全球竞争格局下的中国特色数据跨境流动治理方案研究

许皖秀, 左晓栋

中国工程科学 ›› 2025, Vol. 27 ›› Issue (1) : 111-121.

PDF(651 KB)
PDF(651 KB)
中国工程科学 ›› 2025, Vol. 27 ›› Issue (1) : 111-121. DOI: 10.15302/J-SSCAE-2024.12.007
国家数据空间发展战略研究

全球竞争格局下的中国特色数据跨境流动治理方案研究

作者信息 +

China's Approach to Cross-Border Data Flow Governance in the Context of Global Competition

Author information +
History +

摘要

当前,围绕数据跨境流动为中心的数字权力博弈进入白热化阶段,全球竞争格局已初步形成。我国高度关注数据跨境流动安全治理,在经历迭代优化后,目前已形成独具特色的平衡数据安全与发展的治理模式,这将为破解全球数据治理难题提供中国方案。本文剖析了实现数据跨境安全可信流通面临的多重挑战,从国际组织、经贸协定、主要经济体三个维度解构了现有的全球数据跨境流动治理竞争格局,对我国平衡数据安全与发展的治理方案进行全局性的考察。这一方案以总体国家安全观为理论根本,以“统筹安全与发展”为政策目标,以安全可信流通为评判基准,体现出浓厚的中国特色与创新色彩,并服务于维护国家安全、促进数字贸易、扩大对外开放等战略目标。在此基础上,本研究从全球视域出发,提出我国治理方案的后续完善对策,包括优化治理理念、推动国际合作、突出技术治理、强化人才培养、开展国际宣贯等。

Abstract

Currently, the digital power struggle centered around cross-border data flows has entered a critical phase, with the global competition landscape taking shape. China places high importance on the security governance of cross-border data flows and, after several iterations and optimizations, has developed a unique governance model that balances data security and development. This model offers a Chinese solution to the global data governance challenge. This study analyzes the multiple challenges in achieving secure and trusted cross-border data circulation, deconstructing the existing global governance competition from three perspectives: international organizations, trade agreements, and major economies. It provides a comprehensive examination of China's governance model that balances data security and development. Grounded in the overall national security concept, this model aims to "coordinate security and development", with secure and trusted data circulation as the evaluation benchmark. It reflects strong Chinese characteristics and innovative elements, supporting strategic goals such as national security, digital trade promotion, and expanding opening-up. Based on this, the study offers policy recommendations for the further enhancement of China's governance framework from a global perspective. These recommendations focus on optimizing governance principles, fostering international cooperation, prioritizing technological governance, strengthening talent development, and advancing international advocacy initiatives.

关键词

全球数据博弈 / 数据跨境流动治理 / 数据安全 / 数字贸易 / 中国方案

Keywords

global data competition / cross-border data flow governance / data security / digital trade / Chinese solution

引用本文

导出引用
许皖秀, 左晓栋. 全球竞争格局下的中国特色数据跨境流动治理方案研究. 中国工程科学. 2025, 27(1): 111-121 https://doi.org/10.15302/J-SSCAE-2024.12.007

