9,393 research outputs found

    Law Applicable to Cloud Computing Contracts Concluded with Consumers under Regulation 593/2008, According to the CJEU Case Law

    Get PDF
    The undoubted popularity of cloud computing stems in particular from the fact thatย the provider can simultaneously offer access to his or her computing resourcesย to an almost unlimited number of users located in different countries. Althoughย this feature brings significant benefits to the provider, it also raises seriousย questions regarding the law governing the contract. The concerns become especiallyย relevant in the case of contracts concluded between a consumer and a professionalย due to the limits of the choice of law and the special rules protecting consumers.The article analyses the law applicable to cloud computing contracts concludedย with consumers. The considerations focus on the special provisions regardingย consumer protection. Contrary to some comments, the article claims thatย the current legal framework is sufficient to determine the applicable law, althoughย this task is not without doubts

    Regulating Data as Property: A New Construct for Moving Forward

    Get PDF
    The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership of digital information be achieved? How can those rights be transferred and enforced? Those calls for data ownership emphasize the impact of ownership on the automotive industry and the vast quantities of operational data which smart automobiles and self-driving vehicles will produce. We looked at how, if at all, the issue was being considered in consumer-facing statements addressing the data being collected by their vehicles. To formulate our proposal, we also considered continued advances in scientific research, quantum mechanics, and quantum computing which confirm that information in any digital or electronic medium is, and always has been, physical, tangible matter. Yet, to date, data regulation has sought to adapt legal constructs for โ€œintangibleโ€ intellectual property or to express a series of permissions and constraints tied to specific classifications of data (such as personally identifiable information). We examined legal reforms that were recently approved by the United Nations Commission on International Trade Law to enable transactions involving electronic transferable records, as well as prior reforms adopted in the United States Uniform Commercial Code and Federal law to enable similar transactions involving digital records that were, historically, physical assets (such as promissory notes or chattel paper). Finally, we surveyed prior academic scholarship in the U.S. and Europe to determine if the physical attributes of digital data had been previously considered in the vigorous debates on how to regulate personal information or the extent, if at all, that the solutions developed for transferable records had been considered for larger classes of digital assets. Based on the preceding, we propose that regulation of digital information assets, and clear concepts of ownership, can be built on existing legal constructs that have enabled electronic commercial practices. We propose a property rules construct that clearly defines a right to own digital information arises upon creation (whether by keystroke or machine), and suggest when and how that right attaches to specific data though the exercise of technological controls. This construct will enable faster, better adaptations of new rules for the ever-evolving portfolio of data assets being created around the world. This approach will also create more predictable, scalable, and extensible mechanisms for regulating data and is consistent with, and may improve the exercise and enforcement of, rights regarding personal information. We conclude by highlighting existing technologies and their potential to support this construct and begin an inventory of the steps necessary to further proceed with this process

    Drones-as-a-Service (DaaS) : An analysis of the Operator as Service Provider and its potential liabilities under light of Regulation (EU) 2019/947

    Get PDF
    Giving the consolidation of a framework that allows for the operations of drones for commercial purposes by the new implemented Regulation (EU) 2019/947 on the rules and procedures for the operation of unmanned aircraft, this thesis introduces the reader to both the origin of the technology, the potential business applications of drones in the civil environment, and the current provisions regarding the risk-based operational characteristics of the Regulation as means to analyse the previously existing air and contractual lawโ€™s provisions. Through the exploration of the relevant legal principles and regulatory guidelines available for the interpretation of liability assignment and applicability, and by comparing the regulation to the contractual model in order to provide a deeper understanding of how the technology can be commercialized on a Drone-as-a-Service model, the author presents the relevant need of further legislation addressing the application of liability regimes harmonization between Member States from the perspective of the Unmanned Aircraft Systems Operator to satisfy the modern Cloud-Based Services Agreements model and allow the use of Internet as a platform for cross-jurisdictional performance. The first chapter revolves around the historical development and the growing civil interest in the application of drones to activities as a novel, as well as to already established activities that are currently performed by different technologies. Furthermore, it presents the possibility of its characterisation under the framework currently employed by cloud-based services regarding its commercial contractual format. The second chapter focuses on introducing the new Regulations (EU) 2019/947 and 2019/945, which have set the legal and regulatory frame for the safe conduction of activities of unmanned aircrafts, including the principles that served as base for the development of the provision;, the operational rules; machinery requirements and classifications; and the categoriesโ€™ classification system that have been created for risk assessment. Overall, the frame serves as a guide for anyone interested in venturing in this business. The third chapter explores the international laws and EU air laws that will influence the ruling and potential jurisprudence regarding liability decisions. It aims at presenting both the relevance of Member States autonomy over regulatory decisions and importance towards contractual liabilities disputes. The focus is strongly focused on Operators that will be employed by service providers under the conceptualised cloud-based services agreements contracts framework. Finally, the thesis presents its conclusions and recommendations towards the commercial parties and legislators

