Applicable Law to Transnational Personal Data: Trends and Dynamics

Abstract The recent COVID-19 outbreak has pushed the tension of protecting personal data in a transnational context to an apex. Using a real case where the personal data of an international traveler was illegally released by Chinese media, this Article identifies three trends that have emerged at each stage of conflict-of-laws analysis for lex causae: (1) The EU, the US, and China characterize the right to personal data differently; (2) the spread-out unilateral applicable law approach comes from the fact that all three jurisdictions either consider the law for personal data protection as a mandatory law or adopt connecting factors leading to the law of the forum; and (3) the EU and China strongly advocate deAmericanization of substantive data protection laws. The trends and their dynamics provide valuable implications for developing the choice of laws for transnational personal data. First, this finding informs parties that jurisdiction is a predominant issue in data breach cases because courts and regulators would apply the law of the forum. Second, currently, there is no international treaty or model law on choice-of-law issues for transnational personal data. International harmonization efforts will be a long and difficult journey considering how the trends demonstrate not only the states’ irreconcilable interests but also how states may consider these interests as their fundamental values that they do not want to trade off. Therefore, for states and international organizations, a feasible priority is to achieve regional coordination or interoperation among states with similar values on personal data protection.


A. Introduction
The recent COVID-19 outbreak has pushed the tension of protecting personal data in a transnational context 1 to an apex. This is because COVID-19 spreads fast with the international travel of people. 2 Many countries require international travelers to disclose their personal informationsuch as name, gender, date of birth, travel history, and purpose of travel and residence-and *Jie (Jeanne) Huang, Associate Professor at University of Sydney Law School. The author is very grateful for the anonymous reviewer's comments and the grant support provided by the University of Sydney Law School and the Indian Development Fund. All errors remain my own. Jeanne.huang@sydney.edu.au.
impose quarantine requirements accordingly. 3 In late March 2020, Chinese media widely reported an Australian lady with Chinese origin who breached the home quarantine requirement by jogging without wearing a mask in the residential complex where she was temporarily living in Beijing. 4 A Chinese policeman required her to stay at home. 5 The lady refused and alleged she was abused by the policeman. 6 Chinese media released her photo, 7 age, flight information, name, 8 nationality, and temporary home address in Beijing. The Chinese and Australian universities she graduated from and the years of her graduation, her employment history and positions, and her current employer and salary were also released. 9 Her employer was the Chinese subsidiary of German pharmaceutical giant Bayer. 10 Bayer China quickly made an announcement and fired this lady for breaching the Chinese quarantine requirement. 11 Because her Chinese visa was sponsored by Bayer, the Chinese government revoked her visa and deported her after Bayer terminated her employment contract. 12 Clearly, the lady violated the COVID-19 mandatory self-quarantine regulation in China. Her conduct threatened the public health. However, did her offense justify releasing her detailed personal information online? Based on the released information, her identity can be easily ascertained. She is an Australian citizen and arrived in China just one day before the incident occurred. Therefore, she was unlikely to obtain a habitual residence in China in such a short period. 13 She was a senior director working for Bayer China, which was owned by Bayer Germany, though news reports did not indicate whether she was hired by Bayer Germany and whether her personal employment information was processed in Germany. This incident is not a unique case. It is typical and demonstrates the tension between preventing COVID-19 and protecting transnational personal data: Which law should be applied to the personal data of an international traveler who violates a local quarantine law?
Protecting personal data in the transnational context is important and necessary. In modern society-where individuals often travel across borders 14 -technology such as the Internet and the cloud is inherently transnational, 15 and online service providers also actively make their service 3 Nicole Mills, Coronavirus quarantine rules will force international arrivals into two-week quarantine in hotels and caravan parks, ABC NEWS (Mar. 27, 2020, 2:12 AM), https://www.abc.net.au/news/2020-03-27/coronavirus-quarantine-laws-forceinternational-arrivals-hotels/12097312; Travel and COVID-19, AUSTRALIAN GOV'T DEP'T AGRIC. WATER & ENV'T, https:// www.agriculture.gov.au/travelling/to-australia/advice-to-travellers/human-health/coronavirus (last visited Apr. 1, 2020). 4 Nectar Gan, A Chinese Australian Woman breached coronavirus quarantine in Beijing to go for a Jog-and lost her job, CNN (Mar. 20, 2020, 7:46 AM), https://edition.cnn.com/2020/03/20/asia/beijing-coronavirus-woman-fired-intl-hnk/index.html. 5 Id. 6 Id. 7 Some Chinese media mosaicked her face and some did not. 8 The media released her Chinese surname and the last Chinese character in her name. 9 The Jogging Woman Liang X Yang Was Deported: Australia Locked Down and Rejecting Her Return! How Will She Make a Living?, SOHU, https://www.sohu.com/na/383768197_120018507?scm=1002.45005a.15d015e01a3.PC_NEW_ARTICLE_REC& spm=smpc.content%2Fnew.fd-d.8.1585353600026oXoZw5N (last visited Apr. 1, 2020); Rich and Ill-tempered "Australian Jogging Woman" Graduated from Famous Universities and Earned One Million, ZHIHU, https://zhuanlan.zhihu.com/p/ 115002155 (last visited Apr. 1, 2020). 10 That Australian Who Jogged without Wearing a Mask and Shouted for Help Was Fired!, SINA, https://cj.sina.com.cn/ articles/view/6115560351/16c840b9f01900o0dd (last visited Apr. 1, 2020). 11 Id.; cf. Other New Reports Indicate that This Lady May Go to Germany and Work for Bayer, SOHU, https://www.sohu.com/ a/383204342_334936?scm=1002.44003c.fe017c.PC_ARTICLE_REC&spm=smpc.content.fd-d.2.1585791557071kSlKl7d&_ trans_=000012_sogou_fl_ty&_f=index_pagerecom_2 (last visited Apr. 1, 2020). 