scholarly journals Baseline study of cross-border data exchange in the Nordic and Baltic countries

2021 ◽  
Author(s):  
Anne Dahl ◽  
Reetta Mattila ◽  
Linda Olkkonen ◽  
Heikki Saarinen ◽  
Torbjörn Sandell ◽  
...  
Author(s):  
Mike Surridge ◽  
Ken Meacham ◽  
Juri Papay ◽  
Stephen C. Phillips ◽  
J. Brian Pickering ◽  
...  

2018 ◽  
Vol 1 (102) ◽  
pp. 305
Author(s):  
Rosario Serra Cristóbal

Resumen:La gestión coordinada de las fronteras y el funcionamiento eficaz de los sistemas de tratamiento de datos de circulación de personas pueden servir como mecanismo de alerta temprana frente al riesgo de ataques terroristas. Puede fortalecer la capacidad colectiva de los Estados para detectar, prevenir y combatir el terrorismo al facilitar el intercambio oportuno de información, permitiendo así adoptar de forma responsable decisiones cruciales.Este trabajo analiza los concretos instrumentos de gestión de datos en fronteras que pueden ser útiles en la lucha antiterrorista, porque el primer paso en inteligencia reside en la obtención de información, que luego será analizada y tratada para convertir esa información en conocimiento. Como tendremos oportunidad de comprobar, muchas de las bases de datos en fronteras se crearon para controlar la entrada de inmigrantes en las fronteras europeas, pero la información que ofrecen dichos sistemas puede servir también para luchar contra ese reto que nos amenaza, el del terrorismo yihadista. No obstante, este trabajo subraya que se trata de fenómenos distintos.Es cierto que la nueva oleada de ataques yihadistas ha coincidido, en el mismo espacio temporal, con la mayor crisis migratoria a la que se ha tenido que enfrentar Europa debido a crisis humanitarias y posteriormente a la guerra de Siria u otros conflictos. Pero, no son lo mismo. El terrorismo yihadista y la inmigración poco o nada tienen que ver, por mucho que se hayan querido vincular o se hayan pretendido justificar determinadas políticas contra la inmigración como algo necesario para luchar contra el terrorismo yihadista, con el fácil argumento de que frenando la inmigración se evita la entrada de potenciales terroristas en Europa.El trabajo advierte del riesgo de que la lucha contra el terrorismo sea utilizada para reforzar los controles de personas en las fronteras con el verdadero objetivo de frenar los flujos migratorios. Al tiempo, subraya la necesidad de que en dichos controles se sigan directrices y prácticas claras y se respeten plenamente las obligaciones que los Estados tienen de conformidad con el Derecho internacional, tal como ha recordado el Tribunal Europeo de Derechos Humanos y el Tribunal de Justicia de la Unión Europea. De hecho, no son pocos los casos en los que estos Tribunales han subrayado la relevancia indubitada de principios como la reserva de ley, la necesidad o la proporcionalidad como sustrato de la licitud de muchas medidas que incluyen el tratamiento de datos personales.Summary:1. Jihadist terrorism as a cross-border phenomenon. 2. The benefit of data exchange on crossing-borders in the Schengen area. 3. New guidelines on data processing and the safeguard of national security. 4. The register of passengers (The Personal Name Record or PNR). 5. When the data cross the external borders. The exchange of data with third countries. 5.1. The failed PNR Agreement with Canada and the EU Court of Justice’s standards regarding the transfer of passengers’ data. 5.2. The exchange of data with the United States. The EU-US Umbrella Agreement and the Privacy Shield. 6. The use of profiles and blacklists of alleged terrorists in cross-bording. 7. ConclusionsAbstract:EU Coordinated border management and effective functioning of data processing systems related to the movement of persons may serve as an early warning mechanism against the risk of terrorist attacks. It can strengthen the collective capacity of States to detect, prevent and combat terrorism by facilitating the timely exchange of information, thereby enabling crucial decisions to be adopted in a responsible manner.This paper analyzes the concrete border data management tools that can be useful in the fight against terrorism. The first step in intelligence lies in obtaining information, which will then be analyzed and treated to turn that information into useful knowledge. As we will have an opportunity to verify, numerous border databases were created to control the entry of immigrants into European borders, but the information offered by these systems can also serve to fight against this challenge that threatens us, that of jihadist terrorism.Nevertheless, we emphasize that terrorism and immigration are different phenomena. The truth is that the new wave of Jihadist attacks took place along the largest migratory crisis that Europe faced due to different humanitarian crises and to the war in Syria and other conflicts. But they represent different realities. Jihadist terrorism and immigration have little or nothing in common. In spite of this, many wish to link both with a view to justify certain anti-immigration policies as necessary actions for coping with Jihadist terrorism. This has been done based on a simple narrative: holding back immigration prevents the entry of potential terrorists in Europe.This paper shows that the risk that the fight against terrorism will be used as a basis to reinforce people controls at the borders, while the true objective of these measures is to curb migratory flows. At the same time, it underlines the need for clear guidelines and practices to be followed when implementing such controls. It also vindicates the need for States to observe their obligations laid down by international law, as recalled by the European Court of Human Rights and the EU Court of the Justice. In fact, in many cases, these jurisdictions highlighted the undoubted relevance of the statutory reserve principle, the principle of necessity or the principle of proportionality, as legal basis for the adoption of measures that include personal data processing.


