Data haven

Last updated

A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data. [1] [2] [3] Data havens are locations with legal environments that are friendly to the concept of a computer network freely holding data and even protecting its content and associated information. They tend to fit into three categories: a physical locality with weak information-system enforcement and extradition laws, a physical locality with intentionally strong protections of data, and virtual domains designed to secure data via technical means (such as encryption) regardless of any legal environment.

Contents

Tor's onion space, I2P (both hidden services), HavenCo (centralized), and Freenet (decentralized) are four models of modern-day virtual data havens.

Purposes of data havens

Reasons for establishing data havens include access to free political speech for users in countries where censorship of the Internet is practiced.

Other reasons can include:

History of the term

The 1978 report of the British government's Data Protection Committee expressed concern that different privacy standards in different countries would lead to the transfer of personal data to countries with weaker protections; it feared that Britain might become a "data haven". [4] Also in 1978, Adrian Norman published a mock consulting study on the feasibility of setting up a company providing a wide range of data haven services, called "Project Goldfish". [5]

Science fiction novelist William Gibson used the term in his novels Count Zero and Mona Lisa Overdrive , as did Bruce Sterling in Islands in the Net . The 1990s segments of Neal Stephenson's 1999 novel Cryptonomicon concern a small group of entrepreneurs attempting to create a data haven.

See also

Related Research Articles

<span class="mw-page-title-main">Cyberspace</span> Concept describing a widespread, interconnected digital technology

Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security professionals, governments, military and industry leaders and entrepreneurs to describe the domain of the global technology environment, commonly defined as standing for the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems. Others consider cyberspace to be just a notional environment in which communication over computer networks occurs. The word became popular in the 1990s when the use of the Internet, networking, and digital communication were all growing dramatically; the term cyberspace was able to represent the many new ideas and phenomena that were emerging. As a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on, using this global network. Cyberspace users are sometimes referred to as cybernauts.

<span class="mw-page-title-main">Privacy</span> Seclusion from unwanted attention

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

<span class="mw-page-title-main">Virtual reality</span> Computer-simulated experience

Virtual reality (VR) is a simulated experience that employs pose tracking and 3D near-eye displays to give the user an immersive feel of a virtual world. Applications of virtual reality include entertainment, education and business. Other distinct types of VR-style technology include augmented reality and mixed reality, sometimes referred to as extended reality or XR, although definitions are currently changing due to the nascence of the industry.

Environment most often refers to:

Corporate haven, corporate tax haven, or multinational tax haven is used to describe a jurisdiction that multinational corporations find attractive for establishing subsidiaries or incorporation of regional or main company headquarters, mostly due to favourable tax regimes, and/or favourable secrecy laws, and/or favourable regulatory regimes.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Consumer privacy is information privacy as it relates to the consumers of products and services.

Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques.

<span class="mw-page-title-main">Crypto-anarchism</span> Political ideology

Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks. In his 1988 "Crypto Anarchist Manifesto", Timothy C. May introduced the basic principles of crypto-anarchism, encrypted exchanges ensuring total anonymity, total freedom of speech, and total freedom to trade. In 1992, he read the text at the founding meeting of the cypherpunk movement. Most Crypto-anarchists are Anarcho-capitalists but some are Anarcho-mutualists.

A No-disc crack, No-CD crack or No-DVD crack is an executable file or a special "byte patcher" program which allows a user to circumvent certain Compact Disc and DVD copy protection schemes. They allow the user to run computer software without having to insert their required CD-ROM or DVD-ROM. This act is a form of software cracking. No-CD cracks specific to a variety of games and other software distributed on CD-ROM or DVD-ROM can be found on the Internet from various reverse engineering websites or file sharing networks. No-CD cracks have legal uses, such as creating backups of legally owned software or avoiding the inconvenience of placing a CD or DVD-ROM in the drive every time the software is being used, although they can also be used to circumvent laws in many countries by allowing the execution of full versions of non-legally owned applications or time-limited trials of the applications without the original disc.

