Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Law and Politics
Reference:

The main models of cross-border data transmission regimes: EU, USA and China

Chzhao Lei

ORCID: 0000-0002-9108-1007

Postgraduate student; Department of Comparative Political Science; Peoples' Friendship University of Russia

117279, Russia, Moscow, Miklukho-Maklaya str., 6

1651847660@qq.com

DOI:

10.7256/2454-0706.2024.4.70797

EDN:

WNDYGF

Received:

19-05-2024


Published:

27-05-2024


Abstract: The subject of this article is the system of regulation of cross-border data flows and its legal regime. Data is a fundamental resource for the development of the digital economy. Today, with the great development of globalization, the presence of cross-border data flows in international trade is inevitable. However, the transfer of data abroad creates hidden threats to the confidentiality of personal information of citizens and national security. Many countries have established data transfer management systems to protect their own interests. Mature data transfer management regimes abroad often become an example for other countries. The adopted laws also served as a model for other countries. The most representative regimes currently exist in the EU, the USA and China, which demonstrate three ways of managing data.  The purpose of this article is to compare the regimes of cross–border data transmission in the European Union, the United States and China in order to analyze the structure of the three representative regimes, as well as to study the causes of their formation and the consequences of their functioning. Considering the three systems makes it possible to show more clearly that the European Union, the United States and China have different value orientations, which directly led to the formation of three different legal systems. The free market and national security have become the main elements of national considerations in the development of laws on cross-border data. Based on the conducted research, it can be concluded that the regime of cross-border data transfer in the EU is the most complete and effective, having a demonstration effect. The Chinese system currently has serious flaws. And in recent years, US law has been increasingly focused on serving the interests of geopolitics. Laws on cross-border data transfer demonstrate trends in political instrumentalization. The Balkanization of the Internet is becoming more and more obvious.


Keywords:

cross-border data transfer, Cybersecurity, data sovereignty, eu, USA, China, Balkanization of the Internet, Data management, data security, The digital economy

This article is automatically translated.

Introduction

In the 21st century, digital technologies have revolutionized production and people's lives. In January 2024, the number of Internet users in the world reached 5.35 billion people, which is 66.2 percent of the world's total population [1]. The world has entered the digital age. According to the World Bank, in 2022, the share of the digital economy in global GDP exceeded 15 percent, and in the last decade it has grown 2.5 times faster than the GDP of the physical world [2]. High technologies such as big data, artificial intelligence, the Internet of things and blockchain occupy leading positions in the world. As a product of digital technologies, data has become the fifth most important factor of production, along with land, labor, capital and technology. Data now forms the basis for the further development of digital technologies, and data control and protection are a top priority for governments. With the increasing frequency of transnational economic and social activities, the volume of cross-border data transmission is gradually increasing, which undoubtedly raises a number of security problems, such as data theft, violation of privacy and leakage of trade secrets. Therefore, the creation of a number of legal regulation systems for the transfer of data abroad is an issue that needs to be addressed by each country. Due to the recuperation of cyberspace, the concept of data sovereignty has been adopted by many countries and has become one of the main concepts of data management. Currently, there is no single global model for managing cross-border data flows, and each country has its own degree of digital development and is focused on protecting its own interests in its own way, which leads to large differences in current legislation on data transfer abroad. The United States and the European Union have previously carried out legislative work in the field of cross-border data transfer, their legal systems are more advanced and are the two main paradigms of data law. China's digital technologies and digital economy have been developing rapidly in recent years, but Chinese data legislation has appeared not so long ago. Currently, China has established a set of legal systems in the field of data transfer abroad, designed to solve problems arising in this area, including the problem of data security. The three data modes represent three systems of value orientations, and are also the most illustrative examples of global management of cross-border data transfer processes.

 

Management regimes and key laws in the field of cross-border data transfer in the EU, USA and China

Unlike traditional resources, data is intangible, mobile, and non-consumable. Data can be used by different individuals and businesses at different stages of production and consumption, and they bring more benefits than conventional resources [3]. But data, on the one hand, is created by entities such as people or organizations, and on the other hand, it requires storage. And they are located within national borders. It is generally accepted that data sovereignty is a subset of cyber sovereignty [4]. According to the definition of sovereignty, data subjects, data carriers, data operations and data resources within a country are under the jurisdiction of the national Government within the national borders of the country; beyond its borders, the national Government has autonomy and has an independent and equal status along with other national governments.