    Data protection in the clouds

    Get PDF

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    EU Privacy seals project: Challenges and Possible Scope of an EU Privacy Seal Scheme. Final Report Study Deliverable 3.4

    Get PDF
    The objective of this report is focus on the challenges of implementing an effective EU privacy seal and its possible scope. It returns the focus to privacy and data protection, and presents further groundwork to feed into Task 4 of the Study (Proposals and evaluation of options for an EU-wide privacy seals scheme). Where relevant, research results and analyses of Tasks 1 and 2 are used. First, the report assesses the gaps in current privacy seal sector. Next, it highlights the advantages of, priorities for and possible scope of an EU privacy seal scheme. Eventually, four case studies (CCTV systems, cloud services, smart metering systems and biometric systems) illustrate the possible scope of an EU privacy seal scheme and demonstrate whether an EU privacy seals scheme would bring any added value to privacy and data protection.JRC.G.6-Digital Citizen Securit

    Analysis on Digital Tax Non-Compliance with GATS

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œํ†ต์ƒ์ „๊ณต), 2021.8. ๋ฐฐ์ง€์—ฐ.The game-changing phenomenon that shifted the world into the current fourth industrial revolution would be โ€˜Digitalizationโ€™. The world has just begun its journey into the new digitalized world, and it will continuously evolve into a more intricate and integrated one. In a transitional period where everything is uncertain and new, opportunities for multilateral negotiations arise, which would help the world coordinate and cooperate to face the unknown digitalized future. Such negotiations allow the international society to implement better rules and policies, ensuring equitable opportunities on a level playing field. In this context, the โ€˜digital economy and tradeโ€™ is one of many fields where international cooperation and coordination are critically needed. Everything that used to be conducted manually, physically, and tangibly is now being conducted automatically, remotely, and intangibly. Goods and services have become digitally available and electronically transmittable, a phenomenon that calls for significant changes