitimate
regulatory, audit, and investigative purposes. The U.S. private sector
is willing to continue to engage constructively in finding a solution
that meets the government's needs as well as those of businesses and
consumers. Furthermore, governments around the world are already
developing data sharing systems that would allow regulators to access
data held in other countries, like the International Association of
Insurance Supervisors (IAIS)'s multilateral memorandum of understanding
(MMoU). Sixty-one insurance supervisors, including those of Singapore,
Malaysia, Hong Kong, Australia and India currently utilize this network
to share information. Restrictions on cross-border data transfers could
prevent regulators and auditors in other countries from accessing
information about businesses operating in Indonesia, undermining
regulatory cooperation and creating compliance challenges for
multinational companies.
Thank you for your attention and for considering this input. The
U.S. private sector stands ready to serve as a resource in the
continued discussions around GR82.
Sincerely,
Lin Neumann,
Managing Director,
AmCham Indonesia.
Jeff Paine,
Managing Director,
Asia Internet Coalition.
Jared Ragland,
Senior Director, Policy--APAC,
BSA | The Software Alliance.
Jonathan Kallmer,
Senior Vice President, Global Policy,
Information Technology Industry Council.
Alexander Feldman,
President and CEO,
US-ASEAN Business Council.
Tami Overby,
Senior Vice President, Asia,
U.S. Chamber of Commerce.
cc: His Excellency Budi Bowoleksono, Ambassador of Indonesia to the
United States
The Honorable Joseph R. Donovan, Jr., United States Ambassador to
Indonesia
______
Data Localization Myths and Facts
MYTH: Requiring local data centers will create jobs.
FACT: Jobs are created by businesses that leverage a global network of
data centers, using the best available technology to increase
efficiency regardless of location. Data centers only create a
limited number of low paying, short-lived jobs.
An open market place that allows data flows enables domestic
industries to focus on the quality of their products and services,
better positing them to compete in global markets rather than spending
time and resources on how to move data across borders. Data centers can
cost hundreds of millions of dollars to build and operate.
The experience to date in both Europe and the United States
indicates that while construction of data centers creates employment
opportunities, they are relatively short-lived. For example, only 50
people are needed to support a $1 billion mega-data center built by
Apple in the small town of Maiden, North Carolina.\1\ Further, data
centers are becoming increasingly automated, requiring less staff to
help run them.
---------------------------------------------------------------------------
\1\ https://www.washingtonpost.com/business/economy/cloud-centers-
bring-high-tech-flash-but-not-many-jobs-to-beaten-down-towns/2011/11/
08/gIQAccTQtN_print.html
---------------------------------------------------------------------------
MYTH: Data localization policies will boost economic growth.
FACT: In the long-run, forced localization policies will negatively
impact GDP and foreign investment.
Visions of years of enormous property tax benefits are outweighed
by the incentives that local governments are required to pay to lure
companies to locate in their jurisdiction and by the need to subsidize
the large amount of electricity required to run a data center.
The European Centre for International Political Economy examined
the overall impact of localization measures in seven countries--Brazil,
China, the European Union, India, Indonesia, Korea, and Vietnam--and
found negative impacts on GDP and foreign investment. They found that
economy-wide data localization laws drain between 0.7 percent and 1.1
percent of GDP from the economy and that any gains are too small to
outweigh losses in terms of welfare and output in the general
economy.\2\
---------------------------------------------------------------------------
\2\ http://www.ecipe.org/app/uploads/2014/12/OCC32014 1.pdf
---------------------------------------------------------------------------
MYTH: Data localization will promote domestic industry.
FACT: Data localization requirements reduce competitiveness by walling
off domestic businesses from the billions of potential
customers outside of the home country's borders.
The isolation created by data localization reduces investment and
access to capital--the ability to assess a potential borrower's
creditworthiness or to spot potentially fraudulent active often depends
on the ability to move data across borders. Data localization polices
require more redundancy, personnel, and costs that could be more
efficiently utilized elsewhere.
MYTH: Data localization will lower costs for domestic business.
FACT: Requirements for local servers could hurt domestic industry by
compelling local businesses to sacrifice efficiency and seek
out more expensive, less reliable services.
Localization requirements may limit the ability of firms to access
logistics and supply chain infrastructure, conduct effective research,
secure appropriate insurance, or readily participate in financial
markets. Moreover, one source indicates that when a data center goes
down, it can cost a company as much as $7,900 per minute. Regions with
inconsistent electric grids frequently experience hours of downtime,
resulting in substantial costs. Economic growth is better served by
companies that are able to leverage the most efficient and reliable
services from around the world.
Local businesses would be required to pay 30-60 percent more for
their computing needs if required to localize than if they could go
outside the country's borders. Further, many countries considering data
localization have no publicly available cloud computing providers,
meaning they would be forced to use non-public cloud computing
resources, or to purchase and maintain their own infrastructure which
would require significant investment.\3\
---------------------------------------------------------------------------
\3\ https://static1.squarespace.com/static/
556340ece4b0869396f21099/t/559dad76e4b0899d97
726a8b/1436396918881/Quantifying+the+Cost+of+Forced+Localization.pdf
---------------------------------------------------------------------------
MYTH: Data localization increases security.
FACT: Data security depends on a plethora of controls, not the physical
localization of a server. Keeping data in limited physical
locations harms the security of that data.
Business often back up data outside the country in which it is
collected to help ensure it remains secure in the event of a natural
disaster, power outage or other such emergency that could take a data
center offline. Business and consumers benefit when those who maintain
data are able to use the best available security measures, regardless
of the physical location of the data they seek to protect. Geographic
neutrality with regard to data storage enables all companies,
particularly small ones, to employ cost-effective information security
solutions. Requiring data to be localized would actually increase the
risk of cyber attacks as the amount of data held increase in limited
locations.
MYTH: Storing data locally ensures individual privacy and protects data
from over-broad law enforcement access abroad.
FACT: Forcing data to be stored locally does not have any incremental
impact on privacy.
The belief is that, if data are required to be kept within a
country, governments will be better able to ensure individual privacy
and prosecute those who violate privacy laws. In reality, the location
of servers has absolutely no effect on privacy, as the local government
would still have legal jurisdiction over companies who own the data,
regardless of where their data are actually stored.\4\
---------------------------------------------------------------------------
\4\ http://www2.itif.org/2013-localization-barriers-to-
trade.pdf?_ga=1.126836941.1580072294.14
83722057
---------------------------------------------------------------------------
In general, firms have reported that data-localization requirements
are expensive, time-consuming, and disruptive, and do not improve data
privacy, which is often the officially stated purpose of this type of
measure.\5\ Only, narrowly tailored and proportionate privacy
requirements allow for better oversight and the protection of
individual privacy.
---------------------------------------------------------------------------
\5\ https://www.usitc.gov/publications/332/pub4485.pdf
---------------------------------------------------------------------------
MYTH: Data localization only impacts Internet companies.
FACT: Data localization impacts the operation of foreign and domestic
companies across all sectors.
Over 90 percent of global companies are using ICT services, such as
cloud computing, in at least part of their operations.\6\ The Internet
opens up new markets and export opportunities for businesses of all
size. Small and medium-sized enterprises that rely heavily on Internet
services have 22 percent greater revenue growth than companies that do
not.
---------------------------------------------------------------------------
\6\ http://assets.rightscale.com/uploads/pdfs/RightScale-2015-
State-of-the-Cloud-Report.pdf.
---------------------------------------------------------------------------
Data localization policies fragment the Internet. These
requirements build artificial walls or checkpoints that stop data from
flowing outside national boundaries, making it more difficult and
expensive to operate beyond borders. This is especially the case for
businesses that do not have the resources to deal with burdensome
restrictions in every country in which they may have customers.
MYTH: Data localization centers are cost-effective and lower trade
deficits.
FACT: Typically the equipment necessary to for a data center needs to
be imported into a country, driving up the trade deficit.
Further, data center costs are on the rise due to the increased
power capacity necessary.
Data centers require varying kinds of equipment in order to
operate. The first is IT equipment, which includes servers, storage
unites, and network equipment. This is expensive hardware that is
usually specialized for the type of data it will store. This equipment
typically has to be shipped into the country, and is not just a one-
time cost. In order to stay up-to-date, hardware has to be regularly
modernized. For example, it is recommended that IT servers are renewed
every three years in order to maintain performance and reliability.
The second category of equipment is everything that will help the
data center run, such as electrical systems, mechanical systems,
cooling etc. While these goods are usually sourced locally, they
come1at a high cost. Power costs alone of a data center run around
100,000 USD per megawatt while network connectivity costs run about
250,000 per mile of fiber optic cable connection.
MYTH: Data localization centers guarantee more innovative technologies.
FACT: Not all data centers give access to new and innovative products
and services. And once a center is built, adapting the center
to new technologies requires more equipment and cost. The most
effective way to encourage innovation is through allowing
companies to collect, move, and analyze data across borders.
Not all data centers are the same. Many different types of data
centers and service models exist depending on the data being stored.
Depending on the function one data center may require customized
equipment, higher bandwidth, and/or more security versus another data
center. Therefore, simple requirements to store data locally may not
ensure that the data centers created will focus on innovative
solutions. Further, a data center has limited capacity. Once it is
built it is not easy to change the amount of storage and workload
handle without purchasing and installing more equipment.
Innovation requires data to move so that companies can collect,
transfer, and analyze data. Data centers create an unnecessary barrier
to this movement that can make firms less competitive and innovative.
Instead of putting more resources into improving and creating new
products and services, companies are forced to spend more money on data
storage and compliance activities. This impedes the ability to put more
resources into day-to-day activities as well as innovation. Domestic
companies and start-ups will also find it harder and more expensive to
benefit from the competitive global market that allows the exchange of
research, new technologies, and best practices that can improved
products and services.
______
Statement of the U.S. Chamber of Commerce
ON:
Investigation No. 332-562 Global Digital Trade 2: The Business-to-
Business Market. Key Foreign Trade Restrictions, and U.S.
Competitiveness;
Investigation No. 332-563 Global Digital Trade 3: The Business-to-
Consumer Market, Key Foreign Trade Restrictions
TO: U.S. International Trade Commission (USITC)
BY: U.S. Chamber of Commerce
DATE: April 6, 2018
The U.S. Chamber of Commerce is the world's largest business
federation representing the interests of more than 3 million businesses
of all sizes, sectors, and regions, as well as state and local chambers
and industry associations. The Chamber is dedicated to promoting,
protecting, and defending America's free enterprise system.
More than 96 percent of Chamber member companies have fewer than
100 employees, and many of the Nation's largest companies are also
active members. We are therefore cognizant not only of the challenges
facing smaller businesses, but also those facing the business community
at large.
Besides representing a cross section of the American business
community with respect to the number of employees, major
classifications of American business--e.g., manufacturing, retailing,
services, construction, wholesalers, and finance--are represented. The
Chamber has membership in all 50 states.
The Chamber's international reach is substantial as well. We
believe that global interdependence provides opportunities, not
threats. In addition to the American Chambers of Commerce abroad, an
increasing number of our members engage in the export and import of
both goods and services and have ongoing investment activities. The
Chamber favors strengthened international competitiveness and opposes
artificial U.S. and foreign barriers to international business.
Thank you for this opportunity for the U.S. Chamber of Commerce
(the Chamber) to provide a submission to the U.S. International Trade
Commission's (USITC) Inv. No. 332-562 Global Digital Trade 2: The
Business-to-Business Market, Key Foreign Trade Restrictions, and U.S.
Competitiveness and Inv. No. 332-563 Global Digital Trade 3: The
Business-to-Consumer Market, Key Foreign Trade Restrictions, and U.S.
Competitiveness.
The United States has positioned itself as the leader of the global
digital economy. American companies innovate faster and generally out-
compete foreign firms. The benefits of the digital economy are not
limited to ``technology'' companies but are experienced by companies
across all industries from agriculture to manufacturing. U.S.
businesses of all sizes rely on the Internet to manage their
relationships with customers and supply chains; digital commerce has
spread widely and is even creating completely new industries.
However, U.S. competiveness is threatened by the imposition of
trade barriers that create market access barriers, discriminate against
U.S. firms, and limit the movement of data across borders. In this
submission, the U.S. Chamber would like to highlight five of the top
barriers our companies are facing abroad: (1) data localization (2)
local content requirements (3) standards (4) privacy and cybersecurity
(5) intellectual property. In addition, we have provided an annex that
lists specific barriers per country.
1. Data Localization: Data localization barriers continue to be one
of the most prevalent and impactful barriers to American companies who
are forced to localize their operations. The movement of data through
the global economy is becoming just as important as the ability to move
goods, services, or capital. Further benefits will not be realized if
data does not have the ability to cross borders.
Data localization requirements directly limit the movement of data.
Some common requirements U.S. companies are facing include mandatory
establishment of a data center or physical presence within a
jurisdiction in order to operate as well as restrictions on how data
can be transferred internationally. Data localization creates higher
costs for U.S. companies raise costs for companies and disrupt their
global operations by creating silos of data. In addition, many of the
countries requiring data to be stored locally lack the necessary
infrastructure to ensure ease of doing business and security.
2. Local Content Requirements: Local content requirements require
firms to use domestically manufactured goods or domestically supplied
services in order to operate in an economy. Foreign governments are
increasingly mandating the use of local content in an attempt to boost
the local economy, enhance skills and capabilities, and boost
employment.
Countries are increasingly trying to encourage indigenous
innovation through local content requirements, particularly linking
specific requirements to government procurement contracts and
standards.
3. Standards: As technology continues to evolve, standards must
evolve as well. Voluntary, industry-led, globally recognized standards
will drive secure, flexible, and interoperable solutions that scale
across a global ecosystem. Internationally recognized standards enable
interoperability helping to expand the access business, government, and
consumers have to global markets.
However, many countries continue to set their own onerous local
standards rather than utilizing internationally accepted standards,
assessments, and certifications. Over 80 jurisdictions have created new
ICT-related technical standards, many of which are not consistent with
global standards and norms.
These types of standards create a hodgepodge of sometimes
conflicting and overlapping requirements that disrupt global supply
chains. Others have unnecessary requirements that companies duplicate
testing or approval, even though standards between the United States
and that country are similar. Redundant and unnecessary in-country
testing and certification requirements create a costly burden for
American companies trying to enter or already established in the
market.
4. Privacy and Cyber Security: As the movement of data increases,
data privacy and security have become growing concerns around the
globe. While privacy and security standards are necessary in order to
ensure consumer protection, consumers and businesses also need to be
able to move and access data. However, governments often enact measures
that interfere with these needs without a good regulatory
justification, creating difficulties for companies conducting business
in-country and worldwide. It is important to note that these challenges
are not necessarily traditional ``trade'' type problems where trade
tools are well situated to tackle concerns. More often these issues
require intensive engagement on the part of U.S. regulators engaging in
regulatory cooperation type activities.
While privacy and cybersecurity regimes can create regulatory
challenges that impede digital trade, the motives are not always easily
discernable to label them clear attempts to obfuscate trade
commitments. Many countries have cited privacy and cybersecurity
concerns as the basis for requiring foreign companies to store data
within national borders. U.S. regulators should engage with their
international counterparts to identify their regulatory objectives with
regards to privacy or cyber security in order to determine whether less
trade restrictive solutions can be identified.
5. Intellectual Property: In a rapidly evolving digital age,
adequate protection for digital products and services is critical to
supporting 21st century creativity. As IP-driven creative and
innovative content is increasingly consumed digitally, effective IP
protections must be in place and enforced online. Strong IP protections
provide the legal certainty needed to incentivize investment in the
newest, next-generation technologies and help ensure that these
technologies will be appropriately protected from bad actors and unfair
market practices that discourage future investment. Moreover, strong IP
protections incentivize investment in high-quality content creation
that drives global Internet traffic to legitimate digital platforms.
In particular, companies are increasingly facing requirements to
disclose source code and algorithms as a condition for market access.
This is proprietary information that enables companies to deliver
cutting edge research, products, and services. Further, some countries
that require source code and algorithm disclosure use that information
to prop up their own domestic industry, which in turn erodes the
ability of U.S. companies to compete.
The Chamber has released an annual International IP Index that
illustrates how economies with strong IP systems are more likely to
derive the following benefits:
26 percent more likely to benefit from access to the latest
technologies
Provide up to three times greater access to licensed music
online
Generate nearly three times more theatrical screenings of
feature films
Generate twice as many video-on-demand and streaming
services
Generate almost 3 times more online creative content
62 percent more likely to have larger and more dynamic
content and media sectors
To further underscore our points above, we have compiled a non-
exclusive annex of digital trade barriers that U.S. companies face
across key markets. We appreciate the opportunity to comment and
welcome further opportunities to assist USITC with its investigation of
business-to-business and business-to-consumer digital trade barriers.
Annex: Specific Concerns by Country
Brazil
Data Localization: Brazil has a number of proposed regulations
requiring data localization. In particular, the Marco Civil da Internet
(Law No. 12,965/2014) and recently, the Personal Data Protection Law
Draft Bill. Marco Civil da Internet was enacted in 2014. Described as
``The Constitution of the Internet'', the law is aimed at defending
privacy rights and net neutrality. Although, the provision for data
localization was proposed and debated, it was not included in Marco
Civil da Internet.
Local Content Requirements: Brazilian law includes a number of
local content requirements. The forced localization policies limit the
legitimate content that Brazilian consumers can access, which could
force users to seek out the content on illegitimate sites. The local
content requirements also disrupt the existing supply chain and inhibit
the growth of new technologies.
The Plano Brasil Maior, aimed at boosting the competitiveness of
the domestic industry, has led to the implementation of the Buy
Brazilian Act. In public bidding, a preference margin of 25 percent is
given to goods or services that are produced domestically and comply
with local technical regulations. It promotes goods and services
created by local companies, and companies that invest in research and
development in Brazil. Furthermore, the law allows for ``strategic''
ICT goods and services public procurements to be restricted to local
bidders. Other than the Buy Brazilian Act, Decree 7174 regulates the
procurement of ICT goods and services of the public sector. Government
bodies are to provide preferential treatment to locally produced ICT
goods and services based on a non-transparent price/technology matrix.
While cross-border ICT service vendors are not excluded from public
procurement, protectionist measures such as the Buy Brazilian Act and
Decree 7174 put them at a great disadvantage.
In addition, the Basic Production Process (Article 3 of Law No.
8248 from October 23, 1991) has provisions that offer government
procurement preferences for goods and services that employ technology
developed locally. The Basic Production Process requires the employment
of goods/machines produced locally or technology developed locally.