12 Australian "Jogging Woman," Deported!, BEIJING DAILY, http://www.bjd.com.cn/a/202003/19/WS5e732c99e4b 01e8b9150a2f8.html (last visited Apr. 1, 2020). Before this lady was deported, she had no confirmed case of COVID-19. She had not faced any judicial proceedings in China. 13 Based on the media reports, it is unclear whether this lady had lived in China long enough in previous years that she had already obtained a residence under Chinese law before this incident. accessible around the world. 16 Domestic regulators have also become more serious about protecting personal data in the transnational context. 17 The EU implemented the General Data Protection Regulation (GDPR). 18 The California state government adopted the California Consumer Privacy Act. 19 China incorporated the right to personal data into the Chinese General Rules of the Civil Law. 20 Australia is robustly creating the Consumer Data Right. 21 Nonetheless, the contents of domestic laws for personal data protections are not the same. For example, Chinese media published the employment-both current and past employers-and education information of the international traveler who violated the COVID-19 quarantine requirement. In the EU, such personal information would be protected under the GDPR according to the Statement on the Processing of Personal Data in the Context of the COVID-19 Outbreak adopted by the European Data Protection Board. 22 In Australia, some states may release the flight information and places where an international traveler infected by COVID-19 visited, but his or her full name, employment position and salary, and education information are never released, unless this information is necessary to lessen or prevent a serious and imminent threat to the health of the Australian public. 23 The different domestic responses to protecting personal data in combating COVID-19 demonstrate the need to identify the applicable law to transnational personal data. According to conflict of laws, in finding lex causae, there are three stages: First, characterize the issue into one of the established choice of law classifications by identifying the nature of the subject matter. Second, select the rule of conflict of laws which lays down a connecting factor for the issue in question. Third, identify the system of law which is tied by the connecting factor found in stage two to the issue characterized in stage one. 24 There are valuable national studies or comparative scholarship  19 The California Consumer Privacy Act passed on September 23, 2018, and became effective on January 1, 2020. CAL. CIV. CODE § 1798.198  Statement by the EDPB Chair on the Processing of Personal Data in the Context of the COVID-19 Outbreak, EUROPEAN DATA PROT. BD. (Mar. 16, 2020), https://edpb.europa.eu/news/news/2020/statement-edpb-chair-processing-personal-datacontext-covid-19-outbreak_en (indicating that "the EDPB would like to underline that, even in these exceptional times, the data controller and processor must ensure the protection of the personal data of the data subject") [hereinafter Statement by the EDPB Chair].

23
In New South Wales, Australia, personal information is defined under the Privacy and Personal Information Protection Act 1998 (NSW) s 4 (Austl.) [hereinafter PPIPA] as information or an opinion-including those forming part of a database and whether or not recorded in a material form-about an individual whose identity is apparent or can reasonably be ascertained from the information or opinion. The NSW government agency may disclose the relevant personal information to the general Australian public, including those outside of NSW jurisdiction, or to an Australian Commonwealth agency. The relevant agency is allowed to do so if such a disclosure is reasonably believed by the NSW government agency to be necessary to lessen or prevent a serious and imminent threat to the health of the Australian public, according to s 19(2)(f) of PPIPA. The Public Health Act 2010 (NSW) (Austl.) also allows the government to release certain personal information so the general public can keep its distance from the home address or the places that a patient has visited. exploring personal data protection. 25 Yet, little conflict-of-laws literature has compared how China, the US, and the EU characterize the right to personal data, what connecting factors they consider, and which law they eventually apply to protect personal data. These issues are important, especially in the context of COVID-19, where states strictly monitor international travelers. Going beyond combating COVID-19, exploring these issues can inform domestic legislators of the convergence and divergence of different national laws. It also helps technology companies design their global service. It further provides useful references for international organizations who plan to propose treaties or model laws to coordinate national laws.
This Article is divided according to the three stages of conflict-of-laws analysis. The first section argues that China, the US, and the EU characterize the right to personal data in very different ways. The EU highlights it as a fundamental human right, the US deems it a civil liberty, and China considers the right to personal data as a personality right. The second section analyzes the connecting factors used in the three jurisdictions. All three jurisdictions make the territorial scope of their personal information protection law broad enough to ensure the application of lex fori. Alternatively, they consider the personal data protection law as a mandatory law and as a curtailment of party autonomy. The consequence is the spread-out unilateral applicable law approach in contracts, torts, and equity. Based on the lex fori approach discussed in the second section, the third section analyzes the substantive law for personal data protection in the US, the EU, and China. It argues that the global trend for the substantive law is shifting from Americanization to deAmericanization. The first three sections of the Article present three trends at each stage of conflict-of-law analysis: The multifaceted legal nature of the right to personal data, the spread-out unilateral applicable law approach, and the de-Americanization of substantive personal data protection law. The fourth section explores the dynamics among these trends. It argues that the widely adopted unilateral applicable law approach in contracts, torts, and equity cases of personal data breach has almost eliminated the need for conflict of laws analysis in transnational data breaches. In contrast, the gaps between the substantive domestic law for personal data protection are widening with the deAmericanization movement. The fifth section concludes the Article.