not only in the economy and trade but also in the surrounding rules, norms, and policies. Currently, the OECD is leading important and timely negotiations on ways to govern the digitalized economy and trade. One of the first agendas is to draw up a consensus-based agreement concerning the effective international tax measures for the digitalized economy and trade, which would prevent base erosion and profit shifting. However, due to the delayed negotiations, unilateral measures are beginning to arise. This paper aims to first, introduce the aspects of the digitalized economy and trade. Second, outline the current efforts of negotiations to come up with a unified international tax system fit for the digitalized economy and trade. Third, analyze how potential unilateral digital tax measures could face non-compliance with existing WTO trade agreements. Lastly, draw out implications on how international organizations and society should cooperate and coordinate to better prepare for the digitalized future.โ€˜๋””์ง€ํ„ธํ™” (Digitalization)โ€™๋Š” 4์ฐจ์‚ฐ์—…์œผ๋กœ์˜ ํŒจ๋Ÿฌ๋‹ค์ž„ ์ „ํ™˜์„ ์ด๋Œ์–ด ์ค€ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜์˜€๋‹ค. ์ƒˆ๋กœ์šด ๋””์ง€ํ„ธ ์‹œ๋Œ€๋กœ์˜ ์ง„์ž…์€ ์‹œ์ž‘์— ๋ถˆ๊ณผํ•  ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์•ž์œผ๋กœ ๋Š์ž„ ์—†๋Š” ์ง„ํ™”๋ฅผ ๊ฑฐ๋“ญํ•˜๋ฉฐ ํ›จ์”ฌ ๋” ๋ณตํ•ฉ์ ์ด๋ฉฐ ์œตํ•ฉ๋œ ํ˜•ํƒœ๋กœ ๋ฐœ์ „ํ•  ๊ฒƒ์ด๋‹ค. ์ง€๊ธˆ๊ณผ ๊ฐ™์ด ๋ชจ๋“  ๊ฒƒ์ด ์ƒˆ๋กญ๊ณ  ๋ถˆํ™•์‹คํ•œ ๊ณผ๋„๊ธฐ์  ์‹œ๊ธฐ์˜ ๊ฐ€์žฅ ํฐ ์ด์ ์€ ์„ธ๊ณ„๊ฐ€ ํ˜‘๋ ฅํ•˜์—ฌ ์ƒˆ๋กœ์šด ๋””์ง€ํ„ธ ์‹œ๋Œ€๋ฅผ ๋งˆ์ฃผํ•  ์ˆ˜ ์žˆ๋„๋ก ํ˜‘์ƒ์˜ ๊ธฐํšŒ๋ฅผ ์ œ๊ณต ํ•œ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๋ชจ๋‘์—๊ฒŒ ๊ณต์ •ํ•˜๊ณ , ๋ณ€ํ™”ํ•˜๋Š” ํ™˜๊ฒฝ์— ๋งž๋Š” ํ†ต์ƒ ๊ทœ๋ฒ”๊ณผ ์ •์ฑ…๋“ค์ด ํ™•๋ฆฝ๋˜๊ธฐ๋ฅผ ๊ธฐ๋Œ€ํ•ด ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ ๋””์ง€ํ„ธ ๊ฒฝ์ œ ๋ฐ ํ†ต์ƒ์œผ๋กœ์˜ ์ „ํ™˜์— ์žˆ์–ด์„œ๋„ ๊ตญ์ œ์  ํ˜‘๋ ฅ์ด ์ ˆ์‹คํžˆ ํ•„์š”ํ•˜๋‹ค. ๊ธฐ์กด์˜ ์•„๋‚ ๋กœ๊ทธ ์‹œ๋Œ€์—์„œ๋Š” ์œ ํ˜•(tangible)์˜ ์žฌํ™” ๋ฐ ์„œ๋น„์Šค๋ฅผ ์ˆ˜๋™์ ์ด๋ฉฐ ๋ฌผ๋ฆฌ์ ์œผ๋กœ ๊ฑฐ๋ž˜ํ–ˆ๋‹ค๋ฉด, ํ˜„์žฌ์˜ ๋””์ง€ํ„ธํ™” ๋œ ์‹œ๋Œ€์—์„œ๋Š” ๋ฌดํ˜•(intangible)์˜ ์žฌํ™” ๋ฐ ์„œ๋น„์Šค๋ฅผ ์ž๋™์œผ๋กœ ๊ทธ๋ฆฌ๊ณ  ์›๊ฒฉ์œผ๋กœ ๊ฑฐ๋ž˜ํ•˜๊ณ  ์žˆ๋‹ค. ์žฌํ™” ๋ฐ ์„œ๋น„์Šค๊ฐ€ ๋””์ง€ํ„ธํ™” ๋˜๊ณ  ์ „์ž์ ์œผ๋กœ ์ „์†ก์ด ๊ฐ€๋Šฅํ•ด์ง€๋ฉด์„œ ๊ตญ์ œ ๊ฒฝ์ œ ๋ฐ ํ†ต์ƒ ํ™˜๊ฒฝ์— ํฐ ๋ณ€ํ™”๋ฅผ ๊ฐ€์ ธ์˜ค๊ณ  ์žˆ์„ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ด๋ฅผ ๋‘˜๋Ÿฌ์‹ธ๊ณ  ์žˆ๋Š” ๊ทœ๋ฒ”๊ณผ ์ •์ฑ…์—๋„ ๋ง‰๋Œ€ํ•œ ์˜ํ–ฅ์„ ๋ฏธ์น˜๊ณ  ์žˆ๋‹ค. ํ˜„์žฌ OECD์—์„œ๋Š” ๋””์ง€ํ„ธ ๊ฒฝ์ œ ๋ฐ ํ†ต์ƒ ํ™˜๊ฒฝ์„ ํšจ๊ณผ์ ์œผ๋กœ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ์ค‘์š”ํ•˜๋ฉด์„œ๋„ ์‹œ์˜ ์ ์ ˆํ•œ ์ด์Šˆ๋ฅผ ๋‹ค๋ฃจ๊ณ  ์žˆ๋Š”๋ฐ ๊ทธ ์ค‘์˜ ํ•˜๋‚˜๊ฐ€ ๋ฐ”๋กœ ๋””์ง€ํ„ธ ๊ฒฝ์ œ ๋ฐ ํ†ต์ƒ์— ๋Œ€ํ•œ ๊ณผ์„ธ, ์ฆ‰ โ€˜๋””์ง€ํ„ธ์„ธ (Digitl Tax)โ€™์— ๋Œ€ํ•œ ๊ตญ์ œ์  ํ˜‘์ƒ์ด๋‹ค. 2013๋…„๋ถ€ํ„ฐ OECD๋Š” ๋””์ง€ํ„ธ ์‹œ๋Œ€์— ๋งž๋Š” ๊ตญ์ œ์กฐ์„ธ์ฒด๊ณ„์˜ ๋„์ž…์ด ๋ถˆ๊ฐ€ํ”ผ ํ•˜๋‹ค๋Š” ๊ณต๋™์˜ ์˜๊ฒฌ์„ ๋ฐ”ํƒ•์œผ๋กœ ํฌ๊ด„์  ์ดํ–‰์ฒด๊ณ„ (Inclusive Framework)์— ์ฐฉ์ˆ˜ํ•˜์˜€๋‹ค. ๋‹ค๊ตญ์  ๊ธฐ์—…์˜ ์„ธ์› ์ž ์‹์„ ํ†ตํ•œ ์กฐ์„ธ ํšŒํ”ผ๋ฅผ ๋ฐฉ์ง€(BEPS)ํ•˜๊ธฐ ์œ„ํ•ด G20 ๋ฐ ์„ธ๊ณ„ 139๊ฐœ๊ตญ๊ณผ ํ˜‘์˜ ์ค‘์ด์ง€๋งŒ ํ˜‘์ƒ์— ์ง„์ „์ด ๋”๋ŽŒ ์ผ๋ฐฉ์  ํ˜น์€ ๋‹จ๋…์ (unilateral) ๋””์ง€ํ„ธ์„ธ ๋„์ž…์„ ์ถ”์ง„ํ•˜๋ ค๋Š” ์›€์ง์ž„์ด ์ผ์–ด๋‚˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ํ๋ฆ„ ๊ฐ€์šด๋ฐ, ๋””์ง€ํ„ธ์„ธ์— ๋Œ€ํ•œ ์‹œ์˜์ ์ ˆ ํ•œ ์—ฐ๊ตฌ์˜ ํ•„์š”์„ฑ์ด ์žˆ์–ด ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ฒซ์งธ, ๋””์ง€ํ„ธ ๊ฒฝ์ œ ๋ฐ ํ†ต์ƒ์— ๋Œ€ํ•œ ์—ฌ๋Ÿฌ ์ธก๋ฉด๋“ค์„ ์†Œ๊ฐœํ•˜๊ณ , ๋‘˜์งธ, ๋””์ง€ํ„ธ ์‹œ๋Œ€์— ๊ฑธ๋งž๋Š” ํ†ตํ•ฉ ๊ตญ์ œ์กฐ์„ธ์ฒด๊ณ„์˜ ๊ฐœํŽธ ๋ฐ ์ˆ˜๋ฆฝ์„ ์œ„ํ•œ ๋…ธ๋ ฅ๋“ค์„ ์‚ดํŽด๋ณผ ๊ฒƒ์ด๋ฉฐ, ์…‹์งธ, ํ•ฉ์˜ ์—†์ด ์ผ๋ฐฉ์  ํ˜น์€ ๋‹จ๋…์ ์œผ๋กœ ๋””์ง€ํ„ธ์„ธ๋ฅผ ๋ถ€๊ณผํ•˜๋Š” ํ–‰์œ„์˜ ์ž ์žฌ์  WTO ํ˜‘์ • ์ €์ด‰์„ฑ์— ๋Œ€ํ•ด ๋ถ„์„ํ•ด ๋ณผ ๊ฒƒ์ด๋‹ค. ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ๊ตญ์ œ๊ธฐ๊ตฌ์™€ ๊ตญ์ œ์‚ฌํšŒ๊ฐ€ ๋””์ง€ํ„ธ ์‹œ๋Œ€๋ฅผ ์œ„๊ธฐ๊ฐ€ ์•„๋‹Œ ๊ธฐํšŒ๋กœ ๋งž์ดํ•˜๊ธฐ ์œ„ํ•ด ์–ด๋– ํ•œ ๋…ธ๋ ฅ๊ณผ ํ˜‘์˜๊ฐ€ ํ•„์š”ํ•œ์ง€์— ๋Œ€ํ•œ ์‹œ์‚ฌ์ ์„ ๋„์ถœํ•  ๊ฒƒ์ด๋‹ค.Chapter 1. Introduction 1 1.1 Background and Purpose of Study 1 Chapter 2. Digital Economy and Trade 3 2.1 Dimensions of the Digital Economy and Trade 3 2.1.1 Definitions 3 2.1.2 Scope 5 2.1.3 Business models 7 2.1.4 Trends 9 2.2 International Agreements on Digital Trade 11 2.2.1 Moratorium on Customs Duties on Electronic Transmissions 13 2.2.2 GATS 15 2.2.3 Preferential Trade Agreements 17 Chapter 3. Taxation on Digital Trade 22 3.1 Background and Scope of Digital Tax 22 3.2 Types of Digital Tax 25 3.2.1 Indirect Tax 25 3.2.2 Direct Tax 28 3.2.3 Expansion of PE 30 3.3 Actions on Digital Tax 31 3.3.1 OECD 32 3.3.2 EU 36 3.3.3 Individual