409 Items

Photo of the inside of a computer is seen on Feb 23, 2019, in Jersey City, N.J.

(AP Photo/Jenny Kane, File)

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Geopolitics of Digital Standards

| July 2022

This brief outlines what digital standards are and how the United States, European Union, and China approach standards development. It examines the implications of China’s efforts to advance a new model of cyber sovereignty through its “New IP” proposal to illustrate that overhauls of existing infrastructure-level standards are unlikely, but foreshadow the changing nature of standards from a historically apolitical domain to one of geopolitical importance. Finally, it offers considerations for the development of a long-term strategy that focuses on technology areas of strategic interest to the U.S. at the application layer through targeted regulations that promote a free, open, and democratic internet while maintaining a clear and technically informed understanding of what is likely to change (and what is not) at the infrastructure level.

Map with various borders

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Soberanía y localización de datos

    Author:
  • Emily Wu
| Original publication July 2021; translated 2022

Spanish translation (2022) of original English version of "Sovereignty and Data Localization" paper by Emily Wu.  

Las políticas sobre localización de datos les imponen a las empresas la obligación de almacenar y procesar los datos de manera local, en lugar de utilizar servidores ubicados fuera del país. La adopción de leyes sobre localización de datos ha venido aumentando, impulsada por el temor a que la soberanía de los países se vea amenazada debido a su incapacidad para ejercer pleno control sobre la información que almacenan fuera de sus fronteras. Este es un tema particularmente relevante para los Estados Unidos, si tenemos en cuenta su dominio en múltiples áreas del ecosistema digital, entre otras, la inteligencia artificial (IA) y la computación en la nube.

A lock on top of a keyboard and credit cards

Towfiqu Barbhuiya

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Preemption in Federal Data Security and Privacy Legislation

    Authors:
  • Tatyana Bolton
  • Brandon Pugh
  • Sofia Lesmes
  • Cory Simpson
| June 14, 2022

The Belfer Center's Cyber Project and the R Street Institute's Cybersecurity and Emerging Threats Team have been working together to identify roadblocks to a federal data security and privacy law, drawing upon research and engagement with stakeholders to identify and recommend appropriate courses of action to find compromise on federal legislation. Ongoing research also includes topics like civil rights in privacy, arbitration and covered entities and data.

Federal Trade Commission building

Ian Hutchinson

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Role of the Federal Trade Commission in Federal Data Security and Privacy Legislation

    Authors:
  • Tatyana Bolton
  • Brandon Pugh
  • Sofia Lesmes
  • Cory Simpson
| June 14, 2022

The FTC already enforces some privacy legislation and seeks to expand on its role in data privacy. As federal data and privacy bills are considered, it is therefore critical that we understand the role the FTC might play in overseeing and enforcing such legislation as well as the important role that lawmakers will have in setting parameters for the FTC.

Hands holding a smart phone.

Freestocks

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Limiting a Private Right of Action in Federal Data Security and Privacy Legislation

    Authors:
  • Tatyana Bolton
  • Brandon Pugh
  • Sofia Lesmes
  • Cory Simpson
| June 14, 2022

Congress’s decision regarding who they choose to empower—be it individuals, state attorneys general, one or more federal agencies, or a combination thereof—will dictate the true shape of the law, once passed. If individuals are empowered with an enforcement role—that is, if a private right of action (PRA) is established—it is important to outline the structure, procedures and limits to craft a fair and functional law.

Blue lights connected against a black background

Conny Schneider

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Answers to Tough Questions: the Framework of a Federal Data Security & Privacy Law

    Authors:
  • Tatyana Bolton
  • Brandon Pugh
  • Sofia Lesmes
  • Cory Simpson
| June 14, 2022

This one-pager is an overview and precursor to a series of policy recommendations for a federal data privacy and security law, which answer and expand on the concepts of preemption, private right of action, and the role of the FTC.

Close-up of the inside of a computer.

AP Photo/Jenny Kane

Analysis & Opinions - War on the Rocks

Building a Regional, Right of Boom Cyber Defense Network

| June 07, 2022

The invasion of Ukraine thrust the Cybersecurity and Infrastructure Security Agency into public consciousness as the nation’s key cyber security risk advisor during a time of heightened risk. Congress recently passed legislation requiring critical infrastructure operators to notify the agency of security breaches, bringing it into closer contact with the private sector. This development builds on positive momentum for the agency, following a series of executive orders that expanded its authority and created a specific Joint Cyber Defense Collaborative to share information about threats between the public and private sectors. Nearly four years after its creation, the agency now has more visibility into the risks the country is facing and more resources at its disposal to combat them.

This April 23, 2018, file photo shows the logo for Verizon above a trading post on the floor of the New York Stock Exchange. Verizon is pledging to stop selling information on phone owners' locations to data brokers, stepping back from a business practice that has drawn criticism for endangering privacy, The Associated Press has learned.

(AP Photo/Richard Drew, File)

- Belfer Center for Science and International Affairs, Harvard Kennedy School

Controlling Data Privacy and Security

| Spring 2022

Earlier this year, the Belfer Center’s Cyber Project embarked on an ambitious project, but one we believe is achievable: to get a federal data privacy and security law passed. Such a law will have enormous benefits for consumers, businesses, and national security. In the absence of a federal law,  organizations are still free to collect, hold, process, use, and sell data however they wish.

In collaboration with the R Street Institute’s Cybersecurity and Emerging Threats Team, led by Tatyana Bolton, and Cyberspace Solarium Commission’s Senior Advisor Cory Simpson, the Cyber Project is taking a focused approach to the problem. 

teaser image

- Belfer Center for Science and International Affairs, Harvard Kennedy School

Testimony on China’s Cyber, Energy Plans

| Spring 2022

In February and March, Belfer Center Student Fellow Winnona DeSombre and Environment and Natural Resources Program Director Henry Lee testified before the U.S.-China Economic and Security Review Commission in Washington, D.C. During separate hearings on China’s capabilities and plans related to cyber and to energy, DeSombre and Lee recommended actions Congress should take for the U.S. to remain competitive with China.