B. Multi-Faceted Right to Personal Data
There is no uniformity to characterize the right to personal data in the US, EU, and China. This is because this right is considered a fundamental human right in the EU, a civil liberty in the US, and a personality right in China. 26 Although apparently both the US and China can protect the right to personal data as a consumer right or a property right, their laws differ in nature. 27

I. Human Right
In the EU, a data subject's right to his or her personal data is characterized as a "right to privacy with respect to the processing of personal data." 28 Such a right is considered to be a fundamental one and cannot be outweighed by other values. 29 Protection of personal data is founded upon human rights treaties within the EU. 30 Under the heading "Right to respect for private and family life," Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms states: "Everyone has the right to respect for his private and family life, his home and his correspondence." 31 The European Charter for Fundamental Human Rights goes a step further, providing in Article 8(1) that "[e]veryone has the right to the protection of personal data concerning him or her." 32 Article 8(2) of the Charter authorizes the processing of personal data if certain conditions are satisfied-providing that personal data "must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law." 33 Additionally, a right to data protection is also protected by Article 16 of the Treaty on the Functioning of the European Union. 34 The US is not a party to the European Convention for the Protection of Human Rights and Fundamental Freedoms or the European Charter for Fundamental Human Rights. In the US, the right to privacy is defined as the "right to be alone." 35 It is a civil liberty protected by the Constitution of the US. 36 The Fourth Amendment protects personal information from unreasonable searches and seizures of the government. 37 As such, it has limited implications for most scenarios involving transnational personal data, where a data breach was conducted by a data company, media, or an individual, rather than a government. 38 In Roe v. Wade, the Supreme Court of the US held that the right of privacy is "founded in the Fourteenth Amendment's Concept of personal liberty and restrictions on state action." 39 Other cases have been less deferential to information privacy as a protectable civil liberty interest, 40   In contrast, the Constitution of the US firmly establishes the free flow of information by the First Amendment's free speech clause, 42 which may be more likely to be considered as a fundamental human right in the US. 43 For example, Sorrell v. IMS Health Care is concerned with a Vermont law that prohibits pharmacies from disclosing or otherwise allowing prescriberidentifying information to be used for marketing. 44 The Supreme Court of the US held that this law should be subject to heightened judicial scrutiny because it was "contentand speaker-based" and "burden[ed] disfavored speech by disfavored speakers." 45 Vermont contended that its law was necessary to protect medical privacy. 46 The Court rejected this argument because this law allowed pharmacies to share prescriber-identifying information with anyone for any reason except for marketing. 47 The state also contended that this law advanced important public policy goals by lowering the costs of medical services and promoting public health. The Court held that while these policy goals may be proper, the law did not advance them in a permissible way. 48 The Court concluded that "the 'fear that people would make bad decisions if given truthful information' cannot justify content-based burdens on speech." 49 The law was set aside because it violated the First Amendment. 50 In China, the right to personal data is considered a personality right. There are two reasons. First, unlike the EU, Chinese legislators do not consider the right to personal information a fundamental human right. This is not because they cherish the free flow of information like the US. Instead, an individual's right to personal information should be limited because it should not interfere with the authority of the Chinese government, as the largest data controller, to collect, process, save, and use personal information. 51 It may be true that in highly decentralized distributed systems established in a democratic society, "there is no central controller of information" and "almost everyone connected to the network is a 'controller' of personal data." 52 However, this statement does not describe the Chinese situation. Although the Internet is decentralized, the Chinese government is still the ultimate controller because it controls the Internet connections between its territory and the outside world. 53 For example, China has built an Internet Great Fire Wall to censor the information flow across its border and prosecuted people who used or provided VPNs. 54 The Chinese government controls and accesses personal data of users of Chinese Internet service providers, such as Wechat. 55  Sorrell, 564 U.S. at 565. 46 Id. at 572. 47 Id.

48
Id. at 577. 49 Id. WeChat Shares Consumer Data with Chinese Government, PYMNTS (Sept. 25, 2017), https://www.pymnts.com/safetyand-security/2017/wechat-hands-over-user-data-to-chinese-government-amid-privacy-concerns/. and criminal investigations, 56 other Chinese laws have gone beyond this constitutional limit. For example, Article 25 of the Chinese Ecommerce Law allows government departments to require e-commerce operators to provide e-commerce data-which includes personal information, privacy, and business secrets-according to provisions of laws and administrative regulations, and the ecommerce operators shall provide this information as required. 57 E-commerce Law does not provide any grounds or remedy for e-commerce operators to reject the government information request.