Within the telecommunications sector, Brazil has barriers to
foreign participation in the telecommunications sector. According to
the Federal Constitution, article 21, XI and Decreet No. 2.617 article
1, in order to receive authorization from Anatel, the National
Telecommunications Agency, a company must be headquartered in Brazil
and have 51 percent of national capital. Indirect participation is
allowed through an intermediary, uncertainty on these provisions
remains around the ability for foreign companies to participate in the
telecommunications sector.
Privacy: Brazil currently has two data protection bills pending, PL
4060/2012 (House bill) and PLS 330/2013 (Senate bill). These bills
mimic the European Union's General Data Protection Regulation (GDPR)
but have even more stringent provisions. The proposed definition of
personal data is expansive and ambiguous, framing almost all general
personal information as personal data.
The draft bills aim to protect the processing of personal data in
order to guarantee the free development of the natural person's
personality and dignity. Bill No. 5276/2016 stipulates a provision
regulating the international transfer of data. This article could
potentially be a barrier for the provision of cross-border ICT
services. It stipulates that cross-border data transfers are only
allowed if the corresponding countries share an equivalent level of
data protection to that of the Brazilian law.
The draft bills do not provide a list of countries whereby
international data transfers are permitted. Sources report that these
bills are heavily modelled on the European Data Protection Directive.
Accordingly, the EU commission has presently recognized the following
countries as providing adequate data protection: Andorra, Argentina,
Canada (commercial organizations), Faeroe Islands, Guernsey, Israel,
Isle of Man, Jersey, New Zealand, Switzerland and Uruguay. As such,
should the Personal Data Protection Law be enacted, Brazilian companies
that have their data stored outside of the countries listed above will
have to repatriate their data and rely on domestic data centers.
Accordingly, the law will limit the breadth of ICT services that would
otherwise be available to local companies.
Digital Piracy: Online piracy remains pervasive in Brazil, greatly
limiting economic and cultural opportunities for Brazilian and American
creative industries alike. Because increased broadband use has
accelerated the expansion of pirated works online, steps must be taken
to develop a legitimate online marketplace which adequately protects
copyrighted works. Of note, in 2017, a new important player has gained
force in the Brazilian piracy ecosystem which further undermines
protection for copyrighted content online: illegal streaming devices,
such as the HTV box, which offers the entire grid of live TV paid
channels, as well as a VOD service with movies and TV shows, illegally
sourced. Furthermore, industry reports that over 50 percent of the
products on the main Brazilian e-commerce platform,
Mercadolivre.com.br, are counterfeit. Brazil's copyright environment
could be significantly strengthened through the creation of an
effective and timely mechanisms to combat online copyright
infringement, most notably expanding the availability of injunctive
relief to prevent access to infringing materials.
Standards: The United States and Brazil are both participants in
CITEL. Brazil should implement the Inter-American Telecommunication
Commission (CITEL) Mutual Recognition Agreement (MRA) with regards to
the United States. This would allow the United States and Brazil to
agree to mutual recognition of conformity assessment bodies and mutual
acceptance of the results of testing and equipment certification
procedures in regards to telecommunications equipment.
Cloud Computing Security Regulation: The Brazil Central Bank's
draft cloud computing security regulation (Public Consultation Notice
57/2017) includes a number of provisions which are concerning to
industry. These include:
Provisions that require data to be stored within Brazil
Onerous company reporting requirements which will
potentially damage companies' ability to implement best in
class security solutions
Prescribing specific security solutions which limit
companies' ability to assess and manage cybersecurity risks to
their business
Mandating broad cyber incident reporting requirements which
will create an administrative burden on companies and
regulators without increasing security
Requiring that companies share sensitive commercial
information without a clear regulatory or investigatory purpose
Creating potentially overlapping cybersecurity regulatory
requirements
The Central Bank has indicated a willingness to engage with
stakeholders. We intend to work with them to remove these concerning
provisions.
China
Digital Piracy: With respect to online piracy, there has been some
progress in recent years in government enforcement against distribution
of infringing content. Chinese enforcement authorities have begun to
crack down on illegal distribution of content, and rights holders have
successfully sued websites engaged in brazen infringement, in some
cases supported by the National Copyright Administration of China
(NCAC). Not surprisingly, the legitimate market has responded
positively to this crackdown on illegal activity. However, China still
lacks effective tools to encourage cooperation of Internet
intermediaries, ensure rapid takedown of infringing content, take
action against repeat infringers, and provide proactive measures to
address piracy. The NCAC national campaign, pushing ahead the third
amendment of the Copyright Law, and the new NCAC guidelines for cloud
services have been good steps in the right direction, but much more
still needs to be done. Increased criminal actions against online
infringers and additional measures against Internet service providers
and online platforms that knowingly host infringing content should be a
priority in the coming year.
There is an additional type of piracy that has become rampant
throughout Asia--illicit streaming devices such as media boxes, set-top
boxes, or other devices that allow users, through the use of piracy
apps, to stream, download, or otherwise access unauthorized content
from the Internet. ISDs are part of a sophisticated and integrated
online ecosystem facilitating access to pirated audiovisual materials.
These devices have emerged as a significant means through which pirated
motion picture and television content is accessed on televisions in
homes in China. China is a hub for the manufacture of these devices.
The devices may be promoted and/or advertised to enable infringement of
copyright or other illegal activities. Chief among these activities
are: (1) enabling users to access unauthorized decrypted motion
pictures or television programming; (2) facilitating easy access,
through apps, to remote online sources of unauthorized entertainment
content including music, music videos, karaoke, motion pictures and
television programming, video games, and published materials; and (3)
pre-loading the devices with infringing apps that provide access to
hundreds of high definition (HD) motion pictures prior to shipment or
allowing vendors to load content upon import and prior to sale, or as
an ``after sale'' service. The Chamber notes that the Beijing
Intellectual Property Court held a set top box manufacturer liable for
streaming unauthorized content under secondary liability theory in
2015. The Chamber is hopeful that China will take a firm stand against
this type of infringing activity and take enforcement efforts to
eradicate the problem, including against exports.
The issue of online journal piracy continues in China and appears
to be worsening. Unauthorized services sell online access to, or copies
of, journal articles without the authorization of--or payment of
compensation to--publishers. These unauthorized services undermine the
investment that international (and Chinese) publishers make in journal
publishing, which helps to deliver high quality journals that are
critical to the advancement of science, technology and medicine within
China and globally. Timely enforcement and effective deterrence is
critically important. China's failure to conclude the investigation of
the case against KJ Med illustrates the remaining enforcement
challenges that allow such an entity to continue its operations.
Publishers also continue to be concerned about ``sharing
services,'' which are open online platforms where users can upload and
share documents. These services, such as Baidu Wenku, Sina, and Docin,
employ ``digital coin'' systems, whereby coins earned through uploading
documents may be used to ``purchase'' English language and Chinese
translations of trade books, textbooks, and journals for download.
These sharing services have ineffective notice and takedown processes
for reporting and addressing infringements. Other online entities sell
login credentials that are used to gain unauthorized access to
proprietary online journal databases.
Data Localization: The Chinese government is exerting greater
control over where commercial data is stored and how it is transferred,
thereby skewing the decision making of foreign companies that must
decide where products are made and innovation takes place.
Data localization requirements have appeared in a wide range of
Chinese policies, making their impact broadly felt across all sectors
of China's economy, including banking, insurance, credit rating,
mapping, healthcare, power generation, and cloud computing. These
policies are restricting the ability of companies to compete in the
China market as multi-national companies.
Below is the primary legal framework and authority for data
localization:
Cybersecurity Law (CSL): Effective June 1, 2017, China's CSL
provides a legal framework and basis for data localization. It sets
forth a potentially expansive scope to store personal information and
important data--both vaguely defined terms--within China's borders.
Article 37 of the law requires all personal information and important
data gathered or generated by critical information infrastructure (CII)
operators to be stored in China. CII operators can transfer
information/data out of China if they have a necessary business
requirement and conduct and pass a security assessment (see section
below on cross-border data flow for details about the security
assessment).
The definition and scope of CII is essential to assessing the data
localization requirement on industry. Article 31 of the CSL gives a
broad definition that is both vague and expansive, and requires the
State Council to formulate a specific CII administrative regulation.
Regulation on the Protection of Critical Information Infrastructure
(CII): Issued for public comment in July 2017, this draft regulation
sets forth significant and stringent regulatory obligations, including
requirements to store important data and personal information locally
and a mandatory review process to move data outside China. Similar to
the CSL, the draft regulation provides a broad and unclear scope for
CII--including everything from telecommunication networks, broadcasting
networks, Internet and other information networks, to organizations
that provide cloud computing, big data, and other information
services--that creates significant uncertainty for businesses.
The Chamber expects China's Technical Committee 260 (TC 260) to
issue guidelines on CII to provide further guidance on CII designation.
The business community urges the Chinese government to define CII
narrowly to only the most sensitive systems, such as the Communist
Party of China, the Central Government, and the People's Liberation
Army but not including state-owned enterprises, local governments, and
healthcare and education institutions. Regrettably, it appears the
reverse may be happening; a recent National People's Congress work
report found over 12,000 CII systems.
Personal data protection/privacy measures: As China develops its
privacy and data protection regime it is critical to engage relevant
stakeholders to ensure interoperability and benefit consumers,
industry, and governments alike. The U.S. business community is
concerned that China has been hesitant to address privacy protection
and enforcement issues through international cooperation. At present,
China is not a member of the APEC cross-border privacy rules system or
the cross-border privacy enforcement arrangement, and its data storage
and security assessments are incompatible existing or emerging
frameworks, including APEC, the General Data Protection Regulation,
Pacific Alliance, and the NAFTA update. Industry is concerned that
China approach to data protection and privacy--which unreasonably
focuses more on where rather than how data is stored in the name of
privacy and cybersecurity--will risk fragmenting the Internet along
national or regional borders.
China has neither an omnibus privacy/data protection law, nor a
single data protection authority responsible for enforcement. Rather,
it regulates and enforces privacy through a number of industry-specific
regulations and agencies. Some Chinese officials are calling for a
stand-alone Privacy Law; however, it is still likely several years
away.
The below list represents a non-exhaustive list of the main laws
and regulations currently governing personal data protection and
privacy.
Cybersecurity Law: China's CSL adopts and modifies existing
regulation on privacy issues and codifies them into law. The CSL
requires user consent for the collection of personal information. Such
requirements apply to network operators rather than being applicable to
data collection generally by all potential data collectors. Network
operators--which is loosely defined and could mean any network--will be
subject to several requirements on collecting and using personal
information, including ensuring the collection and use is legal,
proper, and necessary, removing/correcting errors in personal
information, and informing authorities in the event of a data breach or
likely data breach.
Personal Information Security Specification: In initial drafts of
the Specification, explicit consent was required for the collection and
use of personal information. The final draft, however, removed the term
``explicit'' from consent for certain items. This change may signal a
potential easing on the consent requirement to allow implied consent.
However, because the specification does not expressly state that
implied consent is allowed, it may lead to uneven implementation by
enforcement agencies.
Moreover, because the CSL does not allow the collection of personal
data outside consent, it creates incoherence between law and standard.
Consequently, despite some optimism, uneven and selective enforcement
appears to be the most realistic result.
As China's data and privacy measures are in a state of flux, it is
critical that the U.S. Government continue to monitor ongoing
developments and their impact on industry.
Restrictions on cross-border data flows: In addition to the
policies discussed in the above data localization section, China also
maintains specific regulations and standards aimed at cross-border data
flows:
Security Assessment Measures for Exporting Personal Information and
Important Data: The Measures introduced by Cyberspace Administration of
China (CAC) in April 2017 implement Article 37 of the CSL, outlining
security assessment requirements for companies that export data
overseas. While the CSL only requires a security assessment for CII
operators, the Measures significantly expand the scope of cross-border
data flow restrictions to all network operators, which could
conceivably encompass any company. After significant pushback from
industry, CAC granted a 19-month grace period (which will take effect
December 2018) for businesses to comply with the Measures, but it does
not appear to have addressed industry's substantive concerns.
Guidelines for Cross-Border Data Transfer Security Assessment:
China's TC 260 issued the draft Guidelines for public comment in
October 2017. The latest draft broadens the definition of ``operations
within the territory of China'' to network operators that are not
registered in China but provide products or services inside the
country. It also expands the definition of data exports to data that is
not transferred to or stored outside of China but is accessed and
viewed by overseas individuals or organizations (excluding public
information/websites). Regrettably, these guidelines intensify foreign
companies' concerns about the outlook of China's data regulation.
In combination with China's data localization requirements, the
cross-border data flow restrictions are raising costs and creating an
uneven playing field. Restrictions on cross-border data transfer
advantage domestic companies through easier access to data on one of
the world's two largest national populations as data is regarded as a
national strategic resource.
We welcome the recent U.S. Government filing at the WTO that calls
upon China to refrain from implementing the CSL and various
implementing measures. The U.S. Chamber and our members agree with the
U.S. Government that implementation of these measures would disrupt,
deter, and in many cases, prohibit cross-border transfers of
information that are routine in the ordinary course of business.
Technical Standards
Commercial cryptography/encryption regulations: The Chinese
government is in the process of drafting its first Encryption Law. The
below summary highlights industry's main concerns:
Draft Encryption Law: China's draft Encryption Law takes an overly
broad regulatory approach towards commercial encryption that could have
a large impact on trade in ICT products in China. Key provisions of
concern include strict and intrusive import/export licensing regimes
for commercial products with encryption, requirements to use mandatory
national standards, burdensome testing and certification requirements,
and broad enforcement powers that could require disclosure of sensitive
and confidential business information. Moreover, the Cryptography Law
limits participation by foreign companies to one of the three
categories of encryption and only under strict regulation. Because
encryption is a standard feature of almost all technology products, it
could have significant impact on a wide range of companies.
Market-specific testing and certification requirements: China uses
a number of testing, certification, and standards requirements that not
only restrict companies' ability to access and compete in the market,
but also put valuable IP and proprietary information at risk of theft
or exposure.
Secure and Controllable: ``Secure and controllable'' is one of the
clearest and most concrete examples of discriminatory treatment through
a standard. The basic secure and controllable concept is incorporated
into both the National Security Law and the CSL, giving it a legal
basis.
Although never formally defined, regulations and guidelines using
the term indicate that companies' information communications products
would not be able to qualify as ``secure and controllable'' unless they
surrender key technologies, such as source code and encryption
algorithms, to Chinese authorities. In recent draft standards issued by
the Chinese TC 260 committee on CPUs, operating systems, and office
suites, the ``secure and controllable'' score is linked directly to IP
disclosure (i.e., the more IP an applicant discloses the higher its
score).
The Chinese government has asserted that the secure and
controllable concept was introduced to ensure information technology
products and services used in Chinese networks--ranging from commercial
enterprises to government institutions--were secure. While every
country is justified in protecting its national security, it should not
be used as a pretext to pursue and mask industrial policy. In 2015,
Presidents Obama and Xi agreed not to impose nationality-based
conditions or restrictions on the purchase, sale, or use of ICT
products by commercial enterprises. Since the commitment was made, U.S.
industry has not seen a reversal of the policy. To the contrary, there
has been a proliferation of secure and controllable policies across
industry sectors, which calls into question China's commitment to the
2015 agreement.
Trade-inhibiting security reviews may weaken security, constitute a
technical barrier to trade as defined by the WTO, and put valuable
American IP at risk of inappropriate disclosure. As Chinese companies
ascend the value chain and master more advanced technologies, state-led
security reviews and testing may be used to block foreign companies
from the China market and thereby allow domestic champions to build
economies of scale in a protected market from which they can compete
globally.
With the passage of the CSL and the issuance of draft security
measures and finalized equipment catalogues, these potential concerns
are beginning to take shape. According to the CSL, all CII operators--
which may cover a large swath of commercial industries--buying
communications networking products and services are required to undergo
a security review. The potentially broad scope of this requirement and
the intrusive aspects of review--including the possible required
disclosure of source code, algorithms, and other sensitive IP--may
result in U.S. companies being either marginalized from the market or
forced to disclose valuable information.
The Network Products and Services Security Review Measures: The
pilot measures for security assessments have provisions that aim to
raise the overall level of ``secure and controllable'' content and use
non-security review criteria, such as dominant market position, in the
assessment. These policy measures also include a number of elements
that appear unjustifiably intrusive, including allowing officials to
enter offices and question staff.
Catalogue on Key Network and Specialized Equipment Security
Products: For products falling within the Key Network and Specialized
Equipment Security Products Catalogue, companies are required to
undergo an unspecified government security-examination or obtain a
security certification to be sold in the commercial market. The
Ministry of Public Security and CAC, among other agencies, are
responsible for certifying the testing laboratories. Whether it is
through the security assessment measures or the catalogue's examination
or certification, companies may be required to either meet subjective
criteria or disclose an excessive and burdensome amount of sensitive
information that is unnecessary for its stated objective. Although this
catalogue constitutes a technical regulation as defined in the WTO TBT,
China has not notified the catalogue to the TBT.
Multi-Level Protection Scheme: In addition to the above recently
issued security reviews, industry continues to have concerns about the
Multi-Level Protection Scheme (MLPS). MLPS, first issued in 2007, is a
rating system aimed at promoting indigenous innovation by mandating
certain products used in Chinese information networks be developed and
produced by entities invested by Chinese citizens or controlled by the
State. MLPS imposes significant restrictions on procurement that
unjustifiably restrict foreign companies from accessing the market.
More recently, companies report that the scope of MLPS is
broadening and the requirements are becoming more onerous. MLPS
mandates that a broad spectrum of advanced IP-intensive systems,
including commercial insurance, cloud computing, big data, mobile
Internet of Things, and industrial controls, that go well beyond
national security, contain not only indigenous innovation but
indigenous IP. As a result, companies face a stark choice between
transferring their core IP or losing market access.
Market Access
Administrative Licensing: Misuse of administrative licensing
procedures provides a potential opportunity for a company's market
access to be restricted or trade secrets or proprietary information to
be put at risk of unnecessary disclosure. For U.S. companies operating
in China, administrative licensing (i.e., difficulty or exclusion from
obtaining required licenses) remains a top concern, ranking among the
top five challenges for industry overall, and technology and R&D
industries, in particular. According to the 2017 AmCham China survey,
opaque, unpredictable, and burdensome licensing procedures, at the
central, provincial, and local level, can ultimately amount to market
access barriers.
Telecommunication (BATs and VATs): The telecommunications industry
provides an illustrative example of how licensing is interconnected
with market access and technology transfer. China divides its
telecommunications sector into two categories: basic and value-added
(VAT). Within its VATs category, China takes an expansive view that
encompasses ``computer and related services (CRS),'' such as cloud
computing, that use a telecom network to supply a computer service. By
classifying relatively new technology offerings as VATs, China is
circumventing its WTO market access commitments for CRS based on its
domestic classification system. Per the Guiding Catalogue on Foreign
Investment, both telecommunications categories are subject to joint
venture and equity cap restrictions.