In the field of data management, EU legislation often borrows the experience of other countries, its legislative history can be traced back to the Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (1981) and the Directive on the Protection of Individuals in the Processing of Personal Data and on Free Circulation such data (Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the free Movement of such Data, Directive 95/46/EC, 1995). In the latest document, the EU introduced for the first time the standard requirement of an "adequate level of protection" for non–EU countries as recipients of data, a rule that is still in force today.

In response to the development of digital technologies, on April 14, 2016, the Council of the European Union adopted the General Data Protection Rules (GDPR) [5], which entered into force on May 25, 2018 and replaced Directive 95/46/EC. GDPR is a mandatory law that requires direct and uniform action in all It does not require any changes in local legislation from the governments of the EU member states, which allows creating a harmonious data protection regime. Compared to Directive 95/46/EC, GDPR expands the scope of sovereignty over data, including companies located outside the EU but with an operational presence in the EU and serving entities in the EU. Penalties for GDPR violations have been significantly increased compared to previous laws, which also increases the effectiveness of GDPR.

Theoretically, the GDPR is a territorial law, the fundamental boundaries of which are the entire European Union. The law makes a strict distinction between EU member States and non-EU member States. Article 46 of Chapter V states that the transfer of personal data to countries or international organizations outside the EU is allowed only if the level of data protection in the recipient country has been assessed as comparable to the level of data protection in the EU or if the recipient country is included in the list of countries "adequately protected" according to the GDPR. The GDPR explicitly states that the processing of personal data by processors or controllers whose organizations are established in the EU is subject to the GDPR, regardless of whether the action takes place in the EU, which reflects both the principle of territoriality and the principle of individuality. Therefore, it can be argued that the GDPR actually operates outside the EU. In general, data management in the EU is dominated by territorial jurisdiction, complemented by personal jurisdiction [6]. Its main purpose is the protection of personal data in the EU. It can be said that the law is conservative in nature. In recent years, new laws, such as the recently passed Data Management Bill and the Data Law, have contributed to further improvements in the EU's data management system.

Compared to the EU, US legislation in the field of data transfer abroad is more fragmented. On the one hand, the United States usually adopts separate laws by industry, for example, the Right to Financial Privacy Act of 1978 and the Financial Services Modernization Act of 1999 in the financial sector, Export Administration Regulations and the Law on the Export Control Reform Act of 2018, the Foreign Investment Risk Review Modernization Act of 2018 in the investment sector; on the other hand, individual US states have independent legislative powers, for example, the states of California, Washington, Colorado, Virginia have local legislative provisions on confidentiality of personal information. The most important law in the field of data management in the United States is the Clarifying Lawful Overseas Use of Data Act (CLOUD Act) [7], which was adopted in 2018 to settle the lawsuit of the US government against Microsoft. The law gives the U.S. government the right to access and receive data stored by Internet service providers in the country and anywhere outside of it.

The CLOUD Act provides that data controlled by a data controller falls under U.S. jurisdiction if the data controller is a U.S. person (a U.S. citizen or an American company). This reflects the fact that CLOUD Law is based on the principle of citizenship. According to the Law, the United States can directly access data stored by American companies in other countries, and the fact that American Internet companies operate worldwide makes the jurisdiction of the "long arm" provided for by the CLOUD Law applicable to most countries around the world.

In June 2015, the Standing Committee of the National People's Congress of the 12th Convocation adopted the Cybersecurity Law of the People's Republic of China, which states that critical infrastructure operators are required to conduct a security assessment when providing important data outside the country, except in cases where it is provided for by other laws. The Cybersecurity Law, as well as the Data Security Law and the Personal Information Protection Law, which were subsequently adopted as legislative acts, are the main laws on cross-border data transfer in China. These laws complete the development of the top-level Chinese data transfer regime abroad.

With regard to the specific implementation of policy measures, special provisions are contained in by-laws, such as Measures to assess the security of data exports, Rules for the Certification of personal data Protection and Measures to conclude standard contracts for the export of personal data. For example, data such as important data, large-scale personal data and personal data processed by operators of critical information infrastructures meet the requirements of Data Export Security Assessment Measures, and data such as unimportant data, small and medium-sized personal data and personal data processed by operators of non-critical information infrastructures must meet the requirements of the Implementation Rules certification of personal data protection and Measures for the conclusion of standard contracts for the export of personal data. China has also developed targeted legislation in specialized areas of expertise, such as Anti-Money Laundering and Terrorist Financing Management Measures for financial Institutions, Regulations on the Management of Human Genetic Resources and Measures for the Management of Public Health Data. It can be argued that many legislative acts of different levels together constitute a complex Chinese system for managing cross-border data transmission.