Second, the Chinese Constitution provides very limited protection for an individual's right to personal information. The Constitution provides that the residence of Chinese citizens is inviolable, and that freedom and privacy of correspondence of Chinese citizens are protected by law. 58 These provisions have limited implications on personal data protection in China. Literally speaking, these constitutional provisions are for residence and correspondence. Personal data protection concerns far more information than an individual's address and other contact information. It is unclear whether these constitutional provisions can cover all other personal data. More importantly, these constitutional provisions are about protecting privacy; however, in China, protecting personal data is not the same as protecting privacy. The General Rules of the Civil Law, a fundamental law for civil rights and obligations in China, was enacted in 2017. 59 It prescribes privacy and personal data protection in different articles. Article 110 provides that "natural persons have the right to life, body, health, name, portrait, reputation, honour, privacy, marriage autonomy and others." 60 Article 111 indicates that: [T]he personal information of natural persons is protected by law. Any organization or individual who needs to obtain personal information of others shall obtain and ensure the security of the information according to law, and shall not illegally collect, use, process, or transmit the personal information of others, and may not illegally buy, sell, or disclose the personal information of others. 61 There are two opinions regarding the relationship between Article 110 and Article 111. The first is that Article 110 is lex generalis and Article 111 is lex specialis: Protecting personal information-Article 111-is to enhance the protection of privacy-Article 110-in the digital economy. The second opinion is that Article 111 is not lex specialis, as opposed to Article 110, because personal information is different from privacy. This second opinion is endorsed by the recently enacted Chinese Civil Code. 62 Enacted on May 28, 2020, this unprecedented Civil Code is considered a significant milestone of the rule of law and a profound symbol of the prosperity of China. 63 Article 1032 of the Chinese Civil Code defines privacy as "the tranquility of the private life of a natural person, and the private space, private activities, and private information that he is  Id. art. 110. 61 Id. art. 111. 62 unwilling to be known to others"; and Article 1033 provides that the right to privacy should be protected as erga omnes. 64 Articles 111 and 1034-37 address personal data, but, focus on collection and processing of personal data according to principles of legality, proportionality, and necessity. 65 Namely, the provisions for privacy focus on non-instruction of privacy, while those for personal data highlight how to legally use personal data. Therefore, the right to privacy and the right to personal data are distinguishable.
The second opinion has also gained wide support from Chinese scholars. 66 Their arguments can be summarized as follows. 67 First, privacy focuses on protection of an individual's personal information. 68 In contrast, personal data protection in the digital economy emphasizes protection of personal data of a collective of individuals. 69 This is because the digital economy relies on big data, which requires a collective of individuals' information rather than on an individual's information. 70 Second, being a protector is the main role for a state regarding an individual's privacy. In contrast, big data of personal information is a valuable resource for a state to develop its digital economy, maintain social stability, and safeguard national security. 71 Therefore, a state not only protects personal data but also has an interest in accessing, collecting, and analyzing personal information. 72 Third, data collectors-for example, data companies-contribute to the value of personal information, because if personal data is not collected and processed, it has no value. 73 In contrast, the right to privacy is against collecting and processing, and its value lies in "being left alone." 74 As a conclusion, personal data protection is not an absolute right like privacy or property ownership, and its protection is comparatively weaker. 75 Distinguishing personal data from privacy can also find support in other Chinese legislation and judicial practice. For example, the Provisions of the Supreme People's Court on Several Issues about Applicable Law in Civil Cases of Using Information Network to Infringe Personal Rights and Interests (SPC Provisions on Applicable Law for Personal Rights Infringement) also suggest that not all personal data can be considered as privacy. 76 Article 12.1 provides that Internet users or network service providers shall not use the Internet to disclose personal privacy and other 64 Id. art. 1033 provides limited exceptions-for example, circumstances prescribed by law and consented by a right holder-to intrusion of privacy. 65 Id. arts. 111, 1034-37. Article 1034 provides that private information in personal data shall be governed by the provisions on privacy right. Where there are no provisions, the provisions on the protection of personal information shall apply. The Civil Code does not specify the type of personal data that should be considered as private information.   personal information. 77 Article 87 of the E-commerce Law also provides that "if a State functionary : : : sells or illegally provides others with the personal information, privacy and trade secrets that come to his knowledge in the performance of his duties, he shall be subject to legal liability according to law." If personal data were to be equal to privacy, the italicized part of this provision would be redundant.
Ye Zhu v. Baidu, the first case on privacy protection concerning cookie technology, 78 sheds light on the differences between privacy and personal data. 79 Baidu.com-China's largest Internet search engine-employs Cookie technology to record and track the search keywords used by a customer, and provide tailor-made advertisements for this customer. 80 Zhu alleged that Baidu.com invaded her privacy; Baidu, without her permission, recorded keywords she searched, such as "breast enhancement," "weight loss,"and "abortion," and used these keywords to provide advertisements to her. Baidu argued that Cookie technology was a lawful, basic, and neutral technology, and had been used by Google, Yahoo, Amazon, and other Internet service providers. Further, the Cookies collected by Baidu did not include any identifiable personal informationthat is, as a search provider, Baidu would not be able to locate a specific individual who used its service. The advertisement relating to the search keywords that Zhu used appeared only on Zhu's computer and was not published by Baidu to other parties. Baidu, therefore, contended that it did not infringe on Zhu's privacy. The Nanjing Intermediate People's Court, as the appellate court, agreed with Baidu and held that there was no invasion of privacy for three primary reasons. First, the information collected by Baidu was not personal because it could not identify Zhu. Cookie technology identified a particular browser rather than a certain user. Thus, when the same user used a different browser to search the Internet, Baidu identified this user as a different user. Second, Baidu did not publish Zhu's personal information because Cookie technology conducted machine-to-machine communication rather than machine to human. Third, the Baidu user's agreement allowed users to freely opt out of using Cookies. However, Zhu did not do so. The court also held that Cookie technology was widely used, and even if the Baidu user's agreement did not explain what Cookies were, an average person-like Zhu-should be assumed to understand this technology.