Companies operating in either category are generally required to
obtain an operating license. However, the requirements are often overly
burdensome, and in certain circumstances, only a local entity can
obtain a license. This general inability to obtain a license puts
foreign companies in a highly disadvantageous position. Moreover,
because the Chinese government not only owns and controls all major
operators in the telecommunications industry but also regulates it,
there exists a potential conflict of interest.
To enter the telecommunications market, companies are all but
forced to joint venture with a Chinese company that holds sole
possession of the required license or licenses. As a result, the
discriminatory licensing regime creates an uneven playing field on
which Chinese companies are able to set extractive terms--including
mandating technology transfer--for the joint venture.
Virtual Private Network Regulation: On January 17, 2017 China's
Ministry of Industry and Information Technology issued its Circular on
Cleaning up and Regulating the Internet Access Service Market, which
took effect on March 31, 2018. Industry is concerned that this circular
could be disruptive to foreign-service suppliers and their customers in
China, resulting in new constraints on market access and unnecessary
burdens. The U.S. Chamber of Commerce supports the communication from
the United States at the WTO Council for Trade in Services in February
2018, and encourages the U.S. Government to work in concert with its
trading partners to mitigate the adverse impact of the Circular on the
business community.
The sections below highlight two sector-specific examples in the
electronics payment and cloud computing industry on how China uses its
administrative licensing and regulatory regime to block market access
or force technology transfer:
Electronic Payments: Approximately 10 years after China agreed to
open its market to foreign electronic payment service (EPS) providers
under its WTO accession agreement, and following an adverse ruling at
the WTO in 2012 against China's EPS practices, U.S. EPS providers still
are unable to participate in China's EPS market. Meanwhile, China's
electronic payment service (EPS) suppliers, mobile payment companies,
and bank card issuers dominate the domestic market and are making
significant inroads into global markets, including the United States.
As part of the U.S.-China 100-Day Action Plan, China committed to
``issue any further necessary guidelines and allow wholly U.S.-owned
EPS suppliers to begin the licensing process, which should lead to full
and prompt market access.'' While China complied with its commitment to
issue new guidelines, China has yet to clarify if greenfield
investments by U.S. EPS suppliers are subject to national security
reviews in order to obtain their licenses. Further, there remain
questions surrounding the review process, including which Chinese
governmental and non-governmental entities would be involved, as well
as the sequence and time-frame by which the review will occur.
More recently, the People's Bank of China issued an announcement
that it will require all personal and financial information collected
or generated by foreign payment institutions to be stored, processed,
and analyzed in China. As a result, even if market access is eventually
given to foreign companies, localization requirements will apply to all
their data.
Cloud Computing: While U.S. cloud service providers have been at
the forefront of the movement to the cloud in virtually every country
in the world, China has imposed onerous regulations on foreign cloud
service providers--effectively barring them from operating or competing
fairly in China. Chinese laws and regulations on non-Chinese cloud
service providers force U.S. cloud service providers to transfer
valuable intellectual property, surrender use of their brand names, and
hand over operation and control of their business to a Chinese company
in order to sell in the Chinese market, as well as separate the local
instance of the cloud service from the global instance, creating
interoperability issues.
More specifically, these measures (1) prohibit foreign cloud
service providers from operating cloud services; (2) prohibit direct
equity participation of foreign cloud service providers in Chinese
cloud companies; (3) prohibit foreign cloud service providers from
signing contracts directly with Chinese customers; (4) prohibit foreign
cloud service providers from independently using their brands and logos
to market their services; (5) prohibit foreign cloud service providers
from contracting with Chinese telecommunication carriers for Internet
connectivity; (6) prohibit foreign cloud service providers from
broadcasting IP addresses within China; (7) prohibit foreign cloud
service providers from providing customer support to Chinese customers;
and (8) require any cooperation between foreign cloud service providers
and Chinese companies be disclosed in detail to regulators. These
measures are fundamentally protectionist and anti-competitive.
Intellectual Property Rights
Technology Transfer
Compulsory Licensing: Compulsory licensing is not a new concept
within China's legal and regulatory frameworks. A provision in SAIC's
IP enforcement rule promulgated under the Anti-Monopoly Law (AML) could
be used in some cases to force U.S. companies to license their
essential technologies to Chinese companies. Furthermore, China's
Patent Law includes a provision on compulsory licensing that may, if
applied broadly, impose an unreasonable obligation for patentees to
provide their technology to Chinese competitors.
China is also exploring tying compulsory licensing to state
funding. The State Council issued in July 2017 a Guiding Opinion that
discusses compulsory licensing of patents that are obtained with
funding from the state. This approach raises significant concerns for
companies that would choose to accept public money to conduct R&D in
China, including under industrial plans such as Made in China 2025 and
Strategic Emerging Industries, as they could be forced to license their
IP to the Chinese government. This policy, if implemented, would
undermine innovation and diverge from the spirit of comments made by
Minster Miao Wei that Made in China 2025 would not compel a technology
transfer.
Draft Export Control Law: China's draft Export Control Law--which
includes factors such as economic development and industrial
competitiveness in determining control lists--is creating uncertainty
about whether technology developed by foreign companies in China-based
R&D centers can be exported, thereby creating a non-market restraint on
a companies' ability to commercialize their technology.
Requirement to Disclose: While China is a signatory to the WTO, it
appears that China does not use its commitments in the WTO Agreement on
the Technical Barriers to Trade (WTO TBT) as a basis for its legal and
policy frameworks for standardization. As a result U.S. companies face
a variety of challenges associated with standardization in China,
including not being able to fully participate in standards setting
bodies, domestic standards where international standards already exist,
non-notification of technical regulations to the WTO, and Chinese
standards that either forcibly include or exclude foreign technology.
Draft Standardization Law: Unfortunately, these trends appear to be
worsening. For example, the September 2017 draft of the Standardization
Law expands on a public disclosure requirement that is both unique to
China and potentially damaging to all market participants, and would
add unnecessary costs and risks for all enterprises in China.
Furthermore, a newly added and deeply concerning article in the latest
draft stipulates state endorsement of incorporating indigenously
innovated technology into industry and social standards. Combined with
other implementation documents and public statements that allow social
standards to be transposed to become national and industry standards,
the inclusion by the state of a preference for indigenous innovation
seems to create a trade barrier that would conflict with the WTO TBT.
Colombia
Digital Piracy and IP-related Intermediary Liability: In 2016, the
Colombian government began to review the 1982 Copyright Law, which
would allow Colombia to partially comply with commitments made in the
TPA. Among other elements, the draft includes a number of positive
elements such as extending civil liability to circumvention of TPMs as
well as to production and sales of circumvention devices, and allowing
destruction of circumvention devices and infringing materials. In
addition, the draft expands certain exclusive rights to authors and
phonogram producers. At the same time, the text also seeks to update
copyright exceptions by adding exceptions for library and research use
and for temporary electronic copies not involving commercial gain,
among others. Moreover, it introduces statutory damages for copyright
infringement (although the actual amounts must be decided by decree)
and would increase copyright protection to 70 years for works for hire
as well as for phonograms and broadcasts. However, it falls short of
addressing other key gaps in the online copyright regime, including in
relation to ISP liability and assistance in takedown of infringing
content online. While Colombia's commitments go ignored, levels of
piracy there continue to grow, increasingly online. There is no serious
effort on the part of Colombian law enforcement to prosecute
administrators and owners of websites, blogs, and ``hubs'' involved in
the distribution of illegal files. Copyright protection in Colombia
could be strengthened through the implementation of the FTA provisions
and by further mechanisms to combat online piracy.
European Union
Digital Single Market: Europe's approach to the single-market is
always most successful when it aims to remove trade barriers between
the Member States and not to limit competition in a misguided attempt
to support the single-market. Unfortunately, since announcing the DSM
as a priority, the initial ``win-win'' framing of the exercise has
faded as some European officials have sought to use the DSM to handcuff
the competiveness of U.S. companies. The anti-American approach at
times reflects an intellectually sloppy critique of government
surveillance programs that lumps in unrelated private business
activities; at other times, it betrays a misunderstanding of the best
practices required to build domestic industry. In any event, it is
important that the DSM remain focused on keeping Europe open for
business within Europe and connected to the rest of the global economy.
Data Privacy: The General Data Protection Regulation (GDPR) will go
into effect May 25, 2018. Ambiguity around the implementation of this
agreement remains. Only two EU Members States, Austria and Germany,
have finalized implementing legislation around the GDPR. This
regulation will impede the ability of American companies to access and
utilize European citizen data.
GDPR will come into force in May 2018, and companies are expected
to be in full compliance by then. Yet, guidance from data protection
authorities has been slow to come out, and many U.S. and European
companies still have a number of compliance questions. Consistent
implementation of GDPR across all EU member states represents an
immense regulatory challenge for the EU that has consequences for EU
competitiveness in the digital economy in addition to American firms
doing business there.
Further, the EU-U.S. Privacy Shield has come under scrutiny by the
EU's Article 29 Working Party (WP29), in which it has called for the
U.S. Government to prioritize the appointment of an Ombudsperson and
members of the Privacy and Civil Liberties Oversight Board (PCLOB). It
has called on the U.S. Government to address these concerns by May 25,
2018. The WP29 also outlined a number of other concerns in its November
2017 Opinion on the EU-U.S. Privacy Shield, and calls for these to be
addressed at the second joint review. The WP29 states in this opinion
that if the concerns are not address in in the given time frames, the
members of WP29 will take appropriate action, including bringing the
Privacy Shield Adequacy decision to national courts and the European
Court of Justice.
The Privacy Shield is vitally important for American and European
companies to continue to transfer data across the Atlantic and do
business and sets a high standard for the protection of consumer data.
The EU-U.S. Privacy Shield is successful on many levels:
It facilitates the movement of data cross-border for
American and European businesses, while meeting the rigorous
privacy expectations of American and European consumers.
It triggers a thorough review of company's privacy
practices, resulting in demonstrable changes to how they do
business and protect consumer privacy, in order to certify.
It enhances accountability by establishing a meaningful U.S.
Government and EU Commission process for addressing any
consumer concerns that arise.
It ensures timely and swift action in response to consumer
privacy concerns, though relatively few companies have received
complaints.
It is accessible as more than 2,400 American and European
companies have been certified, half of which are small and
medium sized businesses.
It serves more broadly as a model for regulatory cooperation
demonstrating that it is possible to find solutions that bridge
different regulatory frameworks.
Cyber Security Act: The European Commission's proposed Cyber
Security Act contains provisions for a voluntary ICT certification
framework for connected products and services. While this does create a
consistent framework for companies that provide such products and
services--meaning that they can certify once, while complying Europe-
wide--we remain concerned that this will create a barrier for device
makers to enter the European marketplace because certification is a
costly and burdensome undertaking. In addition, it remains possible
that the final proposal, or future updates to this proposal will
require mandatory compliance with such provisions.
NIS Directive Transposition: While the NIS Directive does not
explicitly call for provisions that would act as a barrier to digital
trade, the flexibility that it affords Member States will create
divergent approaches to implementation which ultimately undermine the
Digital Single Market and disproportionately limit the ability of
international companies to operate across Europe. These include the
ability for Member States to develop security measures for Operators of
Essential Services (Critical Infrastructure) at the national level,
rather than utilizing international standards, and to introduce
divergent thresholds and reporting requirements for significant cyber
incidents.
Digital Piracy: Many EU economies have invested in building
comprehensive and effective IP frameworks through domestic legislation,
judicial decisions, and IP provisions in new trade agreements. In the
U.S. Chamber Index, six EU economies--the UK, Sweden, France, Germany,
Ireland, and the Netherlands--all score closely behind the U.S. due to
the strength of their IP frameworks. However, copyright protection
continues to be one area where the EU economies' IP legislation and
enforcement consistently falls short. In particular, online piracy
creates a significant impediment to digital trade throughout the
region. Both Spain and Italy, which otherwise have very strong IP
systems, suffer from continually high piracy rates. In order to combat
digital piracy, the EU's e-Commerce Directive provides the authority
for a court or administrative authority to require ISPs to terminate or
prevent copyright infringement by third parties that use their
services. The e-Commerce Directive also lays out the basis for
injunctive-type relief against infringing websites in EU member states,
while still providing a safe harbor for ISPs. Recent case law from the
Court of Justice of the European Union and in individual EU countries,
including Spain and Italy, illustrates that countries are implementing
the tenants of the e-Commerce Directive to help combat digital piracy
and better protect copyrighted content online.
India
Privacy: Following the Indian Supreme Court ruling in August 2017
that declared privacy to be a fundamental right for Indian citizens,
the Indian government has to undergo the challenging task of preparing
privacy legislation, as directed by the Supreme Court. While no
proposed legislation has surfaced, this new regulation will have
significant impact on American companies operating in India. It is
essential that as India embarks on the process of developing a national
privacy framework, it bears in mind the important economic benefits
created by flexible approaches to the use of data, and the importance
of enabling cross-border data flows.
Foreign Direct Investment: The Department of Industrial Policy &
Promotion (DIPP) does not currently allow 100 percent FDI in e-commerce
incrementally in denoted sectors--and ultimately across all sectors.
FDI has been relaxed in the food retail sector, which has resulted in
the commitment of investment and opportunities to digitize markets for
farmers and growers. Similarly, other sectors which can benefit from
increased FDI flow need to be considered. Two sectors where it can be
taken up are `Digital products' and `Textiles'. Digital products refer
to computer programs, text, video, images, sound recordings, and other
products that are digitally encoded and produced for commercial sale or
distribution. These products are delivered over a digital network E.g.
Music tracks, video, software, newspapers, books. These are intangibles
its trade is deemed as trade of ``right to use'' or ``transfer of right
to use'' just as there is ``deemed sales'' or ``transfer of right to
use'' of tangible goods. These are the products which can be purchased
as well as consumed digitally. Typically, digital products include
Software (productivity tools, security software, databases, design
applications etc.), Audio visual products--movies and television
programs, Video games, Digital images and products, E-books, Music
files etc. The textile industry is currently under major stress due to
several factors including GST, reduction in exports and tariff
advantages of other countries. An increase in FDI inflow to this
sector, which attracted only $1.5 billion in the last 15 years, will
ensure it reaches its potential. One of the ways of ensuring backward
flow of FDI is by allowing market access to textile products which will
ensure additional investment in the sector.
Digital Piracy and IP-related Intermediary Liability: Pervasive
digital piracy presents a significant challenge for creative industries
operating in India. The International Intellectual Property Alliance
(IIPA) discusses the scope of the problem in their 2018 Special 301
submission, noting ``A September 2017 consumer survey of active
Internet users in India showed that 94 percent of those surveyed
downloaded pirated music content in the last six months. . .In a one-
month period, the motion picture industry estimates that 63 million
visitors accessed the top five piracy websites (mostly torrent sites)
in India for motion picture and television content, accounting for 440
million page views.'' Further, studies have shown that 60 percent of
software in India is pirated, creating an enormous cyber-security risk
for Indian businesses and consumers. Despite high levels of software
piracy, music piracy, and counterfeit goods, Indian law remains unclear
about the availability and requirements of a notice and takedown system
to combat online piracy.
However, in what is otherwise a challenging copyright environment
in India, a positive trend has emerged over the past few years with
rights-holders increasingly being able to defend and enforce their
copyrights through injunctive relief. Since 2012 there have been a
number of cases whereby access to websites offering pirated and
infringing content has been disabled through court orders, including
notorious international sites like The Pirate Bay. Injunctions have
been issued by both the High Court of Delhi and High Court of Bombay
with the Department of Telecommunications instructing Indian Internet
Service Providers to carry out the order. While the case law and
procedures are still evolving (particularly with regards to disabling
access to only specific URLs versus entire websites), we hope that this
development will act as a strong deterrent against online piracy in
India.
Indonesia
Data Localization: The Indonesian government's issuance of
Government Regulation No. 82 of 2012 on Electronic System and
Transaction Operation (``GR 82/2012'') creates significant barriers for
U.S. firms. In particular, it requires Electronic System Operators
(ESOs) for public services to place a data center and disaster recovery
center in Indonesia for the purpose of upholding justice, safeguarding,
and upholding state sovereignty towards its citizen's data. While
public services is not defined in the bill, it is defined elsewhere in
Public Services Law (Law No. 25 of 2009). A company considered to be
carrying out public services appears to be covered. The government is
currently reviewing the definition of public services and may expand
the regulation to include all services. Other aspects of GR 82/2012
erect significant barriers to entry, including disclosure of encryption
used in providing e-services and providing the encryption key to the
government. The U.S. Chamber has repeatedly encouraged the government
not to proceed with this regulation.
Over-the-Top Services: In 2016, Indonesia proposed regulations
known as ``the Draft Regulation on the provision of applications, and/
or content services through the Internet OTTs.'' In August 2017,
Indonesia's Ministry of Communication and Information Technology (MCIT)
released a new draft. Some changes were made, but issues remain
requiring OTT providers to set up a permanent establishment in
Indonesia, offer terms of service in Indonesian language and use
Indonesia's national payment gateway.
The proposed measures will be prohibitively burdensome for start-
ups and small-scale businesses that lack the resources to establish
operations in Indonesia. Indonesian consumers will also be denied
access to the full benefit of global online services and will harm
Indonesia's competitiveness in the digital economy. On tax issues,
Indonesia has supported a collaborative approach globally in the
context of the Organization for Economic Co-operation and Development's
(OECD) ongoing work on base erosion and profit shifting (BEPS). A
departure from this approach toward sector-specific tax requirements
before OECD's BEPS project is fully implemented will inadvertently
create barriers to entry and discriminate against foreign providers in
ways that are inconsistent with Indonesia's international trade
commitments. Keeping the Internet open and free of barriers is critical
to Indonesian consumers' enjoyment of the Internet and to enabling
Indonesian businesses to remain competitive in the increasingly
digitalized global economy.
Local Content Requirements: The government also has several
regulations regarding local content requirements, for example
regulation 68/2015 from the Ministry of Industry imposes local content
requirements on the manufacturing and development of mobile phones and
communication devices.
Indonesia maintains a number of protectionist policies, some of
which are not enforced in practice, which keep out legitimate content,
including a proposed 60 percent local content screen quota, onerous
pre-production content review requirements, a prohibition on dubbing
imported films, local replication requirement, foreign investment
limitations, and other restrictions on the audiovisual industry.