参考文献

[1]
Manyika J, Lund S, Bughin J, et al. Digital globalization: The new era of global flows [EB/OL].(2016-02-24)[2024-11-25]. https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/digital-globalization-the-new-era-of-global-flows.
[2]
Burri M. Cross-border data flows and privacy in global trade law: Has trade trumped data protection? [J]. Oxford Review of Economic Policy, 2023, 39(1): 85‒97.
[3]
茶洪旺, 付伟, 郑婷婷. 数据跨境流动政策的国际比较与反思 [J]. 电子政务, 2019 (5): 123‒129.
Cha H W, Fu W, Zheng T T. International comparison and reflection on cross-border data flow policies [J]. E-Government, 2019 (5): 123‒129.
[4]
陈兵, 徐文. 数据跨境流动的治理体系建构 [J]. 中国特色社会主义研究, 2021, 12(4): 67‒75.
Chen B, Xu W. Establishing a governance system of the flow of data across borders [J]. Studies on Socialism with Chinese Characteristics, 2021, 12(4): 67‒75.
[5]
单文华, 邓娜. 欧美跨境数据流动规制: 冲突、协调与借鉴——基于欧盟法院"隐私盾"无效案的考察 [J]. 西安交通大学学报(社会科学版), 2021, 41(5): 94‒103.
Shan W H, Deng N. Conflict, coordination and reference of transborder data flow regulation between the EU and the U.S.: Comment on the "schremsⅱ" of CJEU [J]. Journal of Xi'an Jiaotong University (Social Sciences), 2021, 41(5): 94‒103.
[6]
冯硕. 美国数据霸权的建构与法律应对 [J]. 太平洋学报, 2023, 31(8): 45‒58.
Feng S. Construction of the U.S. data hegemony and China's legal responses [J]. Pacific Journal, 2023, 31(8): 45‒58.
[7]
O'Hara K, Hall W. Four internets: Data, geopolitics, and the governance of cyberspace [M]. Oxford: Oxford University Press, 2021.
[8]
Timasheff N S. The basic concepts of sociology [J]. American Journal of Sociology, 1952, 58(2): 176‒186.
[9]
Cory N, Dascoli L. How barriers to cross-border data flows are spreading globally, what they cost, and how to address them [EB/OL].(2021-07-19)[2024-11-25]. https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/.
[10]
孙宝云, 李艳, 齐巍. 网络安全影响政治安全的微观分析——以"剑桥分析"事件为例 [J]. 保密科学技术, 2020 (4): 27‒34.
Sun B Y, Li Y, Qi W. Micro-analysis on the influence of network security on political security—Taking "Cambridge analysis" as an example [J]. Secrecy Science and Technology, 2020 (4): 27‒34.
[11]
University D, Li W, Leung A, et al. Where is IT in information security? the interrelationship among IT investment, security awareness, and data breaches [J]. MIS Quarterly, 2023, 47(1): 317‒342.
[12]
Apple. Report: 2.6 billion personal records compromised by data breaches in past two years—Underscoring need for end‑to‑end encryption [EB/OL]. (2023-12-07)[2024-11-25]. https://www.apple.com/newsroom/2023/12/report-2-point-6-billion-records-compromised-by-data-breaches-in-past-two-years/.
[13]
Perez C. Technological revolutions and techno-economic paradigms [J]. Cambridge Journal of Economics, 2010, 34(1): 185‒202.
[14]
陈兵. 数字企业数据跨境流动合规治理法治化进路 [J]. 法治研究, 2023, 146(2): 34‒44.
Chen B. The legal approach to compliance governance of cross border data flow in digital enterprises [J]. Rearch on Rule of Law, 2023, 146(2): 34‒44.
[15]
World Economic Forum. Agile governance: Reimagining policy‐making in the Fourth Industrial Revolution [R]. Davos Kloster: World Economic Forum, 2018.
[16]
Kobrin S J. Territoriality and the governance of cyberspace [J]. Journal of International Business Studies, 2001, 32(4): 687‒704.
[17]
Mayne A J, Collingridge D. The social control of technology [J]. The Journal of the Operational Research Society, 1982, 33(8): 771.
[18]
中国信息通信研究院. 全球数字经贸规则年度观察报告(2024年) [EB/OL]. (2024-09)[2024-11-25]. https://www.caict.ac.cn/kxyj/qwfb/bps/202409/P020241212359348707348.pdf.
China Academy of Information and Communications Technology. Annual observation report on global digital economic and trade rules (2024) [EB/OL]. (2024-09)[2024-11-25]. https://www.caict.ac.cn/kxyj/qwfb/bps/202409/P020241212359348707348.pdf.
[19]
薛志华, 曾德华, 孟奇勋. 日本跨境数据流动监管的制度实践及中日合作展望 [J]. 国际贸易, 2024 (6): 24‒31.
Xue Z H, Zeng D H, Meng Q X. Institutional practice of cross-border data flows regulation in Japan and prospects for Sino-Japanese cooperation [J]. Intertrade, 2024 (6): 24‒31.
[20]
范婴. 印度数据本地化的范式评述及其对中国的启示 [J]. 中国科学院院刊, 2023, 38(8): 1177‒1186.
Fan Y. Paradigm review of data localization in India and its implications for China [J]. Bulletin of Chinese Academy of Sciences, 2023, 38(8): 1177‒1186.
[21]
王超. 数据安全视角下国际数据跨境流动模式分析 [J]. 保密科学技术, 2023 (1): 14‒19.
Wang C. Analysis of international data cross-border flow mode from the perspective of data security [J]. Secrecy Science and Technology, 2023 (1): 14‒19.
[22]
Xu W X, Wang S, Zuo X D. Global data governance at a turning point? Rethinking China‒U.S. cross-border data flow regulatory models [J]. Computer Law & Security Review, 2024, 55: 106061.
[23]
刘跃进. 非传统的总体国家安全观 [J]. 国际安全研究, 2014, 32(6): 3‒25, 151.
Liu Y J. Non-traditional concept of overall national security [J]. Journal of International Security Studies, 2014, 32(6): 3‒25, 151.
[24]
许皖秀, 左晓栋. 关于借鉴欧盟政策加强个人信息跨境传输安全认证制度建设的建议 [J]. 网络安全与数据治理, 2022, 41(12): 40‒44.
Xu W X, Zuo X D. Suggestions on learning from EU policies to strengthen cross-border transfer of personal information for the construction of a security certification system [J]. Cyber Security and Data Governance, 2022, 41(12): 40‒44.
[25]
梅傲, 陈子文. 总体国家安全观视域下我国数据安全监管的制度构建 [J]. 电子政务, 2023 (11): 104‒115.
Mei A, Chen Z W. System construction of data security supervision in China from the perspective of overall national security concept [J]. E-Government, 2023 (11): 104‒115.
[26]
洪延青. 国家安全视野中的数据分类分级保护 [J]. 中国法律评论, 2021 (5): 71‒78.
Hong Y Q. Data classification and hierarchical protection in the vision of national security [J]. China Law Review, 2021 (5): 71‒78.
[27]
左晓栋. 我国数据安全法治治理体系建设的回顾与展望 [J]. 国家治理, 2023 (23): 32‒37.
Zuo X D. Review and prospect of the construction of data security governance system by law in China [J]. Governance, 2023 (23): 32‒37.
基金
中国工程院咨询项目“关于统筹数据发展和安全的治理规则和策略研究”(2023-XBZD-20); 国家社科基金项目(23&ZD335)
PDF(651 KB)

Accesses

Citation

Detail

段落导航
相关文章

/