ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
Who owns an individual’s electronic communications data, who should have access to it, and what can be done with it? The battle of privacy versus security is currently raging between U.S. technology companies and national security forces. U.S. technology companies are adopting corporate foreign policies to respond to sovereign states’ efforts to access customer data, which could change and possibly even destroy their business models. This article discusses the struggles faced by these companies and the policies influencing the possible outcome, as will be determined in the European Union within the next few years.
8. Conclusion
The next few years will see the resolution of several outstanding court cases and international negotiationsthat will shape the future oftrans-Atlantic data protection, likely setting a global standard. In play are three strategies that U.S. technology companies are currently trying in order to protect their customers’ data from government surveillance. First is ‘encryption-at-design,’ which allows the companies to make encryption a unique selling point of their products and services but is vulnerable to potential laws compelling installation of backdoors. Second is companies’ attempts to safeguard customer data from U.S. court orders and U.S. surveillance by storing EU citizens’ data on servers located in Europe. Third is whether U.S. technology companies can offer watertight data protection to their European customers by allying with European companies that will own and operate the data centers. The success or failure of these strategies will influence the evolution of U.S. technology firms’ corporate foreign policies, likely involving closer collaboration with sovereign states. All parties should move beyond the adversarial and ultimately fruitless debate over privacy versus security, and focus instead on solving the problem of how to prevent criminals and terrorists from using these products and services for destructive ends.