Under the Presidential Regulation no.54/2010 Article 104, foreign
companies are only allowed to bid for a government procurement project
if the bids exceed the threshold of IDR 20 billion (USD $1.49 million)
for goods and other services and IDR 10 billion (USD $744,000) for
consulting services. Moreover, in order to promote optimized use of
domestic goods and services, government entities are to give
preferential treatment in the form of price preferences to domestic
goods and services providers, as stipulated in the Presidential
instruction No. 2/2009. While cross-border ICT service providers are
not excluded from government procurements, such protectionism puts them
at a disadvantage.
Digital Piracy and IP-related Intermediary Liability: The creative
content community faces significant challenges in Indonesia. Digital
piracy is persistent, enforcement is wholly insufficient, and courts
are mostly ineffective. A significant and continued investment of
resources and training for enforcement entities and courts and high-
level political commitment is needed.
Indonesia has made meaningful improvements over the past year,
though significantly more needs to be done given the scale and scope of
piracy in Indonesia's market. In a positive development, the 2014 Act
provided new tools to combat online infringement and the circumvention
of technological protection measures (TPMs). Regulations implementing
the law (Regulations No. 14 and 26) were enacted in July 2015,
providing new administrative remedies in response to websites that
facilitate infringement by disabling access to primarily infringing
websites. Additionally, the Creative Economy Agency established an
anti-piracy task force in the second half of the year. These new tools
have already proven useful and suggest new dedication to anti-piracy
efforts within Indonesia.
Nigeria
Data Localization: Since 2011, Nigeria has required all point-of-
sale and ATM transactions to be processed within Nigeria. In December
2013, the National Information Technology Development Agency (NITDA)
issued Guidelines for Nigerian Content Development in Information and
Communications Technology (the NITDA Guidelines) applicable across a
wide range of of ICT products and services in Nigeria, which has come
under subsequent revisions. The Guidelines put restrictions on the
cross-border flow of data requiring that all consumer data collected by
companies in Nigeria be stored locally.
Local Content Requirements: The Nigerian government is proactively
encouraging local content development in an attempt to boost the local
economy, enhance skills and capabilities, and boost employment.
Nigerian content regulations started from strategically important
sectors such as the oil and gas industry. In 2010, the Nigerian Oil and
Gas Industry Content Development Act 2010 No. 2 was introduced.
According to this act, IT management consultancy services and data
management services procured by oil and gas companies are subjected to
50 percent Nigerian content, while other Information Systems (IS)/
Information Technology (IT) Services require 75 percent of Nigerian
content.
According to the NITDA Guidelines, the design, procurement,
testing, deployment, maintenance and support shall be executed by
Nigerian indigenous ICT Companies, Nigerian subsidiaries of
international ICT OEMs, or Nigerian partners of international ICT OEMs.
For example, companies determined to be Original Equipment
Manufacturers (OEMs), for example, are required to maintain at least 50
percent local content by value, assemble all hardware within Nigeria
and maintain fully staffed facilities for this purpose, and maintain
in-country research & development departments.
International ICT companies are required to submit a local content
development plan to NITDA, detailing creation of jobs, recruitment of
local employees, human capital development, and value creation in the
industry. Furthermore, ICT companies are required to host all consumer
and subscriber data locally. Moreover, government data is mandated to
be hosted in Nigeria within 18 months of the coming into effect of
these guidelines. In other words, the government is attempting to
reduce Nigeria's reliance on cross-border ICT services. However, there
have been challenges in implementing the guidelines and in October 2015
the Nigerian Government issued a notice in mandating compliance.
Russia
Data Localization: Russian Federal Law No. 242-FZ companies
collecting the Russian citizen personal data to store and process the
data on Russian territory. Subsequent guidance from the regulator,
Roskomnadzor, outlined that foreign companies are only able to send
data outside of Russia as long as it was collected with the use of
local infrastructure and remains stored and processed on that same
infrastructure. If companies do not comply, their access to the market
and these services can be restricted. This has forced both U.S. firms
operating in Russia or providing services from the U.S. to rewire their
operations, consider exiting the market, or buying server space in
Russia to provide the same services at a higher cost.
Federal Law No 374-FZ provides Russian agencies with the authority
to request access to company-held data. It also requires
telecommunication companies and Internet service providers (ISPs) to
keep metadata and the contents of a communication sent through their
services in Russia. Further, ISPs are required to provide the Russian
authorities information necessary to decrypt Internet communications.
Local Content Requirements: In its efforts to diversify and
modernize its economy, the Russian Government has increasingly focused
on erecting localization barriers and mandatory localization
requirements for foreign entities to access the Russian market. The
``New Digital Society Strategy 2017-2030'' approved in May 2017
contains a number of localization policies including the location of
databases and data within Russia and online payments to be made through
Russian payment systems. Further restrictions have also been put in
place for foreign ownership of online content providers.
Digital Piracy and IP-related intermediary liability: Although
online piracy remains a serious problem in Russia, the Government has
taken a number of important, positive steps to provide new tools to
address the issue. In 2013 and 2014, the Russian Federation signed into
law amendments to the Civil Code Part IV, which included notice and
takedown obligations to intermediaries upon notice of infringement by a
rights holder and allows for disabling access to infringing sites in
the event of repeat infringement. With regards to the application and
enforcement of the 2013 and 2014 amendments, reports from the Russian
government suggest that traffic onto websites with legitimate content
was increasing as a result of the law; however, in other areas
enforcement challenges persist. For example, online piracy rates
continue to remain high in Russia. VK.com remains one of the most
visited websites in the world and is included in USTR's Notorious
Markets Report.
In 2017 further legislative changes were introduced to strengthen
rights-holders ability to request the disabling of access to infringing
material online. Specifically, there were a number of important
amendments to the ``Law on Information, Information Technologies and
Information Protection.'' These amendments include the ability of the
court to extend injunctive relief against so-called mirror sites that
infringe copyrighted content. In addition, rights-holders now have the
option of notifying the Ministry of Communications, which has two days
to order the hosting provider to disable access to the site.
Furthermore, Internet mediators (including search engines) are now
obliged to remove links to sites that have been found to host illegal
content. These are positive developments and show how Russian
authorities are actively seeking to address the immense challenge of
online piracy.
South Korea
Cloud Computing: The Cloud Computing Act (CCA) and related Data
Protection Standards for Cloud Computing Services (CCPA) discourage
U.S. cloud services providers from entering the market. In September,
2015, the Ministry of Science, ICT and Future Planning (MSIP) enacted
The Act on the Development of Cloud Computing and Protection of Use,
commonly referred to as the Cloud Computing Act (CCA), with the
intention of developing Korea into a $3.9 billion cloud services market
by 2018. Unfortunately, government agencies responsible for setting
specific security guidelines for public institutions' use of cloud
services have created a patchwork of competing directives and continue
to erect barriers to entry that favor local cloud service providers.
U.S. industry applauds the legislative intent of the CCA. In
practice, however, the law deters U.S. cloud service providers from
entering the Korean market. The current Data Protection Standards for
Cloud Computing Services (CCPA Guidelines) require data separation and
network separation for all public institutions utilizing cloud
services. In Korea, this includes financial services, healthcare,
educational and government institutions. First, the requirement to
separate the data from the public cloud require U.S. companies create
separate intranets for these institutions, which mitigates the
efficiencies that cloud computing. On the second requirement, network
separation, companies are required to build physical servers in Korea,
which is prohibitively expensive.
These approaches undermine the efficiencies of cloud computing by
limiting the ability of cloud providers to leverage the economies of
scale of an international infrastructure. This will ultimately deter
cloud computing technologies from becoming ubiquitous in Korea, and
will create unnecessary roadblocks for Korean firms that could benefit
from such technologies.
U.S. cloud service and financial service providers face a unique
set of challenges in Korea, due to the physical network separation
requirements established under the Regulation on Supervision of
Electronic Finance.
The Financial Services Commission (FSC) requires the physical
network separation of the information processing system of financial
companies in its Regulation on Supervision of Electronic Finance. This
requirement prevents the introduction of cloud computing services in
the financial services sector. In addition, when the cloud service is
allowed, it can be introduced only to a ``non-critical information
processing system'', which is vague and makes the introduction of cloud
service extremely difficult in this sector. In all, this excessive
regulation restricts the use of cloud computing services in the finance
industry, which is contrary to the Korean government's policy to
nurture and promote the cloud industry.
Data Localization: Data localization requirements have improved in
many ways, however, challenges remain for U.S. financial service
providers and reinsurance companies.
In June, 2015, the FSC released a revision to the Regulation on
Financial Institutions' Outsourcing of Data Processing Business and IT
Facilities, however the revisions have not been fully implemented. The
revision sought to eliminate a provision that restricts offshore
outsourcing to a financial firms' head office, branch and affiliates to
allow outsourcing to a third party including a professional IT company.
However, there remain some areas where companies are unable to
transfer data across borders. For example, Korean branches of U.S.
reinsurance companies are not allowed to transfer personal information
offshore for data processing or storage, and similar restrictions exist
for financial services providers. This creates inefficiencies,
increases the risks of hacks and leaks, and puts at risk a company's
ability to recover critical data in the event of natural or other
disaster situation. Similarly, U.S. cloud service providers feel that
barriers remain with regards to the transfer of certain types of data
to professional cloud service providers.
Discriminatory and redundant local certifications are required in
addition to globally agreed upon standards and commitments, preventing
the adoption of best practices related to cybersecurity, privacy, and
encryption.
Standards: The United States and Korea are both members of the
Common Criteria Recognition Arrangement (CCRA), under which products
certified at any CCRA-accredited laboratory should be recognized as
meeting the certification requirements of any other CCRA member
country. Despite this agreement, the Korean government requires
additional verification of network equipment such as routers, switches
and other information security products procured by public sector
agencies. Compounding the burden, individual government agencies
require their own separate conformity testing, even if the same product
has been procured and verified by another government agency. This
additional certification process is overly burdensome, and deters the
adoption of best cybersecurity practices and equipment by Korean
government agencies.
Since 2011, the Korean government has imposed these additional
verification requirements, and in 2014 extended similar security-
conformity testing requirements to all international CCRA-certified
products used by all central government agencies. The government is
expected to extend this policy to include all public organizations
including local governments, hospitals, and educational institutions.
There is concern from the private sector that these guidelines have
been interpreted as requirements to buy local IT products and avoid
foreign ones. Although the Korean government has tried to clarify these
policies to government agencies, there has been no change in their
implementation.
In addition, public sector agencies procuring networking equipment
have increasingly required the incorporation of encryption
functionality that need to be domestically developed and certified
(e.g., ARIA and SEED), which in effect deems the use of widely-used
international encryption standards such as AES as inadequate. As a
result, products such as virtual private networks and firewalls from
U.S. companies cannot be sold to Korean public sector agencies. Going
forward, Korea should ensure that products that are based on widely-
accepted international standards have full access to Korea's public
sector market.
South Korea also requires issuance of accredited certificates using
Public Key Infrastructure (NPKI) by law. This is a technology
recognized on the Internet and offers various supplementary services,
including e-commerce and electronic banking activities. It also
requires users to obtain accredited certificates when accessing South
Korean government websites such as Yestrade (South Korea Export
licensing system) and UNI-PASS (South Korea Import System). When the
accredited certificates are obtained, they require many plugins and
add-ons to install on the user's computer. This is burdensome and an
unnecessary security standard because these plugins and add-ons can
change a company's standard configuration and can cause other potential
problems and risk to the user's computer
Privacy: There has been some concern that the Korea Communications
Commission and other regulators believe that Korea's existing Personal
Information Privacy Act (PIPA) offers stronger protections than the
APEC cross-border privacy rules system which Korea recently joined.
U.S. industry fears similar duplicative requirements will be imposed on
CBPR compliant companies, once adopted. It is our strong view that this
approach would undercut the efficiencies gained by the APEC CBPR
system, and U.S. regulators and certifiers should work closely with
their counterparts in Korea to ensure that the CBPR system functions in
the way it is intended to.
Bandwidth Costs: Bandwidth costs in Korea continue to rise, despite
costs falling on a global scale. South Korea may be the only country in
the world where bandwidth costs are rising. This trend is likely driven
by a combination of directives from the Ministry of Science, ICT and
Future Planning designed to lower costs to consumers, and powerful
incumbents trying to offset them. One new regulation mandates the
commercial terms of interconnection, contrary to the model for
`peering' that is used across most of the world. Another sets a
prescriptive rate at which bandwidth prices should fall per year at 7.5
percent, slower than the average bandwidth price drops around the rest
of the world.
Customs: Complex border measures and customs procedures are
creating barriers for small and medium sized enterprises (SMEs) to
leverage e-commerce opportunities.
E-commerce has grown tremendously in recent years, and the
emergence of new e-commerce platforms has allowed for small and medium
sized companies to reach new customers across the globe. It has also
created a surge of low-value, cross-border shipments. In response to
the increased volume, governments have sought to introduce new border
measures such as x-ray screening, additional paperwork requirements,
and new e-commerce channels, however, such efforts are making trade
more complex for SMEs (many of whom are new, and inexperienced
shippers) and limiting their ability to fully leverage e-commerce
platforms and the opportunities they create.
Procurement: SME procurement preferences are interpreted as
domestic procurement preferences. Korea, similar to the United States,
provides for SME procurement preferences under certain circumstances.
However, in Korea, the preferences are interpreted by government
procurement agencies as a preference for domestic products, rather than
to assist SME companies who can resell products and solutions sourced
internationally. Directives such as ``Guidelines on IT network
equipment installation and operation'' for public sector agencies
stipulate the use of testing and certification requirements that are
met only by domestic products and fail to recognize and accept products
that meet global certifications.
Online Travel: Online travel agencies are unable to offer non-
refundable hotel rates in Korea, limiting consumer choice. In an effort
to increase consumer protections, online travel agencies face
regulations in Korea that ban non-refundable hotel rates. Ironically,
such regulations actually harm consumers by raising prices, and over
time, harm the tourism industry -including the complimentary businesses
associated with it.
Digital Piracy and IP-related intermediary liability: To combat
digital piracy, Korea has in place an administrative mechanism for
responding to rights holder requests for removing access to infringing
content online. The legal basis is found in Article 102(2)f of the
Korean Copyright Act, which provides limited liability for ISPs that
respond to a court or related administrative body order to delete or
disable access to infringing content. In the case of Korea this order
comes from the Korean Communication Standard Commission (KCSC), but
based on a request from the Korean Copyright Commission (which in turn
responds to rights holder notices of infringing content and sites).
Industry reports suggest that as of 2017 access to over 400 infringing
websites have been disabled in Korea under this mechanism. A 2016 study
by the Motion Picture Association found on significant impact from the
mechanism, including on average a 90 percent drop in visits to disabled
sites within three months of an order. In addition, following 3
instances of disabling a given site, the data suggested a 15 percent
drop in visits to infringing websites and 50 percent reduction for P2P
sites specifically. However, it should be noted that site disabling at
the request of the Korea Communications Standards Commission more
generally is not always used transparently or independently, with some
concerns over censorship from civil society organization reported.
Thailand
Digital piracy and IP-related intermediary liability: Digital
piracy is pervasive across Thailand. The Motion Picture Association of
America reports ``In one month, there were twenty times the page views
to the top five piracy sites in Thailand as there were page views to
the top five legitimate Websites.'' The Thai government has taken steps
to close loopholes in the Thai law through amendments to the Copyright
Act; however, in several instances they are missing key language or
provisions that would allow them to effectively limit infringing
activities, particularly in the online sphere. Sections 28/1 and 69/1
make camcording in public venues an infringement, although the language
is not as strong as that in other economies--only actual reproduction
is criminalized without specifically including intent to copy and
distribute, essentially precluding preventative enforcement. No
landlord liability was introduced, which means that physical shops
selling pirated goods are not held liable as intermediaries. The
amendments introduce liability for ISPs and a kind of notice and
takedown system but with several limitations that render the new law
significantly less effective than anticipated and not a true notice and
takedown mechanism. ISPs are not liable for non-hosted material,
regardless of if they have knowledge that it is infringing. In
addition, rights holders' notices must be accompanied by a court order
for ISPs to be responsible to respond. In addition, the amendments
involve a high burden of proof to demonstrate infringing sites. The
2015 amendments to the Computer Crimes Act reinforce these same
requirements and as such do not contribute to closing these loopholes.
In 2014-15, rights holders reported a good rate of response (90
percent) from mainstream ISPs (though not for non-hosted content);
however, the new rules may jeopardize this trend. In terms of
exceptions to copyright, among other exceptions, Section 32/9 of the
copyright amendments introduce a wide exception for use by disabled
persons that goes beyond the Marrakesh Treaty. Also, negligence
continues on the Thai government's part to book piracy in educational
institutions, including in relation to broad interpretations of the
disabled person's exception. In addition, unauthorized access to and
retransmission of pay TV and satellite programing as well as unlicensed
public performance of copyrighted works (e.g., at entertainment venues)
remain major challenges on the ground.
Turkey
Data Localization: In 2013, Turkey enacted the Law on Payments and
Security Settlement Systems, Payment Services and Electronic Money
Institutions. This law requires Internet-based payment services to
store data within Turkey for at least ten years.
Privacy: Turkey finalized its Law on the Protection of Personal
Data in 2016. Turkey's newly formed DPB is tasked with implementing the
law and determining whether other countries provide an adequate level
of privacy protection. The Law places heavy obligations on data
controllers and processors, requiring consent to be explicit for the
processing of non-sensitive and sensitive personal data.
While personal data can be transferred to a third country, because
the processing grounds available for sensitive personal data are very
limited the transfer of sensitive personal data is incredibly
burdensome. Further, if the grounds for data processing and transfer
are anything other than explicit consent then the third country must be
deemed to have an adequate level of data protection. If a country is
not deemed adequate, then the DPB must provide permission for each
transfer.
The DPB has come out with guidelines around the implementation of
the law. In particular, the law has several registration and record-
keeping requirements. Data controllers are required to register with a
publicly available data controllers' registry and provide their
``Personal Data Processing Inventory'' and ``Personal Data Retention
and Destruction Policy'' to the DPB.
Digital Piracy and IP-related intermediary liability: Online piracy
is still prevalent and problematic in Turkey. The Business Action to
Stop Counterfeiting and Piracy (BASCAP) estimates the size of the
pirated and counterfeit market at close to USD11 billion, with
unlicensed digital content up to one-tenth of that value and unlicensed
software representing half of the value of unlicensed digital content.
Turkish copyright law lacks a clear obligation for ISPs to
expeditiously cooperate with rights holders when they have knowledge of
infringement without an official order from a prosecutor's office or
court. However, a basic notice and takedown mechanism, whereby rights
holders may notify ISPs and if there is no response pursue a takedown
through the courts, as well as requirement for ISPs to respond to a
court's order, is present in Additional Article 4 of the Copyright Law.
