Exploring the Preventive Contribution of Data Localisation Against Information Technology Outages: The CrowdStrike Case
The severe impacts of the CrowdStrike outage on the world economy and national critical services, e.g., banking, healthcare, and airports, invoked the urgent need to decrease governmental dependence on foreign tech companies to store and manage national data. An effective alternative to this approach is data localisation. The latter includes the physical placement of data infrastructure within the state’s territory or imposing ultimate national control over data stored in a server located abroad, along with relevant managing software. The research points out the prominence of data localisation to protect national data, and the functionality of services depending on this data, against technical failures that cause outages. In this endeavour, the research reviews the concepts of territoriality and localisation of cyberspace, along with shedding light on the CrowdStrike outage and explaining its reasons and consequences. Then, it introduces a justification for the validity of data localisation for preventing outages' negative impacts and protecting national data.
© The Author(s) 2024. Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited maintaining attribution to the author(s) and the title of the work, journal citation and URL DOI.
Abdelkarim, Y. A. (2024). Exploring the Preventive Contribution of Data Localisation Against Information Technology Outages: The CrowdStrike Case. Journal of Research, Innovation and Technologies, Volume III, 2(6), 95-107. https://doi.org/10.57017/jorit.v3.2(6).01
[1] Abbas, A. E., van Velzen, T., Ofe, H., van de Kaa, G., Zuiderwijk, A., & de Reuver, M. (2024). Beyond control over data: Conceptualizing data sovereignty from a social contract perspective. Electron Markets, Volume 34, Article No. 20. https://doi.org/10.1007/s12525-024-00695-2
[2] Abdelkarim, Y. A. (2024). Demarcation of Cyberspace: Political and Legal Effects of Applying the Concept of Sovereign States’ Interests. Journal of Digital Technologies and Law, 2 (2), 376–399. https://doi.org/10.21202/jdtl.2024.20
[3] Adonis, A. A. (2023). English School on Cyberspace: Examining the European Digital Sovereignty as an International Society and Standard of Civilization. In: Mazzi, F. (ed.), The 2022 Yearbook of the Digital Governance Research Group, Digital Ethics Lab Yearbook, Springer Nature Switzerland AG. https://doi.org/10.1007/978-3-031-28678-0_7
[4] Baur-Ahrens, A. (2017). The power of cyberspace centralization: Analysing the example of data territorialization. In: Leese, M. and Wittendrop, S. (eds.) Security/Mobility: Politics of Movement, pp. 37-56, Manchester University Press. https://doi.org/10.7228/manchester/9781526107459.003.0003
[5] Center for Information Policy Leadership - CIPL (2023). The “Real Life” Harms of Data Localization Policies, Discussion Paper No. 1. https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl-tls_discussion_paper_paper_i_-_the_real_life_harms_of_data_localization_policies.pdf
[6] Duggal, P. (2019). Data Localization: A Review of Proposed Data Localization in India, with Learnings for the United States. Data Catalyst. https://datacatalyst.org/wp-content/uploads/2020/06/Data-Localization-Pavan-Duggal.pdf
[7] Fang, B. (2018). Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace. Science Press and Springer Nature Singapore Pte Ltd. https://doi.org/10.1007/978-981-13-0320-3
[8] Han, S. (2024). Data and statecraft: Why and how states localize data. Business and Politics, 26, 263–288. https://doi.org/10.1017/bap.2023.41
[9] Hellmeier, M., Pampus, J., Qarawlus, H., & Howar F. (2023). Implementing Data Sovereignty: Requirements & Challenges from Practice, ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, August 29–September 01, 2023, Benevento, Italy, 143, pp. 1-9. https://doi.org/10.1145/3600160.3604995
[10] Hellmeier, M. & von Scherenberg, F. (2023). A Delimitation of Data Sovereignty from Digital and Technological Sovereignty, Thirty-first European Conference on Information Systems (ECIS 2023), Kristiansand, Norway, Research Paper No. 306. https://aisel.aisnet.org/ecis2023_rp/306
[11] Hummel, P., Braun, M., Tretter, M., & Dabrock, P. (2021). Data sovereignty: A review. Big Data & Society. https://doi.org/10.1177/2053951720982012
[12] Injadat, M., Salo, F., & Bou Nassif, A. (2016). Data mining techniques in social media: A survey. Neurocomputing. http://dx.doi.org/10.1016/j.neucom.2016.06.045
[13] Japaridze, T. (2023). Cyber Sovereignty: Should Cyber Borders Replicate Territorial Borders? In: Berghofer J., et al. (eds) The Implications of Emerging Technologies in the Euro-Atlantic Space, Springer Nature Switzerland https://doi.org/10.1007/978-3-031-24673-9_13
[14] Kim, N. S. & Telman D. A. (2015). Internet Giants as Quasi-Governmental Actors and the Limits of Contractual Consent. Missouri Law Review, 80(3), 723-770. https://scholarship.law.missouri.edu/mlr/vol80/iss3/7
[15] Lambach, D. (2020). The Territorialization of Cyberspace. International Studies Review, 22(3), 482–506. https://doi.org/10.1093/isr/viz022
[16] Medine, D. (2024). Data Localization: A “Tax” on the Poor, Center for Global Development Working Paper No. 674. https://www.cgdev.org/sites/default/files/data-localization-tax-poor.pdf
[17] Salamatian, S., Douzet, F., Salamatian, K., & Limonier, K. (2021). The geopolitics behind the routes data travel: A case study of Iran. Journal of Cybersecurity, Volume 7, Issue 1. https://doi.org/10.1093/cybsec/tyab018
[18] Sheppard, L. R., Yayboke, E., & Ramos, C. G. (2021). The Real National Security Concerns over Data Localization. CSIS BRIEFS. https://www.csis.org/analysis/real-national-security-concerns-over-data-localization
[19] Simmons, B. and Hulvey, R. (2023). Cyber Borders: Exercising State Sovereignty Online. Temple Law Review, 95, 617–640. https://scholarship.law.upenn.edu/faculty_scholarship/3158
[20] Tsagourias, N. (2018) Law, borders and the territorialization of cyberspace. Indonesian Journal of International Law, 15(4), 523-551. http://dx.doi.org/10.17304/ijil.vol15.4.738
[21] von Heinegg, W. H. (2013). Territorial Sovereignty and Neutrality in Cyberspace. International Law Studies, 89, 123-156. https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1027&context=ils
[22] Wu, E. (2021). Sovereignty and Data Localization. The Cyber Project, Belfer Center for Science and International Affairs. Harvard Kennedy School. https://www.belfercenter.org/sites/default/files/2021-07/SovereigntyLocalization.pdf
[23] Yoshinori, A. (2021). Data Localization Measures and International Economic Law: How Do WTO and TPP/CPTPP Disciplines Apply to These Measures? Public Policy Review, 16, 5. https://www.mof.go.jp/english/pri/publication/ pp_review/ppr16_05_02.pdf
[24] Zekos, G. I. (2022). Political, Economic and Legal Effects of Artificial Intelligence: Governance, Digital Economy and Society. Springer Nature Switzerland. https://doi.org/10.1007/978-3-030-94736-1
[25] Zinovieva, E. (2024). Evolution of the Concept “Territorial Sovereignty” in the Digital Age. In: Bolgov, R. et al. (eds.), Proceedings of Topical Issues in International Political Geography (TIPG 2022), Springer Geography, Springer Nature Switzerland AG. https://doi.org/10.1007/978-3-031-50407-5_15