Ye Zhu helps us to understand how Chinese courts distinguish privacy from personal information. The court held that the records of keyword searches of an Internet user could reflect the user's activity history and Internet browsing preferences, so they were considered to be privacy attributes. However, if separated from the data subject, they could not identify the data subject, so they were not personal data. The court seems to suggest that if a piece of privacy information, used individually, cannot identify a data subject, this privacy information is not a piece of personal information. This is so even if the relevant piece of privacy information, combined with other information collected by a website, may be able to identify a data subject. For example, searching "weight loss" is an activity conducted by Zhu. Zhu does not want others to know of this activity, which should be considered as her privacy. However, "weight loss," as a searched keyword, is not personally related to Zhu and cannot identify Zhu. Therefore, keyword searches are not personal data.  80 This case relates to the usage of cookies, a widely used Internet technology. When an Internet user uses a browser to conduct searches on Baidu.com, cookie information automatically sent by Baidu will be saved on the user's browser. Through the connection established by the cookie, Baidu is able to identify the browser and predict the user's interest, and thus provide tailor-made advertisements.
Zhu, such as her location or her search habits. The court improperly ignores that the accumulated information may be combined to identify Zhu.
There are three different definitions of personal data co-existing in Chinese law. The first is provided in the Provisions on the Protection of Personal information of Telecommunications and Internet Users (Provisions), enacted by the China Ministry of Industry and Information Technology in September 2013. Article 4 defines a "user's personal data" as "(1) the user name, date of birth, ID number, address, telephone number, account number, and password that can be used alone or in combination with other information to identify an individual user, and; (2) the time, place, and the like of the user's use of the service." Article 4 does not require "the time, place, and the like of the user's use of the service" to identify an individual user. Nevertheless, the Ye Zhu court dismissed the application of Article 4 without a clear reason.
The second definition of personal data can be found in Article 67(5) of the Chinese Cybersecurity Law. It provides that personal data refers to various information-recorded by electronic or other means-that can be used alone or in combination with other information to identify an individual natural person, including but not limited to the person's name, birthday, personal identification number, biometric information, address, and phone number. The Chinese Cybersecurity Law was enacted by the Standing Committee of National People's Congress and came into effect in June 2017. This was after Ye Zhu was decided. The definition of personal data in Ye Zhu is inconsistent with the Chinese Cybersecurity Law, as personal data is the information, alone or jointly with other information, that can be used to identify a data subject.
The third definition can be found in the Information Security Technology-Personal Information Security Specification (Personal Information Security Specification), made jointly by the State Administration of Quality Supervision, Inspection and Quarantine, and the China National Standardization Administration. 81 It came into effect in May 2018. Article 3.1 defines "personal data as various information recorded electronically or otherwise that can identify a particular natural person or reflect the activity of a particular natural person, either alone or in combination with other information." This definition does not limit personal data to those pieces of information able to identity a particular natural person.
Among the three definitions, the one provided by the Chinese Cybersecurity Law is the most authoritative. The Chinese Cybersecurity Law was enacted by the Standing Committee of National People's Congress, which retains more stature and influence compared with the bodies that enacted the other two regulations. The Chinese Cybersecurity Law is also a more recent piece of legislation compared with the Provisions. The Personal Information Security Specification was made later in time compared with the Chinese Cybersecurity Law. But the Personal Information Security Specification is not a law. It serves as guidance of best practices for the industry. Its foreword provides that, if these Specifications contradict with law, the latter should prevail. Therefore, the definition under the Cybersecurity Law-which requires that personal information, alone and in combination with other information, should be able to identify a particular natural person-represents the prevailing view in China.

II. Consumer Right
The US law considers that the data subject's personal information may be used to exchange for Internet service-as opposed to the EU, where personal data is a fundamental right which cannot be traded. 82  provides that "it is the intent of the Legislature to further Californian's right to privacy by giving consumers an effective way to control their personal information." 83 Satisfying requirements under the law, a business can offer financial incentives to consumers for the collection and sale of their personal data. 84 At the federal level, the primary privacy enforcement agency is the Federal Trade Commission, whose jurisdiction is limited to regulate privacy violations by organizations who conduct "deceptive" or "unfair" information practices. 85 Therefore, commentators conclude that the US Privacy Act is a system of broad consumer protection laws that have "been used to prohibit unfair or deceptive practices involving the disclosure of, and security procedures for protecting, personal information." 86 Like the US, in China, consumer law also allows personal information to be traded. 87 Chinese consumer law requires data companies to clearly indicate the purpose, manner, and scope of the collection and use of information, and seek the consent of the consumers. 88 The personal information collected by the data companies must be kept strictly confidential and not be disclosed, sold, or illegally provided to others. 89 Chinese consumer law also offers explicit remedies for personal data breaches. For example, Article 50 provides that if a business operator infringes upon the consumer's personal data, the operator shall stop the infringement, restore the reputation, eliminate the influence, apologize, and compensate the loss. Article 56 also indicates that in cases where business operators infringe upon consumers' personal information, the Administrative Department for Industry and Commerce or other relevant administrative departments shall order corrections, and may-according to the circumstances of the case-impose warnings, confiscate illegal income, and levy fines. 90 If the circumstances are serious, the operator shall be ordered to suspend business for rectification and revoke the business license. 91 However, the difference between Chinese consumer law and its US counterpart is that the former is much more ambiguous than the latter regarding the competence, necessity, and proportionality to collect personal data. For example, in November 2019, a Chinese professor brought a case against Hangzhou Safari Park in the Hangzhou Huyang District People's Court. 92 The professor alleges that the Safari Park would like to mandatorily collect his facial features without his consent. 93 The professor bought an annual pass for the Safari Park for the period of April 2019 to April 2020. 94 In October 2019, without asking the professor's consent, the Park informed him that of content to consumers for free."). Sally Chapman, Consumer Data Privacy in a Networked World, HOMELAND SECURITY DIGITAL LIBRARY: ON THE HOMEFRONT BLOG (Feb. 23, 2012), https://www.hsdl.org/c/consumer-data-privacy-in-anetworked-world/. 83 CCPA at § 2(i). The rights include: (1) The right of Californians to know what personal information is being collected about them; (2) the right of Californians to know whether their personal information is sold or disclosed and to whom; (3) the right of Californians to say no to the sale of personal information; (4) the right of Californians to access their personal information; and (5) the right of Californians to equal service and price, even if they exercise their privacy rights. 84 Id.   Id.