In addition, the Internet Law (No. 5651) provides for the takedown or
disabling of access to websites for matters of ``national security,
restoration of public order and prevention of crimes,'' which can
include copyright and trademark infringement.
Under the law, courts may issue orders for service or hosting
providers to disable access to sites infringing the law. Law 5651 also
established a central body of ISPs (Association of Access Providers),
which is required to respond to courts' orders and may also receive
notices of violation from the private sector. Industry reports suggest
that having such a ``one-stop shop'' for submitting notices or
directing orders has aided in growth in responsiveness by ISPs in the
past year, including notices from copyrights holders. As a result the
score for indicator 12 rises by 0.25. In addition, some sites, such as
the The Pirate Bay, have been disabled under court order in the past.
Nevertheless, the Association of Access Providers and the Internet
Law more widely tend to be used more frequently for political-related
site disabling. Copyright amendments introduced in 2016 and under
discussion in 2017 would establish, among other elements, a new Center
for Combating Digital Violations within the Ministry of Tourism and
Culture. The new Center, if implemented, is intended to become a
copyright-focused body for handling rights holder notices.
Local Content Requirements and Technology Transfer: Turkey has had
in place a regime that discriminates against foreign companies and
products for over a decade, but in 2014, these types of barriers
intensified and took on a nature that is likely to involve sharing of
proprietary know-how and assets. Public Procurement Law No. 4734,
introduced in 2002, provides up to a 15 percent price advantage to
local goods in government tenders. The goods that qualify for such a
preference have up until now been determined annually by the Ministry
of Science, Industry and Technology. In 2014, the threshold for being
considered a local product was raised considerably as part of
Communique 2014/35, issued in September 2014. Specifically, in order to
be considered a local product, at least 51 percent of the total cost of
manufacturing must be derived from local materials or labor. In
addition, substantive stages of the manufacturing process must take
place locally. Requiring foreign companies to localize production in
Turkey to this extent likely entails transfer of IP rights to domestic
entities in some, if not many, cases.
Vietnam
Data localization: IT infrastructure requirements which directly
benefits local IT service providers exist in Vietnam. Decree 72/2013/
ND-CP on Management, Provision, and Use of Internet Services and
Information Content Online stipulates that information service
providers on mobile telecommunication networks, news or general
information websites, game service providers, and social networks are
required to locate one server system in Vietnam for the inspection,
storage, and provision of information at the request of competent
authorities, and settlement of customers' complaints. This regulation
deters the affected companies from procuring other form of
infrastructure related cross-border ICT services as it would incur
additional cost for creating redundancies for their data offshore.
While having a disaster recovery data centre has its merits, the
additional cost for the service would deter companies with limited
budget for IT such as SMEs.
Local Content Requirements: Only Vietnamese organisations or
individuals are allowed to provide IT services to state bodies. These
rules not only limited the benefits of a geographically disbursed
infrastructure, but also put foreign IT service providers seeking to
offer services in Vietnam at a disadvantage.
Cybersecurity: The Vietnamese government has released several
drafts of a new cybersecurity law. Draft 15 of the Vietnamese Law on
Cybersecurity contained a number of concerning provisions, including:
Data localization and the localization of gateways
Consent requirements in order to transfer personal data out
of Vietnam
The regulation of a broad range of online content in the
absence of specific court orders. Such content includes very
broad definitions of offensive speech and expression. Moreover,
such content must be removed within a 24 hour period.
Local representative office requirements
The scope of areas and entities covered under the law is also
unnecessarily broad, creating burdens on industry which are in many
cases unnecessary, and which will likely overwhelm regulators that are
charged with implementing the law. This approach will discourage or
prevent foreign companies from operating in Vietnam, while doing
nothing to increase the cybersecurity of operators of Critical
Infrastructure.
Digital Piracy and IP-related intermediary liability: Pervasive
digital piracy has undermined the growth of legitimate creative content
industries in Vietnam. The significant increase in content-providing
sites has meant that piracy over streaming, P2P, and linking sites as
well as cyberlockers and social networks has contributed to the
persistently high piracy rate. For instance, according to Department of
Film, today there are estimated 400+ local websites that provide access
to tens of thousands of unlicensed films. A popular music website,
Zing.vn, was recently listed on the USTR's List of Notorious Markets in
relation to providing access to unlicensed music.
Recognizing the scope of the piracy problem, the Vietnamese
government issued a Joint Circular in 2012 which requires various ISPs
(including social media networks) to issue warnings to infringing
users. Although industry reports somewhat greater cooperation in
takedown from ISPs in response to cease and desist letters from the
Ministry of Information and Communication (MIC) and the Ministry of
Culture (MCST), volume is still highly disproportionate to the scale of
piracy, especially in relation to commercial-scale infringing sites.
______
U.S.-India Business Council
May 3, 2018
Ms. Nanda Dave,
Reserve Bank of India,
Mumbai, India.
Re: Reserve Bank of India (RBI) Notification on Mandatory Localization
of Payment System Data in India
Dear Ms. Dave:
USIBC commends the Government of India's for its continued
commitment to a less-cash, digital payments driven ecosystem in India.
USIBC members are wholly committed to be partner in achieving the goals
and vision of Less cash and Financial inclusion agenda. It is in this
spirit that we bring concerns with the new requirement for mandatory
localization of payment system data to your attention.
On April 6, 2018, the Reserve Bank of India published The
Notification on Storage of Payment System Data (Localization
Requirement) mandating payment system operators (POSs) to store payment
system data only in India. The Localization Requirement was issued
without any consultation with industry stakeholders even as it
represents a significant and fundamental shift in the regulatory
architecture for digital payment systems in India. The provisions are
very broad and in key areas subject to interpretation and ambiguity.
USIBC and its members assume the regulatory intent to be driven by data
access, cybersecurity, privacy and fraud prevention concerns. While
important and necessary goals, the localization requirement may not be
the best mechanism by which to achieve these objectives and may in fact
undermine the ability of industry stakeholders to detect, prevent, and
mitigate global financial crime, frauds and breaches thereby increasing
the cyber vulnerability in the system and in particular for India as a
country.
The implementation of a mandatory localization requirement in India
may also run counter to anti-money laundering requirements in the
international jurisdictions create conflicts of both within and outside
where India is not aligned with international best practices.
USIBC members remain respectful of RBI's concerns of Indian users'
payment data and need for unfettered supervisory access. At the same
time, the payment storage ``only in India'' has fundamental negative
impact Global Payment operators operating and business model. The
Directive significantly impacts the ability of global payment platforms
to combat global financial crime and fraud for Indian users.
The mandate places severe constraints on global industry's ability
to bring the latest innovations and technologies to Indian users and
support the Indian Government's and RBI's less-cash vision.
USIBC respectfully requests a reversal or an indefinite stay on the
implementation of the Localization Requirement and welcomes an
opportunity to collaborate with the Government of India and RBI on
identifying the best path forward to address the regulatory concerns.
The detailed discussion on the potential negative implications of
the data storage ``only in India'' requirement and the Localization
Requirment in general are set out below in Section I. This is followed
by recommended areas for clarification in Section II.
Implications of the Requirement for Mandatory Localization of Payment
System Data
1. Ease of Doing business in India for multinational companies
The Localization Requirement comes precisely at a time when India
continues to refine policies towards further improvement in its ranking
on relevant global indices. This effort was reflected in India's jump
of 30 places in the World Bank's Indices, the highest of any country in
such a short period of time.
The Localization Requirement could potentially undermine the
otherwise positive global perception of India as attractive destination
for foreign direct investment. One of the foundations of ease of doing
business is regulatory certainty which provides investors and USIBC
members with confidence to base their future expansion and invest
plans. The current move would undermine this confidence.
The Ease of Business concept encapsulates not only the process by
which new regulation is generated, but also the substance of the
provisions and the nuanced balance between cost and benefit they
ultimately create. The Localization Requirement would significantly
raise costs for both companies and Indian users and consumers, and
potentially introduce new risks in the payments ecosystem. Meanwhile,
the regulatory benefits remain unclear and/or outweighed by these costs
and inefficiencies.
2. Unintended Negative Impact on Cybersecurity and Reducing Risk--
Disaster Recovery and Mitigation Plans
As India moves towards its digital payments vision, policymakers
have rightly focused on the need for cybersecurity and minimizing
digital risk within their markets. All market participants, whether
they are consumers or payment system operators, benefit from a strong
cybersecurity regime. A large-scale breach in India would severely
affect Indian users' confidence in the payments system and would raise
reputational issues for the India as global power. The mandate forces
all payment data to be stored only on soil which significantly raises
the risk of India a single destination and visible target for cyber-
attacks on Indian payments data.
Global experience demonstrates that localization requirements can
unintentionally have the opposite impact. They introduce cyber
vulnerabilities into otherwise secure global networks, put transaction
data at risk, reduce efficiencies, and increase the risk of cyber-
attacks. Localization mandates can also impact global payments
companies' abilities to detect, mitigate, and prevent security breaches
and provide best-in-class disaster recovery and business continuity
plans.
Furthermore, alternative solutions may be available to achieve
these same regulatory objectives. For example, the stated intent of
unfettered supervisory access could also be achieved without the
mandate of ``only in India''. Having a mirror image post processing
copy of the data in near real time might potentially satisfy the
``objective of unfettered supervisory access''; however, depending on
the parameters defining scope of data and ``unfettered access'', a
post-processing copy can also create added vulnerabilities, risk, and
commensurate additional resources for housing, security and access.
USIBC stakeholders are best placed to identify these solutions and can
work with policymakers to ensure they satisfy regulatory oversight
goals.
3. India stands to gain from an Open Cross-Border data flow regime and
localization is a race to the bottom
India has been one of the biggest beneficiaries of open cross-
border data flows. The world-class Indian IT/ITES industry provides
services and data analytics as well as BPO/KPO hub services to over 80-
90 countries. India can continue to be a global leader by fostering
free cross-border flow of data and enterprise services.
India's open market and open society approach has created one of
the most vibrant and competitive payments ecosystems globally. Both
Indian and international companies play a role in supporting RBI's
less-cash vision. Currently there no mandates in major economies that
restrict Indian fintech or payment companies from providing their
services from India to users in these countries.
Global experience shows that when one nation proposes data
localization that impacts foreign firms, other countries tend to
respond with similar requirements. Any such counter responses in the
current situation could severely hamper the Indian IT/ITES industry and
serve as a chilling effect on interests globally. Retaliatory
regulation raises costs across the digital payments ecosystem, limits
choice and competition. Futher, given that such regulations often don't
contain ``sunset'' provisions, the market distortions they create have
a long-term impact on the economy.
USIBC members do not see asymmetric arrangements in the storage and
processing of data as sustainable on a long-term basis, particularly
with respect to the Prime Minister's goals of fostering growth of the
digital payments economy as a key component of international trade.
USIBC also notes that the responsible development of a digital economy,
and India's fullest participation in it involves recognizing the
importance of a properly managed cross-border data flows bolstered by
clear norms around privacy and data protection.
4. Stakeholders not Consulted in the Regulatory Development Process
The Localization Requirement took USIBC and its members by surprise
given the scope and breadth of the provisions and the lack of
consultation with stakeholders. A localization mandate of this nature
fundamentally changes the regulatory architecture within a jurisdiction
and raises complex issues for the payment system operators required to
comply with its provisions. Stakeholder consultation is critical to
articulating the costs of such a requirement on business operations,
understanding the changes to the cyber threat landscape it may bring,
and evaluating the industry's continued ability to effectively identify
and prevent breaches. This assessment would help answer the question of
whether the proposed requirement does in fact deliver the intended
benefits regulators seek. USIBC respectfully recommends that the
Government of India and RBI undertake such a consultation to understand
these costs and benefits before moving forward with implementation of
the Localization Requirement.
5. Need for Clarification on the Scope of the Localization Requirement
The Localization Requirement is very broadly written and creates
ambiguities about the type of data that must be stored and the ways in
must it be kept in India vis-a-vis other jurisdictions. In addition,
the requirement provides an exemption for the ``foreign leg'' or cross-
border segments of a transaction, but does not define the term and it
remains subject to interpretation. This in turn raises concerns as to
compliance with other international anti-money laundering requirements
foreign operators may be subject to in the other jurisdictions in which
they do business. Clarification on these and other related issues will
help USIBC and its members more fully assess the true implications of
the new requirement.
6. Coordination with International Laws and other Data Regimes
International payment companies have global operations and are
required to meet regulatory reporting and supervision requirements in
multiple jurisdictions. In its current form, the Localization
Requirement may restrict the ability of international payment companies
to meet their legal obligations in other countries of operation and may
be in conflict with applicable foreign laws and local laws like the
India Information technology act which allows data to be processed and
stored overseas with appropriate safeguards. As India considers a data
privacy framework, the Localization requirement should be developed
within the broader context of data privacy and protection, as opposed
to a separate, potentially conflicting stand-alone requirement. The
RBI's recent Inter Regulatory report on Fintech stressed the need for
national DPR and privacy law to enable the growth of Fintech ecosystem.
Data Protection Regimes in other jurisdictions may be helpful
reference points and provide `lessons learned' that Indian policymakers
can leverage as they deepen consumer protection in India. For example,
the `India only' requirement in the provisions effectively puts India
in a position of having the most stringent form of data localization
measures. Jurisdictions that have implemented localization requirements
have done so in a more nuanced form that contemplates the flow of
cross-border data and their experiences are important to consider. In
addition, the European Union's General Data Protection Regulation
(GDPR) and the APEC Cross-Border Privacy Rules (APEC CBPR) may provide
guidance on the data protection framework most appropriate for India.
Additional information is provided in Annexure 1 to this letter.
7. Accelerating India's Digital Payments Agenda
As India works to achieve its new target of 30 billion digital
transactions by 2019, the ability of global payments companies to
contribute to that goal will be more important than ever. The new
requirements could undermine global participants' ability to deliver
cutting-edge innovation in products and services, increasingly
sophisticated risk, security and fraud management applications that are
supported by analysis from complex global data sets, and collaboration
models that propel Indian payments solutions to reach global scale.
By its very nature, a digital economy is one that does not require
physical presence for its processes to operate most efficiently.
Further, the added cost of implementing and maintaining localization is
in direct contrast to India's stated objectives to reduce the cost of
transactions in order to maximize direct benefit to the economy.
In 2014, the European Centre for International Political Economy
examined the overall impact of localization measures in seven
countries--Brazil, China, the European Union, India, Indonesia, Korea,
and Vietnam--and found negative impacts on GDP and foreign investment.
They found that economy-wide data localization laws drain between 0.7
percent and 1.1 percent of GDP from the economy and that any gains are
too small to outweigh losses in terms of welfare and output in the
general economy.\1\ The impact of the Localization Requirement on
broader fintech services in India must be carefully considered.
---------------------------------------------------------------------------
\1\ http://www.ecipe.org/app/uploads/2014/12/OCC32014 1.pdf
---------------------------------------------------------------------------
1. Request and Clarification
1. Removal of the word `only' in Clause 2--Request RBI to allow
industry to implement appropriate methods to meet RBI's stated
objective of unfettered access and exercise supervisory control
of Payments data
2. Allowing both legs of the transaction to be retained overseas. A
plain reading of Clause (2i) of the Localization Requirement
suggests that one leg (i.e overseas leg of the transaction)
will be allowed to be retained overseas. For the purposes of
regulatory reporting, both legs of the transactions will be
required. Given the above, the Localization Requirement should
clarify that for transactions involving a foreign leg, all
transactions can be retained in foreign country.
3. Given that India is only a Receive-only Country, storage of
Senders' data on systems in India should be excluded. For
international remittances, India is a Receive country only. To
require the entire data of the transaction, including
information on Senders (which may include Sensitive
Information) may create difficulties for operators. In
addition, there may be some type of data storage requirement by
the Senders' countries.
4. The duration in relation to length of time such data needs to be
stored in India should be specified. Without any `sunset'
provisions, the Localization Requirement may create substantial
costs for companies and increase risk of market distortions for
digital payment operators in India.
5. Removal of any prohibition or requirements in relation to
transferring such data out of India. Given that the transfer
would be part of a contract between a company and the consumer,
there should not be any restriction on transferring of data,
notwithstanding data storage requirement.
6. Confirmation of the entities who must comply with the
requirements. A plain reading of the text suggests that
compliance with the circular is required by the licensed
entities to whom the circular is addressed (LE). The LE is
required to ensure compliance by service providers,
intermediaries third party vendors and other entities who
provide services directly to the LE in connection with
operating of the payment system. We request RBI to confirm this
position.
7. Confirmation of the scope of the Localization Requirement on
authorized dealers and the Foreign Exchange Department. A plain
reading of the text suggests that the activities carried out by
authorized dealers and instructions issued by Foreign Exchange
Department will not be governed by this circular. We request
RBI to confirm this position.
The Path Forward
USIBC and its members seek to work collaboratively with the
Government of India to achieve its vision for Digital Payments in India
and fully support the need for cybersecurity and fraud prevention
within the regulatory architecture. The significant changes implicated
by the Localization Requirement necessitate a reversal or an indefinite
stay on the provision to give the industry and policymakers an
opportunity to work together to find solutions that achieve the
intended regulatory intent and achieve the Government's vision for a
Digital India. To that end, we respectfully request an opportunity to
bring a delegation to discuss more fully the concerns outlined above
and provide any additional information that may be helpful in your
deliberations.
I look forward to continuing our dialogue on the issue and my staff
will follow up with your office. Please do not hesitate to direct any
questions to Nileema Pargaonker, Head of Financial Services,
[email protected] or Rohan Sirkar, Sr. Director, [email protected].
Sincerely,
Nisha Biswal,
President,
U.S.-India Business Council
U.S. Chamber of Commerce
______
Annexure 1
Summary view of Data Localization in other countries
------------------------------------------------------------------------
Payments Data localization mandate
Country ``only'' in the Country
------------------------------------------------------------------------
European Union No
------------------------------------------------------------------------
Russia No
------------------------------------------------------------------------
Indonesia No
------------------------------------------------------------------------
Canada No
------------------------------------------------------------------------
USA No
------------------------------------------------------------------------
Hong Kong No
------------------------------------------------------------------------
Singapore No
------------------------------------------------------------------------
Australia No
------------------------------------------------------------------------
Japan No
------------------------------------------------------------------------
India Yes
------------------------------------------------------------------------
Data Protection Regimes
The European Union General Data Protection Regulation (GDPR)
Europe's General Data Protection Regulation (GDPR) does not have any
data localization requirements. Under the European model, companies
have flexibility with respect to the legal mechanism they use for data
transfers. For example, under GDPR, companies have multiple options,
including Standard Model Clauses, Country Adequacy, Binding Corporate
Rules, and Privacy Shield.
