HOME

TheInfoList



OR:

A data haven, like a
corporate haven Corporate haven, corporate tax haven, or multinational tax haven is used to describe a jurisdiction that multinational corporations find attractive for establishing subsidiaries or incorporation of regional or main company headquarters, mostly du ...
or
tax haven A tax is a compulsory financial charge or some other type of levy imposed on a taxpayer (an individual or legal entity) by a governmental organization in order to fund government spending and various public expenditures (regional, local, or n ...
, is a refuge for uninterrupted or unregulated
data In the pursuit of knowledge, data (; ) is a collection of discrete Value_(semiotics), values that convey information, describing quantity, qualitative property, quality, fact, statistics, other basic units of meaning, or simply sequences of sy ...
. Data havens are locations with legal environments that are friendly to the concept of a
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
freely holding data and even protecting its content and associated information. They tend to fit into three categories: a physical
locality Locality may refer to: * Locality (association), an association of community regeneration organizations in England * Locality (linguistics) * Locality (settlement) * Suburbs and localities (Australia), in which a locality is a geographic subdivis ...
with weak information-system enforcement and
extradition Extradition is an action wherein one jurisdiction delivers a person accused or convicted of committing a crime in another jurisdiction, over to the other's law enforcement. It is a cooperative law enforcement procedure between the two jurisdi ...
laws, a physical locality with intentionally strong protections of data, and virtual domains designed to secure data via technical means (such as
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
) regardless of any legal environment. Tor's onion space (hidden service), HavenCo (centralized), and
Freenet Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
(decentralized) are three models of modern-day virtual data havens.


Purposes of data havens

Reasons for establishing data havens include access to free political speech for users in countries where
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments ...
of the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
is practiced. Other reasons can include: *
Whistleblowing A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
* Distributing
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
, data or speech that violates laws such as the
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
*
Copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
* Circumventing
data protection Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
laws *
Online gambling Online gambling is any kind of gambling conducted on the internet. This includes virtual poker, casinos and sports betting. The first online gambling venue opened to the general public was ticketing for the Liechtenstein International Lottery i ...
* Pornography *
Cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing th ...


History of the term

The 1978 report of the British government's Data Protection Committee expressed concern that different privacy standards in different countries would lead to the transfer of personal data to countries with weaker protections; it feared that Britain might become a "data haven". Also in 1978, Adrian Norman published a mock consulting study on the feasibility of setting up a company providing a wide range of data haven services, called "Project Goldfish". Science fiction novelist
William Gibson William Ford Gibson (born March 17, 1948) is an American-Canadian speculative fiction writer and essayist widely credited with pioneering the science fiction subgenre known as ''cyberpunk''. Beginning his writing career in the late 1970s, hi ...
used the term in his novels ''
Count Zero ''Count Zero'' is a science fiction novel by American-Canadian writer William Gibson, originally published in 1986. It is the second volume of the Sprawl trilogy, which begins with ''Neuromancer'' and concludes with ''Mona Lisa Overdrive'', and i ...
'' and ''
Mona Lisa Overdrive ''Mona Lisa Overdrive'' is a science fiction novel by American-Canadian writer William Gibson, published in 1988. It is the final novel of the cyberpunk Sprawl trilogy, following ''Neuromancer'' and ''Count Zero'', taking place eight years after ...
'', as did Bruce Sterling in '' Islands in the Net''. The 1990s segments of Neal Stephenson's 1999 novel ''
Cryptonomicon ''Cryptonomicon'' is a 1999 novel by American author Neal Stephenson, set in two different time periods. One group of characters are World War II-era Allied codebreakers and tactical-deception operatives affiliated with the Government Code an ...
'' concern a small group of entrepreneurs attempting to create a data haven.


See also

* Anonymity *
Anonymous P2P An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routi ...
*
Pseudonymity A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name ( orthonym). This also differs from a new name that entirely or legally replaces an individu ...
*
Corporate haven Corporate haven, corporate tax haven, or multinational tax haven is used to describe a jurisdiction that multinational corporations find attractive for establishing subsidiaries or incorporation of regional or main company headquarters, mostly du ...
*
Crypto-anarchism Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving ...
* Sealand located in international waters in the North Sea * CyberBunker * PRQ, an
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
in Sweden * IPREDator located in Sweden * International Modern Media Institute *
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...


References

{{Reflist Computer law Anonymity networks Crypto-anarchism Information privacy Internet privacy Data laws