 

Value orientations and reasons for the adoption of laws in the field of cross-border data transmission in the EU, USA and China

The development of national policies and laws should be based on the objective situation in the country, as well as meet national interests. The objective national conditions in the EU, the USA and China are very different, as are their national interests, therefore, the legal systems that are eventually formed have significant differences.

The EU attaches great importance to the rights of individual citizens in the data management process and views their personal data as a projection of citizens' power in the online world. The protection of the fundamental rights of EU citizens is the responsibility of the EU. The processing of data containing a large amount of personal information undoubtedly creates a risk of violation of citizens' rights. Therefore, the EU GDPR reflects the idea of conservatism and enshrines the right of citizens to oblivion [8]. Based on the protection of privacy, the EU imposes strict restrictions on the transfer of data abroad and actually erects a high wall for data transfer. The protection of individual rights and privacy also protects the EU's digital security by preventing the leakage of critical information from the EU beyond its borders.

At the beginning of the digital era, companies from the EU were competitive in the digital market and even held leading positions in the industry, but with the deepening of digital technologies, European digital companies, including Nokia, lost and were forced out of competition with American and Chinese companies. However, the EU, as one of the most developed regions in the world, has a huge digital consumer market with a population of over 400 million people. The EU relies on this market in its struggle for the right to set rules in global digital governance.

Based on the GDPR and the subsequent Digital Markets Act (DMA), the EU has established a number of market access criteria. To enter the EU market, digital companies from other countries must comply with EU data processing rules. Offshore companies are required to comply with GDPR when processing EU user data, regardless of whether this action takes place inside or outside the EU. GDPR has a well-developed punishment mechanism, so it is difficult for companies to circumvent this powerful law.

The effective and stable functioning of the EU's cross-border data transfer regime has led many countries to recognize the protection of privacy and national security provided by the GDPR, which has served as a model for the development of national cross-border data transfer regimes in many countries. In the process of drafting laws, other countries often refer to EU standards and interact with the EU at the institutional level. As a result, multinational corporations also seek to comply with EU legal requirements outside the EU in order to harmonize standards and reduce the cost of doing business. The EU uses market mechanisms to achieve the "Brussels effect". This has led to the spread of EU standards from the unilateral to the global level, increasing the EU's regulatory power.

Using market access rules to create the "Brussels effect" is a common way to expand the EU's international influence. For example, in order to limit the monopolistic behavior of technology giants in the EU market, on July 5, 2022, the European Parliament adopted a DMA, which is considered to be directed against the main digital platforms (gatekeepers) in the EU in eight areas: online search engines, online intermediary services, social networks, video sharing platforms, communication platforms, advertising services, operating systems and cloud services [9]. The largest companies involved in the project include Alphabet, Amazon, Apple, ByteDance, Meta and Microsoft. The law has been positively received by other countries and regions, including Brazil, India, Japan, South Korea and the United Kingdom, which have already adopted or intend to adopt legislation on the DMA model.

Maintaining economic hegemony has always been a key strategic objective of the United States, where the idea of free trade has long existed. Today, in the digital age, data has become one of the main commodities. Free and fast cross-border data flow is a basic prerequisite for cross-border digital commerce. Therefore, the United States encourages the free flow of data on a global scale. Based on this, the United States is asking other countries to lower data transmission standards abroad and not to interfere with data transmission.

Unlike the EU, the US has the most developed digital economy, and the American technology giants represented by MAMAA (Meta, Apple, Microsoft, Alphabet, Amazon) dominate many areas of the global digital market. By advocating for the free flow of data, the United States can collect and use the data it needs around the world thanks to the monopoly position of technology giants. The data can be replicated to accelerate technological progress and increase economic benefits, which further strengthens and strengthens the economic hegemony of the United States.

In addition to the economic consequences, the United States can achieve its political goals through free trade in data. Thanks to the CLOUD Act, the United States uses the "long arm" principle to access information from other countries. The CLOUD Act not only gives the U.S. government jurisdiction over U.S. citizens, organizations, or businesses, but also allows the U.S. government to access data from countries whose entities belong to the United States. This poses a serious threat to other countries' sovereignty over data. Since American Internet companies operate all over the world, the United States de facto monitors global data, and the broad scope of the CLOUD law is actually hegemonic.