The APEC Cross-Border Privacy Rules (APEC CBPR)
The APEC CBPR was endorsed in 2011 and is a voluntary principles-
based privacy code of conduct for data controllers in participating
APEC member economies, relating only to cross-border data flows.
Organizations within participating economies seeking
certification under the APEC CBPR must have their data
protection practices and procedures assessed as compliant with
the program requirements.
The APEC CBPR seeks to ensure compliance with normative
principles in order to ensure data is securely stewarded and
therefore preventing the need to require the on-shoring of data
for security concerns.
Other Major Data Protection Regimes in Asia
Other data protection laws in major financial, processing and data
analytics hubs that compete with India (e.g., Japan, Australia, Hong
Kong, Singapore and the Philippines) provide for a range of legal
mechanisms for companies to rely on for their cross-border data
transfers. These include: accountability, ensuring that the recipient
country has similar laws which protect the data, binding corporate
rules, contractual clauses, and consent. These countries notably do not
have data localization requirements for transaction data.
Other Data Regimes
Some countries (e.g., Indonesia, Russia and China) have data
regimes that contain certain requirements as to local storage and some
related restrictions. However, these requirements are more nuanced than
headlines would suggest. For example:
Indonesia has on-soil data centre and onshore processing
requirements. However, these do not prohibit the transfer of
transaction data outside of Indonesia.
Russia's Data Protection Law, while requiring a primary
database of the data to be onshore, does not prohibit the
transfer of transaction data or secondary copies of the data
off-shore and is limited to personal data.
China's Cybersecurity Law, which requires the onshore
processing of personal data and important data by critical
infrastructure operators, envisages the possibility of cross-
border transfers of such data when this is necessary for
business requirements and where this is subject to a security
assessment.
______
Response to Written Questions Submitted by Hon. Jon Tester to
Roslyn Layton, Ph.D.
Question 1. Many members of the panel mentioned the United States
needs to step up our level of engagement and join other like-minded
countries. In your opinion, which countries closest align with our
values on Internet freedom, privacy, and Internet of Things?
Answer. There are many countries which align with the U.S. on
freedom, privacy, and the digital economy. Probably the closest ally is
the United Kingdom, which not only enjoys close cultural and legal
affinity the US, but also deep economic ties with our in digital
economy.\15\ Importantly, the UK is less burdened by misguided EU
policies such as the GDPR, forced erasure, and other EU Internet
regulations.
---------------------------------------------------------------------------
\15\ http://www.aei.org/publication/brexit-bring-uk-ever-closer-us-
digital-trade/
---------------------------------------------------------------------------
While U.S.-EU relations may be strained at times, there is more in
common between the U.S. and EU than not. In any case, in the last two
years, significant goodwill has been advanced on the bilateral level in
some European countries including Denmark and Poland, a credit to the
indefatigable diplomatic and ambassador corps and officials from the
Department of Commerce and State. Despite of the Senate's glacial pace
of confirmations, acting and confirmed ambassadors to the EU have
worked tirelessly and have realized success. For example, Denmark is
the world's leading digital nation and desires to grow and strengthen
relationships with the U.S.\16\ Poland is a relatively large European
country (38 million) which has strong cultural and security ties to the
U.S. It has a many highly skilled workers and a significant industrial,
manufacturing base for high tech products. If a dialogue is strained
directly with the European Commission, the U.S. can work directly with
each European nation, and those nations can push the rational policy
forward in Brussels.
---------------------------------------------------------------------------
\16\ https://www.mercatus.org/publications/broadband-policy-
deregulation-denmark
---------------------------------------------------------------------------
While Japan and the South Korea may have adopted some misguided
policies on data transfer, the countries are security and trade allies
with the US. It is important that the U.S. maintain these relationships
and their exports are not lumped into the category of Chinese
technology. It should be explored how to lessen the data transfer
burdens considering the increasingly important role the U.S. plays for
military, security, and economic reasons.
More generally, the U.S. has allies in the many Asian nations which
are weary of Chinese influence. The U.S. should try to strengthen these
relationships. There is an important and valuable dialogue in the APEC
Privacy Framework.\17\ This framework is a proven and preferable
substitute for the GDPR. The U.S. should be more aggressive to
challenge the EU on the GDPR, particularly considering the significant
trade between the U.S. and EU in physical goods.
---------------------------------------------------------------------------
\17\ https://cbprs.blob.core.windows.net/files/
2015%20APEC%20Privacy%20Framework.pdf
---------------------------------------------------------------------------
In the Americas, the U.S. has a significant digital trade with
Mexico and goodwill having concluded a trade agreement. Such progress
is still possible with Canada, a relationship in which the two
countries have significant next generation broadband networks, digital
trade and exchange of technology workers.\18\ Colombia desires to the
information technology hub of South America, having just been invited
to the join the OECD. The turnaround of the country from a failed state
to a modern digital economy today is almost miraculous, and it
represents a policy success for the U.S. and the result of a long-term,
bi-partisan commitment established in the Clinton Administration.
---------------------------------------------------------------------------
\18\ http://www.aei.org/publication/claims-that-wireless-service-
is-too-expensive-dont-hold-up/
---------------------------------------------------------------------------
Another important ally is Israel which has a significant economy in
digital innovation.
Question 2. What forum (e.g., the United Nations, NATO, etc.) do
you recommend for facilitating an international discussion on rules and
definitions?
Answer. If Congress does only one thing, it should be to restore
the bipartisan consensus which has made the Internet a success in the
spirit of the 1996 Telecommunications Act. I applaud the committee and
the Senators on both sides of the aisle which have made an effort to
understand and address these issues. That both parties can have a
constructive dialogue on the issue of international Internet policy
will go a long way to set the tone for the many Federal agencies and
representative bodies in which the U.S. participates.
More broadly, the multistakeholder model (MSM) is not perfect, but
it still affords the best model of Internet governance. The MSM is not
a democratic body as such, but if the U.S. Government and American
stakeholders play a leadership role within the MSM--displaying a
faithful and authentic representation of American democratic values--
the MSM can be source for good and can help the U.S. regain its
leadership position in international Internet policy to amplify the
policy Congress defined for the Internet.
The U.S. won't have any credibility if its international Internet
policy is just about American companies making money. The U.S. must
also export a value system that legitimately empowers and rewards other
nations to participate in a free market Internet economy, respect the
rule of law and individual rights, limit regulatory distortion and
abuse, protect property, and deliver measurable improvements in quality
of life. This also includes measures to protect the vulnerable, notably
children.
Question 3. Before the United States can lead the charge
international, we must unify our own ``rules of the road.'' Does such a
forum currently exist, to your knowledge? How has private industry in
the U.S. tried to tackle how we define the rules of the road when it
comes to Internet security and governance? Which U.S. governmental
agency would you recommend take the lead and represent the United
States in international discussions?
Answer. The U.S. needs to reinvigorate the concept of ``Team USA''
when it comes to international Internet policy. I restate my comments
to NTIA here.\19\
---------------------------------------------------------------------------
\19\ https://www.ntia.doc.gov/files/ntia/publications/
ntia_iip_roslyn_layton_aei_final.pdf
---------------------------------------------------------------------------
The Internet makes the world more transparent and speeds
information. Increasingly America's companies are global, employ a
greater number of Americans, and account for a larger part of the U.S.
economy. While domestic policy is governed by a set of national rules
and institution, the conduct of international commerce and enterprise
requires a harmonization of international rules and norms. Harmonizing
international institutions with Constitutional concepts of rule of law
and individual rights offers the most fair, rational, and humane regime
for Internet policy. To the maximum degree possible, the diverse set of
American stakeholders should conduct this international dialogue and
negotiation with a spirt of playing for the same team, Team USA.
The Olympics offers an ideal vision for a global multistakeholder
model (MSM). While the Nation is a team, its athletes compete in
different events. Athletes are professional, sportsmanlike, and top-
performing. They play by the transparent and agreed rules and win
because of their skills, strategy, and passion on the field, not
because of a deal with the judges. Athletes respect their opponents and
share the camaraderie of experience. American stakeholders and
enterprises are as diverse as America's Olympic athletes and the sports
in which they compete, but they should all play for the same team, Team
USA.
When American companies do business abroad--whether they are
hardware, software, content, or telecom--they want a rational,
predictable, and consistent framework across the board. Such a
framework allows the firm to minimize costs, maximizes profit, and
ensure efficiency. To ensure the ideal framework abroad, companies
should advocate for the ideal framework at home. Therefore, the policy
should be a consistent set of rules for all players, grounded in
modern, evidenced-based standards of antitrust, and delivered by the
Federal Trade Commission.\20\
---------------------------------------------------------------------------
\20\ Bennett, Richard and Eisenach, Jeffrey A. and Glassman, James
K. and Howell, Bronwyn E. and Hurwitz, Justin (Gus) and Layton, Roslyn
and Bret Swanson, Comments on Communications Act Modernization (January
31, 2014). Available at SSRN: https://ssrn.com/abstract
=2388723
---------------------------------------------------------------------------
Cronyism, the unhealthy closeness between government and special
interests, is a process to win government-granted privileges and
favoritism.\21\ It upends the notion of public interest, that
policymakers serve the broad social goals. Instead it demonstrates that
government actors frequently reward private actors at the expense of
the public. Over the long term, cronyism undermines the legitimacy of
private sector and government. It also creates moral hazard, the
situation in which an actor increases its exposure to risk because
another party bears the cost of the risk. Taxpayers are too often left
holding the bag. They revolt in elections.
---------------------------------------------------------------------------
\21\ Adam Thierer and Brent Skorup, ``A History of Cronyism and
Capture in the Information Technology Sector | Mercatus Center,''
Journal of Technology Law & Policy, July 2013, https://
www.mercatus.org/publication/history-cronyism-and-capture-information-
technology-sector.
---------------------------------------------------------------------------
For example, leading Silicon Valley firms have waged a campaign to
impose Internet regulation on the telecom industry to avoid
interconnection fees and preclude the development of competitive
business models for content and advertising.\22\ While it may a
rational strategy for Silicon Valley, it is wrong and unfair to employ
political means to secure price controls which undermine the efficient
functioning of Internet markets. This has been harmful in the U.S. as
well as abroad.
---------------------------------------------------------------------------
\22\ ``Net Neutrality,'' Internet Association, accessed July 19,
2018, https://internetasso
ciation.org/positions/net-neutrality/.
---------------------------------------------------------------------------
The imposition of price controls denies infrastructure providers
revenue to build networks (and tax revenue for governments), undermines
the emergence of business models which could support local content
development for socially beneficial goods (particularly in developing
countries), and unduly burdens consumers with the full cost of
networks, a cost that falls disproportionately on the poor. Moreover,
the exercise distracts scarce policymaking resources away from real
problems, which are empirically demonstrated to be the malign acts of
governments to censor people, services, and data.\23\
---------------------------------------------------------------------------
\23\ Freedom House. Freedom on the Net 2017. https://
freedomhouse.org/report/freedom-net/freedom-net-2017
---------------------------------------------------------------------------
Indeed, many Internet related firms and industries have taken
advantage of the regulatory process to win favorable treatment for
themselves at the expense of their competitors and consumers. They now
reap what they have sown in a global ``techlash.'' \24\ Foreign
counterparts have learned from the rent-seeking behavior of Americans
firms, and it has boomeranged. Now foreign governments find ways to
regulate American firms to reward their domestic players.\25\
---------------------------------------------------------------------------
\24\ ``The Techlash against Amazon, Facebook and Google--and What
They Can Do,'' The Economist, January 20, 2018, https://
www.economist.com/briefing/2018/01/20/the-techlash-against-amazon-
facebook-and-google-and-what-they-can-do.
\25\ Roslyn Layton, ``Net Neutrality Will Be Reincarnated as
Platform Regulation,'' AEI, December 20, 2017, http://www.aei.org/
publication/net-neutrality-will-be-reincarnated-as-platform-
regulation/.
---------------------------------------------------------------------------
While the freedom of speech restricts governments ability to censor
and regulate content, it ensures individual sovereignty to do so. As
such, private networks, platforms, and individual users have the
freedom to control the content they deliver and consume. The best way
to address perceived bias on informational platforms is to create
alternatives. Rather than platform regulation, government should
support the market forces that will support competition.\26\ Misguided
FCC Internet and privacy regulation has deterred innovation in
advertising platforms, solidifying a monoculture of business
models.\27\ Moreover price controls disguised as regulation for non-
discrimination have deterred the evolution of a free market for data,
forcing consumers to pay the full cost of broadband and denying them
alternatives to lower cost. Internet penetration is at 76 percent in
the U.S. The only way to close the gap is to allow flexible pricing and
the freedom of different actors to create value propositions for
consumers. I have conducted detailed assessments of the harm to the
poor by regulatory prejudice and restriction on the flexible pricing of
data. The most notable example is India's total ban of differential
pricing which keeps 2 of every 3 people offline.\28\ See a list of
relevant papers below.\29\
---------------------------------------------------------------------------
\26\ Roslyn Layton, ``Net Neutrality Will Be Reincarnated as
Platform Regulation,'' AEI, December 20, 2017, http://www.aei.org/
publication/net-neutrality-will-be-reincarnated-as-platform-
regulation/.
\27\ Roslyn Layton, ``FCC Privacy Regulation Will Limit Competition
in a Market That Really Needs It: Online Advertising,'' AEI, March 11,
2016, http://www.aei.org/publication/fcc-privacy-regulation-will-limit-
competition-market-really-needs-online-advertising/.
\28\ Roslyn Layton, ``Why Does California Want to Adopt India's
Failed Internet Regulation?,'' AEI, July 16, 2018, http://www.aei.org/
publication/why-does-california-want-to-adopt-indias-failed-internet-
regulation/.
\29\ Layton, Roslyn and Elaluf-Calderwood, Silvia, Zero Rating: Do
Hard Rules Protect or Harm Consumers and Competition? Evidence from
Chile, Netherlands and Slovenia (August 15, 2015). Available at SSRN:
https://ssrn.com/abstract=2587542.
Layton, Roslyn and Elaluf-Calderwood, Silvia, Free Basics Research
Paper: Zero Rating, Free Data, and Use Cases in mhealth, Local Content
and Service Development, and ICT4D Policymaking (September 27, 2016).
TPRC 44: The 44th Research Conference on Communication, Information and
Internet Policy 2016. Available at SSRN: https://ssrn.com/
abstract=2757384
Howell, Bronwyn E. and Layton, Roslyn, Evaluating the Consequences
of Zero-Rating: Guidance for Regulators and Adjudicators (August 2016).
TPRC 44: The 44th Research Conference on Communication, Information and
Internet Policy 2016. Available at SSRN: https://ssrn.com/
abstract=2757391.
These papers have been referenced by the European Commission in
their definitive study of zero rating. ``Zero-Rating Practices in
Broadband Markets'' (EU, February 2017), http://ec.europa.eu/
competition/publications/reports/kd0217687enn.pdf.
---------------------------------------------------------------------------
However, if the U.S. can clean up its own cronyism, American
stakeholders will have an easier time to shut it down when facing it
abroad. Sowing the seeds of free market and Constitutional principles
will bear delicious fruit. Voters and policymakers recognize that
modernizing America's regulatory institutions will be the most
important step to maximize the welfare of the American people, its
innovators, and its economy. Removing the incentives for regulatory
arbitrage forces firms to compete on the merits of their goods and
services--serving their customers, not regulators. This approach is the
most fair and rational.
Question 4. Dr. Layton, you mentioned one aspect missing from the
GDPR is education. What would educating the public look like and who is
responsible for it? Federal Government? State and local?
Answer. Thank you for your questions on education. The Federal
Trade Commission has developed extensive and value educational
materials on data privacy and protection.\30\ While many of these
materials and concepts have been developed to protect children, these
best practices are also applicable to adults. This learning should be
broadened and leveraged for Americans of all ages and made available on
the FTC website. It could be explored to make a no free, zero rated
website, e.g., ww.privacy.gov, where any person can learn the skills to
protect oneself online. The FTC can fulfill this task efficiently and
avoid duplication at the state and local government level. The
following further comments are taken from my submission to the Federal
Trade Commission.\31\
---------------------------------------------------------------------------
\30\ https://www.consumer.ftc.gov/topics/privacy-identity-online-
security
\31\ http://www.aei.org/publication/statement-by-roslyn-layton-in-
the-matter-of-competition-and
-consumer-protection-in-the-21st-century-and-market-solutions-for-
online-privacy/
---------------------------------------------------------------------------
The Role of Consumer Education in Promoting Online Privacy.
Consumer education is tacit recognized as important, but it a
fragmented field, frequently disconnected from policy. Canadian home
economist and consumer studies educator Sue McGregor offers an
authoritative academic review of the field of consumer education.\32\
She describes consumer education as a means of protecting consumers as
economic actors and empowering them with the political, ethical, and
moral aspects of consumption (behavior) and consumerism (ideology) and
observes that the concept has been extant for 120 years. A variety of
theories explain the need for consumer education. For example, the
market does not provide enough education, so information needs to be
stimulated. Another view is that consumers demand ``uncensored''
information about the market. Another view posits that education is the
path to consumer activism, so information is promoted by interested
parties. Others define consumer education as a conceptual innovation. A
modern view of consumer education describes it as a function of
decision-making, personal resource management, and citizen
participation in the policy process.
---------------------------------------------------------------------------
\32\ Sue L. T. McGregor, ``Framing Consumer Education Conceptual
Innovations as Consumer Activism,'' International Journal of Consumer
Studies, 2015, http://www.consultmcgregor.com/documents/research/
consumer_activism_published_ijcs.pdf.
---------------------------------------------------------------------------
In recent decades the notion of consumer education has been likened
to human right (1960s), a model of postindustrial economics, people no
longer producing their own goods (1970s), the business paradigm of
consumer as client (1980s), the public-private partnership for consumer
education, indeed a concept promoted in the 1996 Pitofsky report \33\
(1990s), and in the 2000s, consumer education vis-a-vis globalization
and the policy process. Most recently the field has incorporated
complexity theory. Despite this evolution, consumer education remains a
fragmented endeavor with certain areas getting significant attention,
for example financial literacy and smoking cessation, while other
important areas are not discussed. There is also the view of the
politicization of consumer education, for example that centrally
planned disclosure for nutrition information on food satisfies
regulators' expectations but fails to be meaningfully adopted by
consumers.\34\ This suggests that for consumer education to be
meaningful it needs to bottom-up or at least be holistic.