2018 ◽  
Vol 19 (5) ◽  
pp. 1251-1267 ◽  
Author(s):  
Els De Busser

AbstractCriminal offenses with the most different modi operandi and levels of complexity can generate digital evidence, whether or not the actual crime is committed by using information and communication technology (ICT). The digital data that could be used as evidence in a later criminal prosecution is mostly in the hands of private companies who provide services on the Internet. These companies often store their customers’ data on cloud servers that are not necessarily located in the same jurisdiction as the company. Law enforcement and prosecution authorities then need to take two steps that are not exclusive for evidence of a digital nature. First, they need to discover where the data is located—with which company and in which jurisdiction. Second, they need to obtain the data. In considering digital evidence, the last step, however, is complicated by new issues that form the focus of this paper. The first concern is the practice by companies to dynamically distribute data over globally spread data centers in the blink of an eye. This is a practical concern as well as a legal concern. The second issue is the slowness of the currently applicable international legal framework that has not yet been updated to a fast-paced society where increasingly more evidence is of a digital nature. The slowness of traditional mutual legal assistance may be no news. The lack of a suitable legal framework for competent authorities that need to obtain digital evidence in a cross-border manner, nonetheless, creates a landscape of diverse initiatives by individual states that try to remedy this situation. A third issue is the position that companies are put in by the new EU proposal to build a legal framework governing production orders for digital evidence. With companies in the driver's seat of a cross-border evidence gathering operation, guarantees of the traditional mutual legal assistance framework seem to be dropped. A fourth issue is the position of data protection safeguards. US based companies make for significant data suppliers for criminal investigations conducted by EU based authorities. Conflicting legal regimes affect the efficiency of data transfers as well as the protection of personal data to citizens.


2000 ◽  
Vol 21 (3-4) ◽  
pp. 97-99 ◽  
Author(s):  
Christian Dierks

In some legal surroundings telepathology is considered a breach of registrational barriers. The recommendation of the G 8 states in Europe for required legislation in telemedicine suggests to recognise that the localization of the remote health care professional defines the site not only of licensure but also of liability. This approach must be considered helpful, since it can solve many problems brought about by the doubtful results of private international law and conventions like the European Union (EU) and Lugano Convention. Under today's conditions in private international law it must be considered essential to agree upon a choice of law and stipulate a court of jurisdiction when doing telepathology. However, the opposing aims of insuring the patients claims and avoiding jurisdictions that exceed the local expectations of the medical professional must be reconciled. Data protection and data security are other crucial topics that require attention. Generally speaking, the principles of minimum data exchange, anonymity, pseudonymity and cryptography must be established as a basis for all telepathology procedures. Only when personal data is needed, its use can be legitimated. Written consent of the patient is advised. To guarantee a cross‐border security level the regulations of the EU‐Data Protection Directive need to be transformed into national law. In practise, cross‐border dataflow shall only take place where the security level can be maintained even within the other country. Finally, reimbursement questions must be answered to establish a sound economical basis for telepathology. The spatial distance between the participants may yield the question, whether the service has been rendered to an extent necessary and sufficient for reimbursement. If reimbursement takes place on a cross‐border or cross‐regional level, severe disturbances of the health systems can occur. Regulation schemes or treaties need therefore to be developed to avoid such disturbances and encompass mutual standards of care as well as methods to balance reimbursement.