In recent years, due to the changing geopolitical situation, the liberal ideology of the United States in the field of data has gradually been replaced by conservatism. Based on the idea of geopolitical confrontation, the United States is setting targeted barriers for data transfer abroad. Initially, this idea was embodied in the National Security and Personal Data Protection Act of 2019 (NSPDPA, has not yet entered into force). Although this law has not been implemented, its concept of banning the transfer of data to countries recognized as a threat to US security (Russia, China, Iran, etc.) migrated to the already approved and adopted Protecting Americans' Data From Foreign Surveillance Act of 2023 and Protecting Americans’ Data from Foreign Adversaries Act of 2024.

In order to achieve its own economic and political strategic goals, the United States seeks to promote standards of free digital mobility. The conclusion of bilateral and multilateral agreements is the main measure used by the United States to promote its ideas at the international level. Depending on the number of participants and the region in which they are located, they can be divided into bilateral agreements (the Free Trade Agreement between the United States and Chile), regional multilateral agreements (the Agreement between the United States and Mexico and Canada) and agreements of international organizations (a voluntary system of Cross-border Confidentiality Rules). Through these agreements, the United States promotes its own key definitions and basic principles of data transfer abroad, creating a stable environment for the free flow of data and forming a "data alliance". However, this approach is erroneous, and there is a risk that international agreements will be invalidated, such as the Safe Harbor and Privacy Shield agreements between the EU and the United States, which were eventually invalidated due to EU restrictions on data transfer abroad. Nevertheless, the US will include provisions on digital commerce and data flows in free trade agreements, and the concept of US data sovereignty will continue to be promoted around the world along with their political and economic activities.

The situation in China is more complicated. On the one hand, China has a huge market with a population of 1.3 billion people, the volume of data generated is extremely large, there are many foreign enterprises operating in China, so the problem of transferring data abroad can pose a threat to the sovereignty and security of data in China. On the other hand, China is a fast–growing economy, and the digital economy is one of the main engines of its economic development. China has technology giants such as Huawei, Tencent, Alibaba and ByteDance, as well as a large number of foreign high-tech companies cooperating with Chinese companies. Too strict restrictions on cross-border data flows can weaken the competitiveness of national companies in the international arena and reduce the benefits of globalization [10]. Therefore, if higher standards of data transmission abroad are established, this will negatively affect China's economic development and international trade operations.

As a result, China has adopted policies aimed at maintaining a balance between cyber sovereignty and free markets and data flows. In order to protect critical data from loss and facilitate the normal flow of ordinary data, China has developed a set of special ways to transfer data abroad, which mainly include three types: security assessment, standard contract and protection certification [11]. A security assessment is an assessment of the degree of risk through administrative licensing in accordance with the Measures for Assessing the Security of Data Exports issued by the State Internet Information Administration. The standard or standardized contract template signed between data exporters and data recipients requires other countries to provide the same level of data protection as in China. This initiative refers to the EU GDPR. Security certification means obtaining a certificate from an official or officially recognized third-party organization at the time of data transfer abroad that the recipient's data protection level is comparable to Chinese.

However, in practice, the envisaged control system for data transmission abroad has not been implemented. Firstly, there are gaps in the regulation of non-vital and non-personal data; existing laws do not provide full coverage of all types of data, and data owners often prefer not to declare ambiguous data in order to avoid the additional responsibility that is associated with them. Secondly, the lack of clear boundaries between security assessments, standard contracts, and security certificates leads to overlap and confusion between regimes. In such circumstances, data owners prefer a more convenient, fast and simple security certification, and the effectiveness of security assessments and standard contracts is significantly reduced. Thirdly, the Cybersecurity Law stipulates that personal information and important data collected and generated must be stored in China, but the areas to which it applies are not specifically listed [12]. This "one question" phenomenon is widespread in the data management process in China. Fourth, theoretically, the Chinese government seeks to find a balance between protecting the security of network data and promoting the development of the digital economy; however, in the process of real work, security concerns still influence the relevant decisions of government departments, enterprises and organizations.