---------------------------------------------------------------------------
\33\ Federal Communication Commission, ``Anticipating the 21
Century: Consumer Protection Policy in the New High-Tech, Global
Marketplace'' May 1996, https://www.ftc.gov/system/files/documents/
reports/anticipating-21st-century-competition-policy-new-high-tech-
global-marketplace/gc_v2.pdf.
\34\ S. Hieke and C. R. Taylor, ``A Critical Review of the
Literature on Nutritional Labeling,'' Journal of Consumer Affairs 46,
no. 1 (2012): 120-56.
---------------------------------------------------------------------------
It is instructive to consider the robust, vibrant market for
information and education in the consumer electronics field detailing
the most minute and technical aspect of machines. For decades consumers
have availed themselves to magazines, online discussions, rankings,
reviews, how-to videos, conferences, and so on. There is no policymaker
directing the discussion, but it grows by consumer demand.
There is no reason why there could not be a similar field for the
consumption of online services, which describes the contours of online
privacy and how users could select different technologies to manage
their privacy. The difference is that consumer electronics education is
essentially funded by advertising, the many providers of phones,
devices, appliances, and so on advertise in popular publications, host
discussions, and so on. Online platforms do not advertise as such. A
valuable policy research project could investigate how to stimulate a
market for consumer education on privacy and some recommendations
follow in this paper.
In any event, without consumer education on privacy it is difficult
to expect all consumers to fully understand what to consent when
agreeing to typical terms of services. The disclosures could be
simplified and updated in more consumer-centric language and format.
Public Choice Explanation for the Lack of Consumer Education on
Privacy. The academic discipline of public choice uses economics to
investigate problems in political science. It could help explain why
consumer education on privacy is lacking, aside from one possible
explanation that consumers are not interested to learn about privacy
and therefore do not demand such information. A public choice
theorization would likely recognize that while the notion of consumer
education has implicit valence, industry and regulators may have
incentives to de-emphasize its role. Indeed, if consumers are empowered
to make informed choices, they have less need of regulators'
supervision. Similarly, consumers making informed choices also affects
industry; it has a powerful effect to drive consumers from one firm to
another.
The European Union's GDPR is suspect in that among 173 provisions
the role and importance of consumer education is never discussed. This
is likely because the regulation is in part a make-work program for
75,000 new privacy officers and the employees of 62 data protection
authorities. The GDPR assumes that regulatory authorities have more
information than consumers and firms and therefore know better how to
order transactions in the marketplace.\35\ All the same, the GDPR
imposes massive new responsibility on regulators without a concurrent
increase in training or funding.\36\ EU data supervisors must wear many
hats, including ``ombudsman, auditor, consultant, educator, policy
adviser, negotiator, and enforcer.'' \37\ Furthermore, the GDPR widens
the gap between the high expectations for data protection and the low
level of skills possessed by data supervisors charged with its
implementation.\38\ There are certainly many talented individuals among
these ranks, but the mastery of information communication technologies
varies considerably among these professionals, especially as each
nation's data protection authority is constituted differently.
---------------------------------------------------------------------------
\35\ See generally F. A. Hayek, ``Economics and Knowledge,'' 1937;
and F.A. Hayek, ``The Use of Knowledge in Society,'' 1945.
\36\ Douglas Busvine, Julia Firoretti, and Mathieu Rosemain,
``European Regulators: We're Not Ready for New Privacy Law,'' Reuters,
May 8, 2018, https://www.reuters.com/article/us-europe-privacy-
analysis/european-regulators-were-not-ready-for-new-privacy-law-
idUSKBN1I915X.
\37\ Colin J. Bennett and Charles Raab, ``The Governance of
Privacy: Policy Instruments in Global Perspective,'' 2006.
\38\ Charles D. Raab and Ivan Szekely, ``Data Protection
Authorities and Information Technology,'' Computer Law and Security
Review (forthcoming), https://ssrn.com/abstract=2994898.
---------------------------------------------------------------------------
Public choice theory also suggests that the EU data supervisors'
preferences are not necessarily aligned with the ``public interest,''
or what is best for European welfare in the long run. Increasing user
knowledge and the quality of data protection technology could
legitimately make people better off, but it could also render
regulators less important. While data supervisors will not necessarily
reject policies that improve user knowledge and technology design, it
is in their interest to promote inputs that increase their own
resources and legitimacy in conducting compliance and adjudication.\39\
---------------------------------------------------------------------------
\39\ Roslyn Layton, ``How the GDPR Compares to Best Practices for
Privacy, Accountability, and Trust,'' March 31, 2018, 14, https://
papers.ssrn.com/sol3/papers.cfm?abstract_id=2944358.
---------------------------------------------------------------------------
Many surveys demonstrate that many users fail to practice basic
privacy-enhancing behaviors.\40\ This situation is ripe for improvement
and represents a classic example of how consumer education can improve
outcomes better, more quickly, and at a lower cost than regulation.
Indeed, the first principle of consumer education in data protection,
buyer beware, is the first principle for how citizens should protect
themselves in cyberthreats in Michael Chertoff's new book on
cybersecurity: ``Be mindful of what data you transmit and what you
connect to your own network.'' \41\ He also recommends practicing cyber
hygiene, taking advantage of layered cybersecurity technology, and
outsmarting scams with a phone call. Consumers need to practice the
same kind of vigilance and personal responsibility in cybersecurity as
they do in the data protection domain. Outsourcing the job to
bureaucrats will not cut it, as the user can be a vulnerability point.
Consider warnings and labels on food and chemicals; while regulation
can mandate that disclosures be made, if users do not recognize the
meaning of expiration dates or consumption warnings, then the
disclosure has little impact.
---------------------------------------------------------------------------
\40\ Layton, ``How the GDPR Compares to Best Practices for Privacy,
Accountability, and Trust.''
\41\ Michael Chertoff, ``Exploding Data: Reclaiming Our Cyber
Security in the Digital Age,'' Atlantic Monthly Press, 2018.
---------------------------------------------------------------------------
As such, the GDPR rests on a fallacy that making consent more
explicit makes consumers more informed. The GDPR requires enterprises
to make consent ever more detailed, burdensome, and granular without
increasing the user's holistic knowledge of the transaction. This
creates an increasing chasm between consumer empowerment and
bureaucratic control. It is like speaking more loudly to a person who
speaks another language in the hope that she will better understand.
When producers and consumers do not have perfect information, this
discrepancy can give rise to inefficiency or abuse. Peer-to-peer
platforms have resolved many of these problems of informational
asymmetry through information sharing. Consider how the ability to
evaluate drivers and riders is an essential part of ridesharing apps.
Before Uber, neither the taxi company nor the regulator was interested
to publish real-time information about the quality of drivers or cars,
as it would like to impugn the failure of regulator. Ratings and peer
reviews are essential in the digital economy. Indeed, some health
regulators use Yelp ratings to help inform how they deploy their
inspection resources.\42\
---------------------------------------------------------------------------
\42\ Roslyn Layton, ``How Sharing Economy Regulatory Models Could
Resolve the Need for Title II Net Neutrality,'' AEI, June 26, 2017,
http://www.aei.org/publication/sharing-economy-regulatory-models-
resolve-need-title-ii-net-neutrality/; And Arun Sundararajan, The
Sharing Economy: The End of Employment and the Rise of Crowd-Based
Capitalism (MIT Press, 2016)
---------------------------------------------------------------------------
Consumer education could be vital to demystify the ``black box'' of
many Internet platforms, which for many consumers is a system in which
they can observe the inputs and outputs but have little to no insight
to its internal workings.
Tapping the FTC's Consumer Education Resources. The FTC already has
significant educational resources to help consumers protect themselves
online in the privacy, identity and online security sections of its
website.\43\ It would be worthwhile to see how this information could
be shared, syndicated, and amplified, for example through social media
by users themselves. Even if no further policy was enacted at all,
people could read the FTC section on protecting kids online and learn
many things about being more responsible and protecting one's privacy.
Essentially, the very restraint that parents are to apply to children,
they should apply to themselves.
---------------------------------------------------------------------------
\43\ Federal Trade Commission, ``Privacy, Identity & Online
Security,'' https://www.con
sumer.ftc.gov/topics/privacy-identity-online-security
---------------------------------------------------------------------------
Moreover, there is nothing is to stop any privacy advocacy
organization, philanthropic charity, school, trade association, or
company from presenting a similar list or linking to the FTC's
information. They do not have to ask permission; they do not need to
wait for legislation. Information can be made available to consumers
today.
The section on limiting unwanted calls and e-mails is quite
detailed noting privacy choices for your personal financial
information; stopping unsolicited mail, phone calls, and e-mail;
blocking unwanted calls; robocalls; they do not call registry; phone
scams, telemarketing rules; and reducing spam on e-mail and SMS. These
include common sense tips such as using e-mail filters, limiting
exposure of one's e-mail address, changing privacy settings, choosing
unique e-mail address, detecting and removing malware, and reporting
spam.
The section on protecting kids online delves into cyberbullying,
how parents can talk with kids, and basic security such as peer-to-peer
file sharing, phishing, and downloading apps. Indeed, these pointers
could easily be extended to adults. Some of these settings could be
defaults for first-time adult users until they become more familiar.
There are privacy-enhanced devices apps for children, so there is no
reason why they cannot be designed for adults. Features include
programmable limitation on services, emergency buttons, time management
controls, filtering software applied to ensure that users do not share
personal information or content. Just as parents develop rules for
their kids, they should live by their own rules, limiting their use at
family times, in the evening, etc. But they can also be more diligent
about their behavior. Adults should be cautious in what they post,
whether text, picture, or video. They should use ``good judgment.''
The OECD's International Cooperation on Consumer Education for
Online Privacy. More than a decade ago various private and public
organizations have outlined the role of consumer education in online
privacy, but this thinking and educational assets have not been
meaningfully incorporated into policy. Notably, the Organisation for
Economic Co-operation and Development (OECD) published a study on
Consumer Education for Digital Competence.\44\ Key learning points
include:
---------------------------------------------------------------------------
\44\ Organisation for Economic Co-operation and Development,
``Consumer Education Policy Recommendations of the OECD'S Committee on
Consumer Policy,'' 2009, http://www.oecd.org/sti/consumer/44110333.pdf.
Linking the concept of digital competence with critical
---------------------------------------------------------------------------
thinking on technology and the media,
Educating to provide a basis for developing an understanding
of the structures and conceptual relationships understanding
digital media (e.g., functioning of online market, e-commerce
marketing techniques, and user tools),
Learning the how and why of protecting personal information
when using digital media,
Using media to promote the education of digital competence
in compelling ways (e.g., games, videos, blogs, and virtual
worlds),
Age-appropriate education,
Implementing teacher training, and
Strengthening multi-stakeholder cooperation to create
educational partnerships.
The OECD also published a book to describe prevailing consumer
education practices across the member nations, including the
institutional frameworks and policy evaluation tools.\45\
---------------------------------------------------------------------------
\45\ Organisation for Economic Co-operation and Development,
``Promoting Consumer Education: Trends, Policies and Good Practices--
OECD,'' March 2009, http://www.oecd.org/sti/consumer/
promotingconsumereducationtrendspoliciesandgoodpractices.htm#howto.
---------------------------------------------------------------------------
Institute for Privacy Protection at Seton Hall University. Gaia
Bernstein, director of the Institute for Privacy Protection and
codirector of the Gibbons Institute of Law Science and Technology at
Seton Hall University observes, ``We can take action to regain control
of our time, attention and social interactions.'' \46\ The center
offers training for teachers and other leaders about how to empower
users to manage their privacy. The core curriculum is based on the
concept of explaining the concept of privacy, digital footprints and
reputation, ads and content choice, and online versus offline
balance.\47\
---------------------------------------------------------------------------
\46\ Gaia Bernstein, ``About the Over-Users,'' accessed August 20,
2018, http://gaiabern
stein.com/.
\47\ Seton Hall, ``Institute for Privacy Protection's School
Outreach Program,'' https://law.shu
.edu/about/news.cfm?customel_datapageid_6255=537438.
---------------------------------------------------------------------------
Teaching Privacy Curriculum. For example, in the US, the ``Teaching
Privacy Curriculum'' by Serge Egelman et al., offers interactive
instruction on 10 principles of online privacy over three weeks in a
university setting, a method that has also proved effective to educate
and empower users to manage their privacy.\48\
---------------------------------------------------------------------------
\48\ Serge Egelman et al., ``The Teaching Privacy Curriculum,''
2016, 591-96.
---------------------------------------------------------------------------
______
Response to Written Questions Submitted by Hon. Maggie Hassan to
Denise E. Zheng
Question 1. We have heard a lot about Europe's new data privacy
protections, known as the GDPR. I would like to understand better what
their actual impact has been in the United States, and how much
companies are differentiating their practices for European consumers
vs. American consumers.
For example, during his testimony in the spring, Mark Zuckerberg
promised that Facebook would apply the same standards to users in
Europe and America. But it now appears that Facebook is requiring
consent from European users for some of its policy changes while merely
notifying American users--and may be treating users in other places
like Asia differently altogether.
From your perspective working with companies, are they now handling
European users differently than American users, or are companies
applying the same standards and practices worldwide? Why should we seek
to harmonize our laws across countries, if it's easy for companies to
treat users differently in different places?
Answer. Companies face a growing number of privacy and other data
protection requirements at the state, federal, and global level. As a
result, it can be difficult for businesses to apply the same privacy
practices worldwide due to competing and sometimes conflicting
regulatory requirements.
The privacy and security of consumer data is a top priority for
Business Roundtable companies regardless of where their consumers are
located. In some cases, companies may apply the same practices and
standards worldwide, while in other instances, adopting the same
practices everywhere may make it unfeasible to comply with local
requirements and enforcement regimes.
Harmonization of existing privacy and other data protection
requirements is necessary to avoid a globally fragmented regulatory
environment. The global patchwork of requirements is cumbersome and
costly for large companies and even more difficult for small businesses
and startups to navigate. The legal uncertainty that results from the
lack of harmonization undermines investment, growth, and job creation.c
Question 2. Earlier this spring, attorney Craig Newman proposed the
idea of publicly grading companies' data privacy and cybersecurity
efforts on a simple A through F scale, similar to the way we do with
health inspections for restaurants in some places. The goal would be to
create incentives for companies to implement best practices in order to
receive better grades and help them retain and attract customers.
There are some issues we would need to work through in implementing
something like this, but I think it is an idea worth exploring further,
which I am currently doing with Mr. Newman and others.
Do you have further thoughts on this kind of proposal?
Answer. Business Roundtable has not yet evaluated this proposal,
but we stand ready to assist the Committee as it evaluates this and
other proposals.
______
Response to Written Questions Submitted by Hon. Catherine Cortez Masto
to Denise E. Zheng
Question 1. There are nearly a quarter of a million small
businesses in Nevada. They're working to try to navigate the
increasingly complex cyber world and I hear a lot from them about
cybersecurity and other Internet issues.
Can you talk about GDPR, as well as other international
regulations, and how we can ensure that small businesses have the tools
to navigate these as well as rules that are being put in place at the
state level?
Answer. Many small- and medium-sized companies have very limited
resources and in-house expertise to navigate the increasingly complex
regulatory landscape for privacy and security.
Governments at the state, federal, and international levels should
provide assistance, training, and tools for small- and medium-sized
businesses to strengthen their efforts to improve their own data
security and privacy practices. Governments should also consider
whether their outreach and relationships effectively reach small- and
medium-sized businesses and make efforts to ensure that they consider
the interests of all companies.
In cases where greater government engagement is needed, governments
should provide small businesses with practical and tailored risk
management frameworks, guidance, and other tools to ensure businesses
of all sizes have the resources to safeguard their own data and
technology infrastructure, protect consumer data, and comply with
regulatory requirements.
Question 2. Countries and increasingly imposing data localization
requirements, which require companies that collect personal data to
store it on servers within the geographic boundaries of the country, as
a requirement for companies to do business there.
Are there logistically feasible ways for American entities to
process data internationally with the data localization polices that
were discussed at the hearing?
Answer. Data localization requirements can impose prohibitively
costly workarounds on American companies processing data
internationally. When laws require data to be stored and processed
within the borders of one country, companies may attempt to comply by
replicating, at a great cost, centralized systems, connectivity,
software, and supporting data. A company that hosts back-office
services at two centralized data centers (one primary, one backup for
resiliency and disaster recovery) could see operating costs multiply if
forced to create regional data centers.
Furthermore, U.S. companies that develop content for global
distribution or share services on a global scale may be required to
duplicate business efforts. For example, a company that develops online
content for one online platform may be required to redesign and
redeploy that content in countries that censor those platforms.
Finally, localization measures weaken the resilience of global
business and critical infrastructure. As noted, a geographically
diverse network architecture provides businesses with added resiliency.
If there are physical outages or cyber-attacks at one data center, a
robust global network enables other data centers to pick up the work.
The same geographic diversity enables 24/7 threat monitoring and
mitigation through a follow-the-sun approach to cybersecurity
operations.
Question 3. How does this impact academia or the private sector?
Answer. The growth of data localization restrictions across the
globe is causing key challenges for U.S. companies across all sectors
of the economy including:
Threatens Interoperability. Data localization requirements
threaten a free and open Internet by putting unnecessary
restrictions on the free-flow of data. It is a form of digital
protectionism that fragments the internet, undermines global
interoperability, and could result in delays and unevenness in
the deployment of the new internet-enabled technologies.
Compliance Costs. Data localization requirements impose
significant costs associated with legal and regulatory
compliance. Restrictions are complex and nuanced, requiring
interpretation and causing legal uncertainty. Such requirements
can raise the cost of hosting data by 30 to 60 percent for
companies that are covered by such requirements.\1\ One study
estimated that enacted or proposed data localization mandates
in China could cost up to 1.1 percent of its GDP and the cost
of data localization requirements in the EU could cost nearly
0.4 percent of its GDP.\2\ Localization can also limit the
effectiveness of regulatory compliance by preventing the timely
transfer of data to inform regulatory requests and reporting,
such as those with respect to anti-money laundering
requirements under the Bank Secrecy Act.
---------------------------------------------------------------------------
\1\ Leviathan Security Group (2015). Quantifying the Cost of Forced
Localization. Retrieved from https://static1.squarespace.com/static/
556340ece4b0869396f21099/t/559dad76e4b0899d9
7726a8b/1436396918%20881/
Quantifying+the+Cost+of+Forced+Localization.pdf
\2\ European Centre for International Political Economy (2016
March). Unleashing Internal Data Flows in the EU: An Economic
Assessment of Data Localization Measures in the EU Member States.
Retrieved from http://ecipe.org/app/uploads/2016/12/Unleashing-
Internal-Data-Flows-in-the-EU.pdf
Redundant Investments. Companies may be required to make
redundant capital investments by building data servers in
various global locations to meet local data storage laws.