94
Id. the annual pass system was updated and the old system was abolished; now, visitors must record their facial features at the Park, and the Park will use a facial recognition system to verify visitors' identities. 95 If a visitor refuses to record his or her facial features, the annual pass cannot be used, and a refund will not be issued. 96 The Park explains that using the facial recognition system will speed up the Park admission process and save consumers' waiting time. 97 What is stunning in this case is that the only way for the safari park to provide admission is to collect and use facial features of customers. Facial features are personal biometric information. They are with the natural person for his or her lifetime and cannot be changed. Facial features are more sensitive than fingerprints and other personal data because they are mostly exposed. For public safety and national security, government law enforcement departments, such as the border control and traffic regulation department, can collect this information. Hangzhou Safari Park is not a government department and collects facial features for commercial purposes. Even if it can ensure the collected information will be well protected, saving consumers' waiting time cannot justify the necessity and proportionality to collect such information. This case shows that while Chinese facial recognition technology is widely used, the law to regulate the competence, necessity, and proportionality to collect personal data is insufficient.

III. Property Right
Characterizing personal data as "property" derives from scientific research on the physical reality of information. 98 It reflects the need to delimit the ownership of data within the booming digital trade where personal data is treated as a product. 99 It is also appealing for data controllers to claim independent or shared property rights with the data subjects, especially when the controllers process information that is generated by machines based on anonymized personal data. 100 In 1905, the Supreme Court of the US held that data can be considered as property. 101 Moreover, the modern digital trade in transferring, licensing, and selling personal data has further fostered the view that personal data should be characterized as property. 102 Property scholars argue that "[p]roperty rights in information focus on identifying the right of a company or individual to control disclosure, use, alternation and copying of designated information." 103 In China, the People's Court Daily positively reported a judgment issued by the Hangzhou Internet Court in November 2019. 104 In this case, the plaintiffs operated an online database called Lvzhuang Wang, or "female clothing net." The defendant manages a competing online database called Zhongfu 95 Id.

98
Rolf Landauer, Information is Physical, 44 PHYSICS TODAY 23-29 (1991). 99 Kenneth C. Laudon, Markets and Privacy, 39 COMM. ACM 92 (1996) (proposing property rights in personal data as a way to protect privacy). 100 For example, this includes non-personal data or value-added data created by data companies from basic data collected from data subjects. Wang, or "China clothing net." Many users who registered with the plaintiffs also registered with the defendant. Twenty-four users of the defendant's database authorized the defendant's staff to use their IDs and passwords to access their accounts on the defendant's website. Because many users may use the same IDs and passwords on different websites, the defendant's staff used the "crashing the library" technology to log into the twenty-four users' accounts on the plaintiff's website. 105 Consequently, the defendant downloaded information valuable to clothing dealers from the plaintiffs' website. The plaintiffs brought an unfair competition claim against the defendant. The defendant argued that the plaintiffs' user agreement did not specify who was the owner of the users' IDs and passwords; even if the defendant misused the users' IDs and passwords, it should be the users, not the plaintiffs, to claim the right to the users' IDs and passwords. The court rejected this argument, holding that the users' IDs and passwords were property and should be protected. Furthermore, the court held that the IDs and passwords were highly correlated with the users' identity authentication, and the property right generated by this information was like that of computer information system data, so the rights of the users' IDs and passwords should belong to the website-in this case, the plaintiffs.
The property right argument is deeply problematic. In the above case, it is doubtable that a data controller can obtain absolute property rights over data collected from data subjects. This is because the data controller has to use personal data strictly according to the agreements with the data subjects. Moreover, the data controller does not exclusively possess personal data. Data subjects can provide the same piece of personal data to other data controllers. Nevertheless, the data controllers invest time, money, and energy in compiling, organizing, or processing personal data. Alternatively, personal data may be generated while data subjects use the Internet service provided by the data controllers. Therefore, the data controllers have legitimate interests in the personal data they collect. However, this legitimate interest is not a property interest in personal data. Rather, it is a property interest that lies with the data controller, who invested in the process of gathering personal data under the guise that they would not be taken advantage of by other competing data controllers.
