HOME

TheInfoList



OR:

A data haven, like a
corporate haven Corporate haven, corporate tax haven, or multinational tax haven is used to describe a jurisdiction that multinational corporations find attractive for establishing subsidiaries or incorporation of regional or main company headquarters, mostly du ...
or
tax haven A tax is a compulsory financial charge or some other type of levy imposed on a taxpayer (an individual or legal entity) by a governmental organization in order to fund government spending and various public expenditures (regional, local, or n ...
, is a refuge for uninterrupted or unregulated
data In the pursuit of knowledge, data (; ) is a collection of discrete values that convey information, describing quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted ...
. Data havens are locations with legal environments that are friendly to the concept of a
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
freely holding data and even protecting its content and associated information. They tend to fit into three categories: a physical
locality Locality may refer to: * Locality (association), an association of community regeneration organizations in England * Locality (linguistics) * Locality (settlement) * Suburbs and localities (Australia), in which a locality is a geographic subdivis ...
with weak information-system enforcement and
extradition Extradition is an action wherein one jurisdiction delivers a person accused or convicted of committing a crime in another jurisdiction, over to the other's law enforcement. It is a cooperative law enforcement procedure between the two jurisdict ...
laws, a physical locality with intentionally strong protections of data, and virtual domains designed to secure data via technical means (such as
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
) regardless of any legal environment.
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
's onion space (hidden service),
HavenCo HavenCo Limited was a data haven, data hosting services company, founded in 2000 to operate from Sealand, a self-declared sovereign principality that occupies a man-made former World War II defensive facility originally known as Roughs Tower ...
(centralized), and
Freenet Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
(decentralized) are three models of modern-day virtual data havens.


Purposes of data havens

Reasons for establishing data havens include access to free political speech for users in countries where
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments ...
of the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
is practiced. Other reasons can include: *
Whistleblowing A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
* Distributing
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
, data or speech that violates laws such as the
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
*
Copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
* Circumventing
data protection Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
laws *
Online gambling Online gambling is any kind of gambling conducted on the internet. This includes virtual poker, casinos and sports betting. The first online gambling venue opened to the general public was ticketing for the Liechtenstein International Lottery in ...
*
Pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
*
Cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...


History of the term

The 1978 report of the British government's Data Protection Committee expressed concern that different
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
standards in different countries would lead to the transfer of personal data to countries with weaker protections; it feared that Britain might become a "data haven". Also in 1978, Adrian Norman published a mock consulting study on the feasibility of setting up a company providing a wide range of data haven services, called "Project Goldfish". Science fiction novelist
William Gibson William Ford Gibson (born March 17, 1948) is an American-Canadian speculative fiction writer and essayist widely credited with pioneering the science fiction subgenre known as ''cyberpunk''. Beginning his writing career in the late 1970s, his ...
used the term in his novels ''
Count Zero ''Count Zero'' is a science fiction novel by American-Canadian writer William Gibson, originally published in 1986. It is the second volume of the Sprawl trilogy, which begins with ''Neuromancer'' and concludes with ''Mona Lisa Overdrive'', and is ...
'' and ''
Mona Lisa Overdrive ''Mona Lisa Overdrive'' is a science fiction novel by American-Canadian writer William Gibson, published in 1988. It is the final novel of the cyberpunk Sprawl trilogy, following ''Neuromancer'' and ''Count Zero'', taking place eight years after ...
'', as did Bruce Sterling in '' Islands in the Net''. The 1990s segments of
Neal Stephenson Neal Town Stephenson (born October 31, 1959) is an American writer known for his works of speculative fiction. His novels have been categorized as science fiction, historical fiction, cyberpunk, postcyberpunk, and baroque. Stephenson's work exp ...
's 1999 novel ''
Cryptonomicon ''Cryptonomicon'' is a 1999 novel by American author Neal Stephenson, set in two different time periods. One group of characters are World War II-era Allied codebreakers and tactical-deception operatives affiliated with the Government Code and ...
'' concern a small group of entrepreneurs attempting to create a data haven.


See also

*
Anonymity Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
*
Anonymous P2P An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routi ...
*
Pseudonymity A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
*
Corporate haven Corporate haven, corporate tax haven, or multinational tax haven is used to describe a jurisdiction that multinational corporations find attractive for establishing subsidiaries or incorporation of regional or main company headquarters, mostly du ...
*
Crypto-anarchism Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving ...
*
Sealand SeaLand, a division of the Maersk Group, is an American intra-regional container shipping company headquartered in Miramar, Florida with representation in 29 countries across the Americas. The company offers ocean and intermodal services using ...
located in international waters in the North Sea *
CyberBunker CyberBunker was an Internet service provider located in the Netherlands and Germany that, according to its website, "hosted services to any website except child pornography and anything related to terrorism". The company first operated in a forme ...
*
PRQ PRQ is a Swedish Internet service provider and web hosting company created in 2004. Ownership Based in Stockholm, PRQ was created by Gottfrid Svartholm and Fredrik Neij, two founders of The Pirate Bay. Business model Part of PRQ's business ...
, an
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
in Sweden *
IPREDator IPredator was a VPN service offered with the stated goal of providing internet privacy. It was co-founded by Peter Sunde, as a response to the introduction of IPRED in Sweden, which will allow copyright holders and law enforcement officials to re ...
located in Sweden *
International Modern Media Institute The International Modern Media Institute (IMMI) is an international institution with the aim of promoting debate about laws good for freedom of information, speech, and expression. The institute does this by offering advice and guidance in relat ...
*
WikiLeaks WikiLeaks () is an international Nonprofit organization, non-profit organisation that published news leaks and classified media provided by anonymous Source (journalism), sources. Julian Assange, an Australian Internet activism, Internet acti ...


References

{{Reflist Computer law Anonymity networks Crypto-anarchism Information privacy Internet privacy Data laws