Author(s):  
Jannik Schaaf ◽  
James Chalmers ◽  
Heymut Omran ◽  
Petra Pennekamp ◽  
Olivier Sitbon ◽  
...  

Rare lung diseases affect 1.5–3 million people in Europe while causing bad prognosis or early deaths for patients. The European Reference Network for Respiratory Diseases (ERN-Lung) is a patient centric network, funded by the European Union (EU). The aims of ERN-LUNG is to increase healthcare and research regarding rare respiratory diseases. An initial need for cross-border healthcare and research is the use of registries and databases. A typical problem in registries for RDs is the data exchange, since the registries use different kind of data with different types or descriptions. Therefore, ERN-Lung decided to create a new Registry Data-Warehouse (RDW) where different existing registries are connected to enable cross-border healthcare within ERN-Lung. This work facilitates the aims, conception and implementation for the RDW, while considering a semantic interoperability approach. We created a common dataset (CDS) to have a common descriptions of respiratory diseases patients within the ERN registries. We further developed the RDW based on Open Source Registry System for Rare Diseases (OSSE), which includes a Metadata Repository with the Samply.MDR to unique describe data for the minimal dataset. Within the RDW, data from existing registries is not stored in a central database. The RDW uses the approach of the “Decentral Search” and can send requests to the connected registries, whereas only aggregated data is returned about how many patients with specific characteristics are available. However, further work is needed to connect the different existing registries to the RDW and to perform first studies.


Significance The United States has stationed 600 paratroopers in the Baltic countries and will defend their airspace for the duration of the Zapad-2017 exercise in a bid to reassure NATO allies of Washington’s commitment to their security. Longer term, Washington's European Deterrence Initiative (EDI) is paying for a forward presence of additional US forces in Europe, construction of additional infrastructure and upgrades to existing facilities. Impacts The US military will seek to conclude detailed hosting agreements with Eastern European NATO countries. Poland and South Korea are likely candidates for an expanded permanent US forward presence. Repeated US congressional budget standoffs will worry allies awaiting longer-term infrastructure projects. Stationing US tactical nuclear weapons on NATO’s eastern borders would be more provocative to Moscow than EDI-funded rotations. Replacing incompatible cross-border railway gauges between the Baltic states and Poland will take over a decade.


2019 ◽  
Vol 26 (2) ◽  
pp. 1321-1332 ◽  
Author(s):  
Goce Gavrilov ◽  
Elena Vlahu-Gjorgievska ◽  
Vladimir Trajkovik

The free movement of European citizens across member states of the European Union adds an important level of complexity to strategic efforts of health interoperability. The use of electronic health data has been marked as an important strategic activity and policy to improve healthcare in European countries. Cross-border healthcare depends on the ability to set up shared practices with respect to patient data exchange across the countries. Data flow must comply with demanding security, legal and interoperability requirements, as defined by the European Patients Smart Open Services project specifications. The aim of this article is to propose a novel design of healthcare data warehouse based on the restructured Extract–Transform–Load process. We describe a portal framework that offers a comprehensive set of interoperability services to enable national e-Health platforms to set up cross-border health information networks compliant with European Patients Smart Open Services. The presented approach incorporates the technical and organizational interoperability by interconnecting Health Level Seven standard and Open National Contact Points framework in order to provide a modular, scalable and inter-operating architecture.


2021 ◽  
pp. 263168462110355
Author(s):  
Yann Duval ◽  
Simon Hardy

The Framework Agreement on Facilitation of Cross-Border Paperless Trade in Asia and the Pacific entered into force in February 2021. While economic benefits associated with paperless trade facilitation are well known, little attention has been paid to measuring the potential environmental benefits. Accordingly, this article sets out to quantify the amount of greenhouse gas emissions that could be saved if all trade-related paper documents in the region are ultimately replaced by digital documents and data exchange, as foreseen in the regional framework agreement. This is carried out by combining detailed descriptions of trade transactions, data on trading volumes and relevant emission factors. Even with conservative assumptions, the emissions saved by fully digitalising a single end-to-end trade transaction are equivalent to planting 1.5 trees. For the Asia-Pacific, this implies savings of about 13 million tons of CO2e annually, equivalent to the carbon absorbed by 400 million trees. The results are driven by efficiency gains from handling data digitally rather than by the direct savings of paper and ink. JEL Classification: F18, H83, Q56


Sign in / Sign up

Export Citation Format

Share Document