Countries 38 3.3.4 US 42 Chapter 4. Digital Tax Non-compliance with GATS 46 4.1 National Treatment Under GATS 47 4.1.1 National Treatment Obligations and Applicability 48 4.1.1.1 Obligations: Specific Commitments in the Schedule 48 4.1.1.2 Applicability I: Technological Neutrality 50 4.1.1.3 Applicability II: Measure Affecting Services Trade 52 4.1.2 Like Services and Suppliers 54 4.1.3 Less Favorable Treatment 58 4.2 General Exceptions 63 4.2.1 GATS Article XIV(a): Protection of Public Morals and Order 64 4.2.2 GATS Article XIV(c): Compliance with Laws and Regulations 65 4.2.3 GATS Article XIV(d): Effective Imposition of Direct Taxes 66 4.2.4 GATS Article XIV(e): Avoidance of Double Taxation 67 4.2.5 GATS Article XIV Chapeau 68 Chapter 5. Implications 72 5.1 Modification in WTO Trade Agreements 72 5.2 Cooperation among International Organizations 74 5.3 Coordination among International Societies 75 Chapter 6. Conclusion 79 References 81 ๊ตญ๋ฌธ์ดˆ๋ก 89์„

    Cybersecurity and Liability in a Big Data World

    Get PDF
    The interplay between big data and cloud computing is at the same time undoubtedly promising, challenging and puzzling. The current technological landscape is not without paradoxes and risks, which under certain circumstances may raise liability issues for market operators. In this article we illustrate the several challenges in terms of security and resilience that market operators face as their overcoming is of strategic importance for businesses wishing to be deemed privacy-respectful and reliable market actors. After a brief overview of the potentialities and drawbacks deriving from the combination of big data and cloud computing, this article illustrates the challenges and the obligations imposed by the European institutions on providers processing personal data โ€“ pursuant to the General Data Protection Regulation โ€“ and on providers of digital services and essential services โ€“ according to the NIS Directive. We also survey the European institutionsโ€™ push towards the development and adoption of codes of conduct, standards and certificates, as well as their last proposal for a new Cybersecurity Act. We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use โ€œcontractual shieldsโ€ and escape liability
    • โ€ฆ
    corecore