Building multiple data centers in every country where a company
delivers products or services may not be feasible. In the event
of a disaster, recovery of services could be significantly
delayed or impossible without offshore data backup and
---------------------------------------------------------------------------
processing.
Workforce Challenges. Local data storage mandates can cause
companies to fragment centralized workforce information. When
companies are unable to consolidate HR information at a global
enterprise level, it impacts their ability to create best
practices and assess talent across locations. Furthermore, the
isolation of data can create skill gaps that force companies to
relocate or rehire employees to access specific sets of data
rather than moving the data to employees with specific skills.
Non-tariff barriers to trade. Localization requirements
limit digital and physical trade across borders by placing
restrictions on the movement of digital goods and information
necessary to support commercial activity. Countries that are
committed to increased economic growth, expanded trade, and
sustainable digital development should not adopt localization
measures.
Question 4. With the various data localization laws taking effect,
can you discuss whether those typically explicitly forbid data transfer
over national borders or would they allow a country, Germany for
example, to host data on German made servers in a neighboring country?
Additionally, if a U.S. company, for example, was expected to store
data on a data center in a country like China, would it be mandated to
use Chinese materials or technology in the construction of the data
center? Please answer generally with respect to the multitude of data
localization laws.
Answer. Data localization requirements can take a variety of forms.
Such measures ``differ from country to country in terms of industry
coverage, geography, types of data covered, complexity, [and] data
intensity.'' \3\ Stricter measures usually require that specified types
of data collected in a particular country be stored and processed in
that country's borders. Other rules may require certain conditions to
be met for data to leave the implementing country, effectively banning
the transfer of data offshore. Some rules also place requirements on
the types of technology used.
---------------------------------------------------------------------------
\3\ International Trade Commission (2017 August). Global Digital
Trade 1: Market Opportunities and Key Foreign Trade Restrictions.
Retrieved from https://www.usitc.gov/publications/332/pub4716_0.pdf
---------------------------------------------------------------------------
For example, China has adopted strict data localization laws.
China's Cybersecurity Law that went into effect in June 2017 requires
all ``important information'' and ``personal information'' to be stored
in China. Under this regime, ``network operators'' are prohibited from
transferring covered data outside of China without undergoing a
government-mandated security assessment. As currently defined, the law
could cover any entity that owns or operates a computer network and
applies to a vast and ambiguous assortment of different types of data.
In addition, China has localization measures applying specifically to
telecommunications. China's Telecommunications Regulation of 2000
requires all data collected inside China to be stored on Chinese
servers.
Russia's data localization law provides another example of a strict
regime. Federal Law No. 242-FZ requires all data operators, both
domestic and foreign, to store the personal information of Russian
citizens on servers physically located within Russian borders.
China and Russia are not the only countries with data localization
requirements. India, Nigeria, Indonesia, Malaysia, Vietnam, and South
Korea all have enacted laws that prohibit the transfer of a range of
business and consumer data outside of their respective jurisdictions.
Question 5. The EU-U.S. Privacy Shield is a program that allows
companies to transfer personal data to the United States from the
European Union (EU) in a way that is consistent with EU law. However,
the European Parliament passed a non-binding resolution in July
claiming the United States was not complying with European law and
called on the European Commission to suspend Privacy Shield by
September 1 ``unless the U.S. is fully compliant.''
What would the impact to U.S. businesses be if the EU Commission
suspends Privacy Shield?
Answer. The EU-U.S. Privacy Shield Framework is an important legal
tool that facilitates global digital commerce by providing U.S.
companies with a mechanism to comply with EU data protection
requirements when transferring personal data from Europe to the US.
More than 3,000 organizations have self-certified they comply with the
Framework since it was established, including a significant number of
Business Roundtable companies.
Cross border data flows are the foundation of today's
interconnected economy and critical to billions of dollars in trade
between the U.S. and European countries. Data flows between the U.S.
and Europe are the highest in the world and are 50 percent larger than
data flows between the U.S. and Asia.\4\ In addition, the EU and U.S.
are the top markets for each other for digital goods and services.
---------------------------------------------------------------------------
\4\ Brookings Institution (2014 October). The Importance of The
Internet and Transatlantic Data Flows for U.S. and EU Trade and
Investment. Retrieved from https://www.brookings.edu/wp-content/
uploads/2016/06/internet-transatlantic-data-flows-version-2.pdf
---------------------------------------------------------------------------
Suspension of the Privacy Shield Framework would bring the legal
transfer of EU resident data to a halt for organizations reliant on the
Framework, along with the trade that depends upon those data flows.
Companies would have to undergo burdensome processes to establish
alternative transfer mechanisms such as binding corporate rules or
standard contractual clauses, which can be expensive and disruptive to
business activities dependent on the information.
______
Response to Written Questions Submitted by Hon. Jon Tester to
Denise E. Zheng
Question 1. Many members of the panel mentioned the United States
needs to step up our level of engagement and join other like-minded
countries. In your opinion, which countries closest align with our
values on Internet freedom, privacy, and Internet of Things?
Answer. Internet freedom, privacy, and Internet of Things are
related policy issues, but also very different. The best countries to
engage with may vary based on the issue at hand.
Maintaining a multi-stakeholder approach to Internet governance,
which includes governments, businesses, academia, and civil society, is
critical to preserving a free and open Internet that enables economic
growth and opportunity around the world. The U.S. must work other like-
minded countries to strengthen multi-stakeholder institutions, promote
principles of Internet freedom in countries with nascent Internet
policies, and counter efforts by repressive countries attempting to
rewrite the rules of the Internet in ways that are fundamentally at
odds with open markets and democratic values.
American companies and the U.S. Government should continue working
closely with the EU and countries in Asia, including Japan and South
Korea, to establish interoperable privacy frameworks that protect
consumers and promote continued growth and innovation.
Question 2. What forum (e.g., the United Nations, NATO, etc.) do
you recommend for facilitating an international discussion on rules and
definitions?
Answer. Norms, best practices, and standards for digital economy
issues should be developed in multi-stakeholder forums where
government, industry, and civil society have a seat at the table. The
U.S. Government should seek to strengthen ties with allies and
demonstrate leadership in forums where countries are promoting
regulatory regimes that disadvantage American companies and run counter
to American values of an open and secure cyberspace. The appropriate
forum for international discussion depends on the issue. Examples of
possible forums to discuss cross-border data flow, cybersecurity, and
privacy issues include:
Cross-Border Data Flows. The U.S. Government should use
trade agreement discussions to minimize barriers to
international trade, including restrictions on the free flow of
data across borders.
Cybersecurity. The U.S. Government should actively engage in
discussions with ``Five Eyes'' nations to discuss how to
enhance collaboration to address common security challenges in
cyberspace. In addition, the U.S. Government should promote the
alignment of cybersecurity regulations and frameworks in
ongoing and upcoming trade negotiations to reduce regulatory
fragmentation.
Privacy. Congress and the Administration should work with
industry and other privacy stakeholders to develop a framework
for national consumer privacy legislation, and create a
strategy to engage with the EU and countries in Asia that
promote interoperability with GDPR and other international
policy frameworks. The U.S. public and private sectors should
also be fully engaged in upcoming APEC Cross-Border Privacy
Rules discussions and OECD privacy efforts.
Question 3. Before the United States can lead the charge
international, we must unify our own ``rules of the road.'' Does such a
forum currently exist, to your knowledge? How has private industry in
the U.S. tried to tackle how we define the rules of the road when it
comes to Internet security and governance? Which U.S. governmental
agency would you recommend take the lead and represent the United
States in international discussions?
Answer. U.S. companies have been working closely with the U.S.
Government, foreign nations, and other regional and international
bodies to participate in efforts to the define the ``rules of the
road'' for Internet security and governance that enables growth and
innovation while safeguarding security and privacy.
American companies are committed to building long-standing and
trusted partnerships with the government to create policy solutions
that provide the public and private sectors with the tools needed to
manage sophisticated cybersecurity threats to critical infrastructure.
A key example of how government and industry have partnered to
strengthen cybersecurity for all sectors of the economy and the
government is the creation of the National Institute of Standards and
Technology (NIST) Cybersecurity Framework. The Cybersecurity Framework
is a voluntary industry-led risk management approach based on best
practices and guidelines to reduce cyber risk.
The U.S. Government should promote the Cybersecurity Framework with
other countries and international standards bodies. The adoption of
interoperable cybersecurity standards across jurisdictions promotes
innovation and helps multinational businesses more effectively manage
risks. NIST should encourage foreign governments and international
standards organizations, such as the International Standards
Organization (ISO) and International Electrotechnical Commission (IEC),
to leverage the Framework in a manner that enables harmonization and
complementary standards, guidelines, and best practices. In addition,
the U.S. Trade Representative should promote the use of voluntary cyber
risk management frameworks and advance prohibitions on localization
measures in all future trade agreements.
______
Response to Written Questions Submitted by Hon. Maggie Hassan to
Christopher M.E. Painter
Question 1. We have heard a lot about Europe's new data privacy
protections, known as the GDPR. I'd like to understand better what
their actual impact has been in the United States, and how much
companies are differentiating their practices for European consumers
vs. American consumers.
For example, during his testimony in the spring, Mark Zuckerberg
promised that Facebook would apply the same standards to users in
Europe and America. But it now appears that Facebook is requiring
consent from European users for some of its policy changes while merely
notifying American users--and may be treating users in other places
like Asia differently altogether.
Mr. Painter, should it be a concern if companies like Facebook are
differentiating in this way? Why should we seek to harmonize our laws
across countries, if it's easy for companies to treat users differently
in different places?
Answer. I have not conducted any research on the extent that
companies are differentiating between U.S. and other customers.
However, though the GDPR does have some effects outside the European
Union, it is primarily aimed at protecting EU citizens and their data.
U.S. and European data protection standards have always been
different--though the goal is for them to be interoperable. Though for
administrative and other reasons it should be expected that some
companies will apply the same standards globally, in the absence of
U.S. rules there is no legal requirement to do so. Accordingly, in
order to achieve the kind of harmonization you raise, the U.S. would
need to have similar practices. As I said in my testimony, if the U.S.
wants to set the global standard, it is important for the U.S. to have
its own consumer data privacy regime, drawing from the Privacy Bill of
Rights released during the last administration.
Question 2. Earlier this spring, attorney Craig Newman proposed the
idea of publicly grading companies' data privacy and cybersecurity
efforts on a simple A through F scale, similar to the way we do with
health inspections for restaurants in some places. The goal would be to
create incentives for companies to implement best practices in order to
receive better grades and help them retain and attract customers.
There are some issues we would need to work through in implementing
something like this, but I think it is an idea worth exploring further,
which I am currently doing with Mr. Newman and others.
Could you elaborate on this idea in the context of international
companies--whether and how we could implement and idea like this
globally, and what challenges we might face?
Answer. This is an interesting idea and deserves further study. As
you note there are a number of challenges to implementing such a regime
either domestically or internationally. These include what the criteria
would be for such designations, who would determine whether a
particular entity deserved a particular rating, how would those
decisions be reviewed, how would such designations differ based on the
criticality of the end use, whether the simple grade designations
really convey useful information to the end user, etc. The complexity
is magnified if the scheme is meant to be used internationally as other
countries, civil society and the private sector in those countries
would have to buy in to that scheme and the ``grade'' should not be
used as a way to control market access. The EU is currently working on
cybersecurity legislation that would create a voluntary certification
regime for cybersecurity and network products. In the course of that
legislative process a number of considerations came to light and have
ben incorporated or are being weighed. Among these considerations is
that such a scheme should be based on a risk management approach; that
there is no one size fits all and any certification criteria should be
developed collaboratively with relevant industry players and that such
a scheme should be largely voluntary.
______
Response to Written Questions Submitted by Hon. Catherine Cortez Masto
to Christopher M.E. Painter
Question 1. There are nearly a quarter of a million small
businesses in Nevada. They're working to try to navigate the
increasingly complex cyber world and I hear a lot from them about
cybersecurity and other Internet issues.
Can you talk about GDPR, as well as other international
regulations, and how we can ensure that small businesses have the tools
to navigate these as well as rules that are being put in place at the
state level?
Answer. Given the complexities of the GDPR and the growing and
sometimes conflicting cybersecurity regulations around the world it is
often difficult for small businesses to take into account and implement
varying requirements. This, of course, is heightened if they do
business globally. The same is true in the physical world but given
that many small businesses have an online presence they may be subject
to certain requirements, like GDPR, particularly if they are processing
data from overseas. There is no easy answer to this, but, for example,
as GDPR is being implemented there are a number of resources that are
being created to help navigate its requirements. Nevertheless, this
will likely require small businesses to devote scarce resources to
compliance.
Question 2. Countries and increasingly imposing data localization
requirements, which require companies that collect personal data to
store it on servers within the geographic boundaries of the country, as
a requirement for companies to do business there.
Are there logistically feasible ways for American entities to
process data internationally with the data localization polices that
were discussed at the hearing?
Answer. Some larger companies have been able to deal with at least
some of these requirements by building or operating data centers
overseas but this approach, even for large and well resourced entities,
is not scalable or sustainable if many more countries demand this. This
is also an issue for small and start-up businesses who don't have the
resources to operate several data centers around the globe. Moreover,
with respect to repressive countries, data localization requirements
are often used as a proxy to allow greater monitoring and control of
their citizens and that raises significant human rights issues.
Question 3. How does this impact academia or the private sector?
Answer. As noted above, any entity that is required to comply with
data localization demands will need to devote significant resources to
comply and this is not scalable in the long term.
Also, as noted above, there may be significant human rights
concerns.
Question 4. With the various data localization laws taking effect,
can you discuss whether those typically explicitly forbid data transfer
over national borders or would they allow a country, Germany for
example, to host data on German made servers in a neighboring country?
Answer. I have not studied this issue but it would very much depend
on the laws and regulations of the country or geo-political entity in
question.
Question 5. Additionally, if a U.S. company, for example, was
expected to store data on a data center in a country like China, would
it be mandated to use Chinese materials or technology in the
construction of the data center? Please answer generally with respect
to the multitude of data localization laws.
Answer. Again, I have not studied this issue but such requirements,
if they exist, would not necessarily be part of the data localization
law itself. China, for example, has used a number of methods more
generally to require, among other things, joint ventures with Chinese
companies for certain businesses wishing to operate in China and has
used its cybersecurity law to mandate or exclude various products.
Question 6. The EU-U.S. Privacy Shield is a program that allows
companies to transfer personal data to the United States from the
European Union (EU) in a way that is consistent with EU law. However,
the European Parliament passed a non-binding resolution in July
claiming the United States was not complying with European law and
called on the European Commission to suspend Privacy Shield by
September 1 ``unless the U.S. is fully compliant.'' What would the
impact to U.S. businesses be if the EU Commission suspends Privacy
Shield?
Answer. The U.S. and EU methods for dealing with data protection
and privacy differ and so the goal has always been to assure basic
interoperability. The Privacy Shield has been a vital means to both
assuring European entities of basic privacy protections and ensuring
that both U.S. and European businesses and other entities can transfer
necessary data and conduct business and other interactions. If the
Privacy Shield is suspended, it will have a major negative effect on
businesses and individuals on both side Atlantic.
______
Response to Written Questions Submitted by Hon. Jon Tester to
Christopher M.E. Painter
Question 1. Many members of the panel mentioned the United States
needs to step up our level of engagement and join other like-minded
countries. In your opinion, which countries closest align with our
values on Internet freedom, privacy, and Internet of Things?
Answer. Most of our traditional allies and partners, including
European, Five-Eye, G7 countries and others are closely aligned with
our views (though I will not list all of them here for fear of leaving
some out). While it is important we continue to strengthen our ties
with our traditional partners, it is also important that we work with
them to expand the like-minded tent through capacity building and
International engagement.
Question 2. What forum (e.g., the United Nations, NATO, etc.) do
you recommend for facilitating an international discussion on rules and
definitions?
Answer. There is no ``one ring to rule them all'' forum but rather
we need to work with our partners is advancing these issues in a
variety of both international and regional forums. These include the UN
(like our engagement in the Group of Governmental Experts), NATO (that
has made great strides in incorporating cyber issues into its core
policies in the last 10 years), the OAS, the OSCE, ASEAN, the G7. It
also includes informal organizations like the Coalition for Freedom
Online and a host of public/private and multi-stakeholder forums. For
example, I currently serve as a Commissioner on the Commission for the
Global Stability of Cyberspace, a multi-stakeholder group that is
trying to suggest and advance stability measures and a framework in
cyberspace, and I chair a working group for the Global Forum for Cyber
Expertise that works with governments, the private sector, and civil
society to advance cyber capacity building efforts.
As cyber issues--including human rights, Internet governance,
cybersecurity, cybercrime, and international security and conflict
issues--become ever more prominent, nearly every global and regional
forum are brining to consider them. Some forums are more tailored to
specific issues than others but there is an urgent need to engage as
many of these forums are considering issues or making decisions that
could have a profound impact on the future of cyberspace.
Question 3. Before the United States can lead the charge
international, we must unify our own ``rules of the road.'' Does such a
forum currently exist, to your knowledge? How has private industry in
the U.S. tried to tackle how we define the rules of the road when it
comes to Internet security and governance? Which U.S. governmental
agency would you recommend take the lead and represent the United
States in international discussions?
Answer. Given the breadth and scope of cyber issues U.S.
coordination is paramount if we are to continue to lead the global
discussion in this area. Although there is no single domestic forum
where all these issues come together, their has, in the past, been
strong coordination between Federal agencies and robust outreach to the
private sector and civil society. Various agencies have taken the lead
on different aspects of cyber policy and in taking practical measures
to thwart cyber threats including DHS, DOJ, DOD, State, Commerce and
others. Overall international engagement on policy issues has been led
by State (and that should continue) though other agencies have worked
closely with international counterparts on their mission sets. In my
former role, I led interagency delegations in a number of engagements
that sought to present a whole-of-government approach. That said, given
the importance of the international issues being raised and the need to
build coalitions to respond to shared threats, I am concerned that we
are not currently well structured to achieve these goals. My former
office in the State Department, the first of its kind anywhere in the
world and now emulated by over 25 countries, has now been demoted for
over a year sending an unfortunate message to both our friends and our
adversaries that we do not prioritize these issues. Moreover, the Cyber
Coordinator at the National Security Council has been abolished. That
role helped coordinate all the interagency efforts (including helping
to resolve potential conflicts) and also served to up our game and
profile on the international stage. Though structure isn't everything,
and a lot of folks throughout the interagency continue to do good and
important work, these changes again signal, intentionally or not, a
lowering of priority when we are at a time when, if anything, the
priority and profile of these issues should be raised.
[all]