Currently, the spread of standards and systems for cross-border data transmission in China is still very limited. An important achievement for China today is the Comprehensive Regional Economic Partnership Agreement (CEP) signed in 2020, to which China, Japan, South Korea, ASEAN, Australia and New Zealand are parties. In 2021, China and Arab countries published the Sino-Arab Data Security Cooperation Initiative, which calls on countries to respect data sovereignty. China is also promoting links with the global data market by applying for membership in recognized international organizations and international regulations such as the Regional Comprehensive Economic Partnership Agreement, the Comprehensive and Progressive Trans-Pacific Partnership Agreement (CPTTP) and the Digital Economy Partnership Agreement (DEPA).

 

Conclusion

The continuous flow of data from countries with weak digital technologies to hegemonic countries can exacerbate digital inequality and even lead to the colonization of data. Therefore, the concept of data sovereignty is being adopted by an increasing number of countries. The EU, the USA and China represent three modes of exit from the digital space. Currently, the EU is the dominant player in upholding the data sovereignty paradigm, with a set of mature and practical data protection mechanisms. As for the United States, its dominant position in the digital space forces it to oppose barriers to data transmission and for the free flow of data, but the United States can also use restrictions on data transfer abroad as a weapon of geopolitical competition. China is trying to find a middle way, although its current regime of exiting the digital space still has serious drawbacks. In general, the EU model is a worthy model for other countries that are disadvantaged in terms of digital technologies, and its successes and established standards can reduce the cost of developing legislation and law enforcement in other countries. However, excessive barriers to digital mobility can also create pitfalls of anti-globalization and accelerate the formation of the phenomenon of cyberbullying. It is worth noting that there are institutional contradictions between the EU and the USA on data transfer abroad and information protection, which leads to frequent conflicts, which often end with the adoption of penalties by American companies, the most famous example is a series of changes in EU requirements for Apple products. However, other countries that do not have such a large market as the EU are unlikely to be able to achieve similar results on their own. The geopoliticization of cyberspace is also alarming, and the growth of political data tools is inevitable in the future. How to avoid the negative impact of geopolitics, especially in relations between China and the United States, on the global digital economy is an urgent issue.

References
1. Number of internet and social media users worldwide as of January 2024. Retrieved from https://www.statista.com/statistics/617136/digital-population-worldwide/
2. Digital trust: How to unleash the trillion-dollar opportunity for our global economy. Retrieved from https://www.weforum.org/agenda/2022/08/digital-trust-how-to-unleash-the-trillion-dollar-opportunity-for-our-global-economy/
3. Jones, C.I., & Christopher T. (2020). Nonrivalry and the Economics of Data. American Economic Review, 110(9), 2819-2958.
4. Chen B., & Wang B. (2024). Legal regulation and improvement of the procedure for data withdrawal from China within the framework of the principle of data sovereignty, Journal of Huaqiao University (Edition of Philosophy and Social Sciences), 2, 49-63.
5General Data Protection Regulation. Retrieved from https://gdpr-info.eu/
6. Voss, U.G. (2022). Cross-border data flows, general regulations for the protection of personal data and data management. Bulletin of international organizations: education, science, new economy, 17(1), 56-95. doi:10.17323/1996-7845-2022-01-03
7CLOUD Act Resources. Retrieved from https://www.justice.gov/criminal/cloud-act-resources
8. Lyu, K.A. (2022). Key directions of development of supranational legal regulation of the EU digital space at the present stage. International Law, 1, 61-75. doi:10.25136/2644-5514.2022.1.37674 Retrieved from http://en.e-notabene.ru/wl/article_37674.html
9. Regulation (EU) 2022/1925 of the European Parliament and of the Council of 14 September 2022 on contestable and fair markets in the digital sector and amending Directives (EU) 2019/1937 and (EU) 2020/1828 (Digital Markets Act) (Text with EEA relevance) Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32022R1925
10. Xiong T., & Kong S. (2024). Building a global governance mechanism based on the concept of data sovereignty-challenges, directions and ways. Journal of Regional and Country Studies, 2, 75-90.
11. Ye, C., & Yan, W. (2024). On the current situation, problems and ways to improve the cross-border data transmission system in China. Journal of the Beijing University of Aeronautics and Astronautics (Social Sciences publication), 1, 57-71.
12. Shelepov, A.V. (2022). Approaches of the BRICS countries to data regulation. Bulletin of International Organizations: education, science, new economy, 17(3), 212-234. doi:10.17323/1996-7845-2022-03-0

Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the peer-reviewed study is the problem of national sovereignty of digital data and the specifics of managing the cross-border transfer of this data in a global digital economy. Given the rapid development of the digital economy in recent years, as well as the dangers associated with the uncontrolled circulation of digital data, the relevance of the topic chosen for research can hardly be overestimated. To this can be added the concerns of experts about the unexpectedly increased capabilities of artificial intelligence. Unfortunately, the author did not bother to properly reflect on the theoretical and methodological basis of his own research, which could not but affect the quality of the terminology used (as discussed below). But from the context, it can be understood that in the process of research, historical and institutional approaches were used to analyze the regulatory framework for managing cross-border digital data flows, as well as a comparative method (to study the main models of this management) and critical content analysis (when studying specific regulations). The correct application of these methods allowed the author to obtain results with signs of scientific novelty. First of all, we are talking about the identified three key models (or "modes") for managing cross–border digital data transmission - Chinese, European and North American. The author's conclusion about the specifics of the value base on which the identified models are formed, as well as his assessment of the prospects of each of the models, is also interesting. Structurally, the reviewed article also does not cause serious complaints: its logic is quite consistent and reflects the main aspects of the research. The text highlights four main sections: - "Introduction", where a scientific problem is posed, its relevance is justified, but, unfortunately, the obligation to declare and argue a theoretical and methodological choice is ignored; - "Management regimes and key laws in the field of cross-border data transfer in the EU, USA and China", where the main models of cross-border data transfer management are highlighted and analyzed; - "Value orientations and reasons for the adoption of laws in the field of cross-border data transfer in the EU, USA and China", where the value bases for the formation of a specific model are analyzed as well as the advantages and disadvantages of these models; - "Conclusion", which summarizes the results of the study, draws conclusions and outlines the prospects for further research. The style of the reviewed article is scientific. There are a number of stylistic errors in the text (for example, in the first sentence the combination "in production and people's lives" sounds rather ambiguous, which is unacceptable from the point of view of scientific style; etc.), but in general it is written quite competently, in good Russian, with the correct use of scientific terminology. However, some terms raise questions. So, the literal translation from the English term "physical world GDP" as "GDP of the physical world" not only looks strange (the economy may have GDP, but not the "physical world" itself), but also is not correct – it would be more correct to translate as "physical world GDP" or in the sense of "world GDP of the material economy". Another example of incorrect terminology is "high technologies such as big data...". Strictly speaking, "big data" is not a technology in itself (it is rather information), technologies can be discussed when these "big data" are processed and used in one way or another. Moreover, the author himself claims below that the data is a "product of digital technologies" and forms "the basis for the further development of digital technologies." Which is much more correct than calling technologies "big data" themselves, substituting concepts. Actually, the author's statement that "big data, artificial intelligence, the Internet of things and blockchain occupy leading positions in the world" also raises significant doubts. The author himself refers to World Bank data and says that the entire share of the digital economy has exceeded 15% of global GDP, but this is far from corresponding to the "leading positions". Although it is true that the GROWTH of the digital economy in recent decades has been impressive. But the basis of our life is still the real economy, but not the digital one. Equally controversial is the author's claim that "unlike traditional resources, data ... is not subject to consumption." If we proceed from the traditional definition of the term "consumption" as the use of a product in the process of satisfying needs, then the data is quite susceptible to consumption – when writing this review, the software tools necessary to obtain the desired result were used. That is, the data was consumed. Another thing is that in the process of consumption, these data were not destroyed, as is the case with many material products, but the commodity wealth of the modern economy is far from being reduced to the production of physical goods – after all, services are not destroyed during consumption either, although they are rooted in the ordinary, most traditional economy. However, these and other terminological nuances cannot be considered critical in assessing the general scientific level of the reviewed research: despite some minor flaws, in general, the author has understood the topic quite deeply and has fully mastered its terminological specifics. Therefore, minor terminological errors did not become the basis for rejecting the article. The bibliography includes 12 titles, including sources in foreign languages, and adequately reflects the state of research on the subject of the article. There is no appeal to the opponents due to the lack of substantiation of the theoretical and methodological basis of the study. GENERAL CONCLUSION: despite some shortcomings, the article proposed for review can be qualified as a scientific work that meets the basic requirements for works of this kind. The results obtained by the author will be of interest to political scientists, sociologists, economists, specialists in the field of public administration, world politics and international relations, as well as students of the listed specialties. The presented material corresponds to the subject of the journal "Law and Politics". According to the results of the review, the article is recommended for publication.