Further, in the American context, the property right theory is criticized because there are strong policy reasons, such as First Amendment civil liberty, against marking all personal information as property. 106 However, in China, the property right argument is doomed to fail for a reason not existing in the American context. The property right argument can enhance every data subject's right of self-determination and control of his or her data. Yet, such self-determination and control are inconsistent with the Chinese government's digital surveillance measures that rely on gathering a huge amount of personal data. 107 These data are collected under an over-comprehensive concept of national security without proper judicial review and public transparency supervision. Although the Chinese Civil Code provides that the collection and processing of personal information is subject to the principles of legality, proportionality, and necessity, 108 there are not many genuine opportunities for Chinese consumers to say no and find convenient alternatives for many basic services in China. For example, Chinese consumers are required to use facial recognition as a 105 "Crashing the library" means that the hacker generates the corresponding dictionary table by collecting the account and password information that has been leaked on the Internet, and tries to log in to other websites in batches to obtain a series of users' accounts that can be accessed. Many users use the same account password on different websites, so the hacker can try to log in to Website B by obtaining the user's account on Website A. precondition to receive mobile phone and banking services in China. 109 There is no alternative for them except providing their facial features. If there is no genuine consent, how can the legality of collecting facial biometric information be decided? If consumers do not know what facial information is collected, how to process it, and where to store it, it is hard to determine proportionality. Moreover, the most common justification for granting property rights is to enable efficient and effective allocations of scarce resources. This does not seem to apply to facial biometric information or personal data, because in digital society, "[w]hat is scarce is information privacy, not personal data." 110 Therefore, the rhetoric of property law is also inconsistent with the right to personal data as a personality right in China.
The limitation of applying property law to personal data raises the question whether personal data can be considered as a copyright in the context of intellectual property protection? Personal data may not satisfy the threshold in becoming an original work, trademark, or patent. 111 For example, "female" as a gender is an important piece of personal information for an individual but cannot be regarded as an original and creative work under the copyright law. 112 In Shanghai Hantao Information Consultation Co. v. Aibang Juxin (Beijing) Technology Co., the No. 1 Intermediate People's Court in Beijing held that if a comment provided by an individual customer expresses his or her original thoughts, character, emotions, and experiences, this comment would be considered as a work under the Chinese Copyright law. However, the plaintiff in this case failed to prove that every comment on its platform satisfied the originality and creativity requirement under the Chinese Copyright Law. 113 Shanghai Hantao Information Consultation Co. is like Feist Publ'ns, Inc. v. Rural Telephone Serv. Co., where the Supreme Court of the US also concluded that it is difficult to justify copyright protection unless sufficient creativity exists in the development of databases of factual information. 114

C. Spread-Out Unilateral Applicable Law Approach
The second stage of conflict-of-laws analysis involves identifying connecting factors. The US, EU, and China either adopt connecting factors leading to the law of the forum or consider their data protection laws as mandatory law. Consequently, they predominantly apply lex fori to data disputes in torts, contracts, and equity, with little consideration of the conflicting foreign laws that transnational personal data may involve.

I. Lex Fori Based on Connecting Factors and Mandatory Law of the Forum
2019 has witnessed numerous seminars on topics such as "GDPR 18 Months On: Insights on Enforcement and Compliance for Non-EU Agencies" and the like. 115 The connecting factors adopted by the EU GDPR go beyond the traditional ones for natural persons, such as habitual residence or active citizenship. Article 3.2 of the GDPR provides that it applies to the offering of free or paid goods or services to the data subject who is in the EU. 116  if the controller or processor envisages offering goods or services to data subjects in the EU, such as using a language or currency generally used in one or more EU member states, or targeting EU customers. 117 The GDPR also applies if the data subject's behavior is monitored, so far as their behavior takes place in the EU. 118 This broad territorial scope enables the GDPR to be applied as a mandatory law to a large number of data subjects who are non-EU residents or citizens. 119 In the US, data protection law also has a broad territorial scope. A foreign business that collects, holds, transmits, processes, or shares a US resident's personal information is subject to US federal data protection laws and may also be subject to relevant state-based laws in the state where the data subject resides. 120 The newly-enacted California Consumer Privacy Act applies to companies collecting personal information from California residents who satisfy at least one of three requirements, indicating the requisite nexus with California: (1) Having over $25 million in annual gross revenue; (2) buying, receiving, selling, or sharing for commercial purposes the personal information of 50,000 or more Californian consumers, households, or devices; or (3) deriving 50 percent or more of their revenue from the sale of California consumers' personal information. 121 Commentators have criticized that the thresholds of the nexuses are so low so as to cover not only big companies but also many small-and medium-sized businesses. 122 Nevertheless, this low threshold ensures that more California resident consumers can benefit from the Consumer Privacy Act.
The Chinese Cyber Security Law provides for personal data protection. 123 Article 2 states that the construction, operation, maintenance, and use of networks, as well as the supervision and management of networks in China, shall be subject to this law. 124 The Provisions on Online Protection of Children's Personal Information provides that it shall apply to the collection, storage, use, transfer, disclosure, and other activities relating to children's personal information that are conducted online within the territory of China. 125 The Safety Assessment Guide for Data Transferred Outside of China, Draft for Public Comments in 2017, provides that it applies to a foreign data controller or processor that is not registered in China but provides products or services to people in China. 126 The factors to determine whether a foreign data controller or processor operates in China or provides products or services to people in China include, but are not limited to, advertising in Chinese, using Chinese currency, and providing logistics service to 117 Id. at rec. 23. 118 Id. at art. 3.2. Monitoring means tracking a natural person on the Internet-by using data processing techniques such as profiling-to analyse or predict her or his personal preferences, behaviors, and attitudes. See id. at rec. 24. China. 127 The Safety Assessment Guide for Personal Data Transferred Outside of China, Draft for Public Comments in 2019, explicitly indicates that it applies to companies registered outside of China but collecting personal information of people in China via the Internet. 128 Like their US and EU counterparts, these connecting factors enable these Chinese data protection laws to cover a broad territorial scope.