Offshore investment is the keeping of money in a jurisdiction other than one's country of residence. Offshore jurisdictions are used to pay less tax in many countries by large and small-scale investors. Poorly regulated offshore domiciles have served historically as havens for tax evasion, money laundering, or to conceal or protect illegally acquired money from law enforcement in the investor's country. However, the modern, well-regulated offshore centres allow legitimate investors to take advantage of higher rates of return or lower rates of tax on that return offered by operating via such domiciles. The advantage to offshore investment is that such operations are both legal and less costly than those offered in the investor's country—or "onshore".

Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public or private organisations, or other individuals. It also applies in the commercial sector to things like trade secrets and the liability that directors, officers, and employees have when handing sensitive information.

Application virtualization is a software technology that encapsulates computer programs from the underlying operating system on which they are executed. A fully virtualized application is not installed in the traditional sense, although it is still executed as if it were. The application behaves at runtime like it is directly interfacing with the original operating system and all the resources managed by it, but can be isolated or sandboxed to varying degrees.

Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for employers to monitor the actions of their employees. Employers believe that monitoring is necessary both to discourage illicit activity and to limit liability. With this problem of monitoring employees, many are experiencing a negative effect on emotional and physical stress including fatigue, lowered employee morale and lack of motivation within the workplace. Employers might choose to monitor employee activities using surveillance cameras, or may wish to record employees activities while using company-owned computers or telephones. Courts are finding that disputes between workplace privacy and freedom are being complicated with the advancement of technology as traditional rules that govern areas of privacy law are debatable and becoming less important.

Information technology law(IT law) or information, communication and technology law (ICT law) (also called cyberlaw) concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds. The ICT field of law comprises elements of various branches of law, originating under various acts or statutes of parliaments, the common and continental law and international law. Some important areas it covers are information and data, communication, and information technology, both software and hardware and technical communications technology, including coding and protocols.

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

<span class="mw-page-title-main">Offshore financial centre</span> Corporate-focused tax havens

An offshore financial centre (OFC) is defined as a "country or jurisdiction that provides financial services to nonresidents on a scale that is incommensurate with the size and the financing of its domestic economy."

<span class="mw-page-title-main">Institute for Information, Telecommunication and Media Law</span>

Institute for Information, Telecommunication and Media Law or ITM is a research & educational organisation located in Münster, North Rhine-Westphalia in Germany. All major research projects conducted by ITM are ordered by European Commission. Scientific Council of the Institute is presented by Prof. Dr.Dr. Gunnar Bender, Wilhelm Berneke, Jon Bing, Santiago Cavanillas, Herbert Fiedler, Heinz Lothar Grob, Fritjof Haft, Bernt Hugenholtz, Hans Jarass, Wolfgang Kilian, Miriam Meckel, Ernst-Joachim Mestmäcker, Ursula Nelles and other prominent scientists.

The Financial Secrecy Index (FSI) is a report published by the advocacy organization Tax Justice Network (TJN) which ranks countries by financial secrecy indicators, weighted by the economic flows of each country.

Cloud computing has become a social phenomenon used by most people every day. As with every important social phenomenon there are issues that limit its widespread adoption. In the present scenario, cloud computing is seen as a fast developing area that can instantly supply extensible services by using internet with the help of hardware and software virtualization. The biggest advantage of cloud computing is flexible lease and release of resources as per the requirement of the user. Other benefits encompass betterment in efficiency, compensating the costs in operations and management. It curtails down the high prices of hardware and software

References

  1. "The Switzerland of bits". The Economist. June 17, 2010.
  2. "Gov Spying Boosts Swiss Data Center Revenues". Forbes. April 7, 2013.
  3. "Iceland aims to become an offshore haven for journalists and leakers".
  4. Michael, James (November 9, 1978). "New Report on Computer Data Banks". New Scientist . Retrieved November 29, 2010.[ permanent dead link ]
  5. Norman, Adrian (September 1978). "Project Goldfish" (PDF). IPC Science and Technology Press. Archived from the original (PDF) on 2011-09-03.