Moreover, data protection laws may be considered as mandatory law and directly apply to foreign-related civil relations without the guidance from the conflict rules. In China, the connecting factor to determine the applicable law for the personality right is a person's habitual residence. 129 In 2012, the Supreme People's Court issued a judicial interpretation that defines mandatory law as "provisions of the laws and administrative regulations that involve the social public interest of China, that the parties concerned cannot exclude their application through an agreement, or that are directly applicable to foreign-related civil relations without the guidance from the conflict rules." 130 The judicial interpretation provides that the following situations are mandatory law: Involving the protection of the interests of labors; involving food or public health safety; involving environmental safety; involving financial safety such as foreign exchange administration; involving anti-monopoly or anti-dumping; or other situations that should be recognized as mandatory provisions. 131 In the context of COVID-19, if a law for public health safety requires the releasing of personal information, this law should be applied because it is a mandatory law and consequently, foreign laws should be excluded. Applying this interpretation to the COVID19 case discussed in the first paragraph of this Article, although that lady's habitual residence is Australia, Australian law should not be applied because Chinese law for COVID-19 is a mandatory law. On February 4, 2020, the China Central Cyber Security and Informatization Commission issued a Notification on Protecting Personal Information and Using Big Data to Support Joint Prevention and Control of Disease. 132 Therefore, this Notification should be applied to international travelers whose habitual residences are not in China. Yet, if a law for personal information protection has nothing to do with protecting public health, the question arises whether this law is a mandatory law. The answer depends on whether this law involves the social public interest of China. 133 Personal data protection laws, such as the Chinese Cyber Security Law, The Provisions on Online Protection of Children's Personal Information, and Consumer Law, address the social public interest of China. Therefore, they should be considered as mandatory laws.

II. Curtailing Party Autonomy
The user's agreement between a data subject and a data controller is a consumer contract; so unsurprisingly, party autonomy regarding the law to protect personal data is usually restricted by the mandatory law discussed in Section I, Lex Fori Based on Connecting Factors and 127 Id. at Article 3.6 provides that "processing" means any operations involving personal information and important data, including collecting, saving, accessing, revising, transferring, publishing, anonymizing, de-labeling, retrieval, erasure, destruction, or other operations. Mandatory Law of the Forum. The contract between a data controller and a processor is not a consumer contract. Yet, party autonomy for the applicable law is also restricted in the contract between the data controller and the processor.
In the EU, a data controller and a processor can conclude data-processing contracts. 134 However, parties are not allowed to use contractual choice of law clauses to diminish the personal data protection provided by the GDPR. This is for two reasons.
First, for the contractual relationship between a data controller and a data processor, if a controller or a processor is established in the EU, the GDPR applies to the processing of personal data in the context of its activities. 135 It does not matter whether the processing takes place in the EU or not. 136 The leading authority for defining "in the context of the activities of an establishment" is the Weltimmo case. 137 Weltimmo was registered in Slovakia 138 and managed a property dealing website concerning Hungarian properties. It had no registered office or branch in Hungary. However, the owner of Weltimmo lived in Hungary and the website was written exclusively in Hungarian. Weltimmo had also opened a bank account in Hungary for the recovery of its debts and had a letter box for everyday business affairs. It hired a representative in Hungary to negotiate the settlement of its unpaid debts with its advertisers. The Court of Justice of the EU (CJEU) held that "in the context of the activities of an establishment" should be broadly interpreted. 139 More specifically, the concept of "establishment" emphasizes the effective and real exercise of activity through stable arrangements. Within this construction, the legal form of such an establishmentfor example, an entity with or without a legal personality-is not determinative. 140 The "establishment" extends to any real and effective activity based on the stable arrangements. 141 Accordingly, the CJEU held that Weltimmo pursued a real and effective activity in Hungary. The Court further held that the operation of loading personal data on an Internet page should be considered to be "processing." 142 Therefore, Hungarian law should be applied to Weltimmo. Another leading authority is the Google Spain case. 143 In this case, the processing of the relevant personal data took place exclusively in California by Google US. Google Spain possessed a separate legal personality and provided support to the Google group's advertising activity. The activity of Google Spain was separate from the search engine service in California. The CJEU held that Directive 95/46, the predecessor of the GDPR, should be applied as the processing of data in the US was carried out in the context of the activities of Google Spain. The activity of Google Spain was inextricably linked with the search service provided by Google US because without the advertising space, the search engine would not be economically profitable and may not be able to perform. 144 Second, there is a question of whether a data controller can disclose personal data to an overseas processor and contract for a law providing a lower standard of privacy protection than the law of the controller's place of registration. The answer is negative in the EU. The personal information collected in the EU can be disclosed only to overseas processors located in a jurisdiction recognized by the EU as a jurisdiction that offers equivalent data protection laws. In the case of 134 GDPR, supra note 18, at rec. para. 40; EU Data Protection Directive, supra note 28, at art. 26. 135 GDPR, supra note 18, at art. 3.1. 136 Id. Weltimmo did not carry out any activity in its place of registration and often changed its registered office from one state to another. Google Spain SL, Case C-131/12. 144 Id.
outsourcing to a country without equivalent data protection laws to the EU's laws, the GDPR requires the controller to apply adequate safeguards with respect to the protection of the privacy and fundamental rights and freedoms of individuals. 145 Therefore, parties are not allowed to select a law providing a lower standard of protection. This conclusion is also supported by judicial practice. In the German case Facebook v. Independent Data Protection Authority of Schleswig Holstein, 146 the general terms and conditions of Facebook contained a clause according to which, for German users, German law applied. The German court pointed out that, according to the Rome I Regulation, it was in principle possible to make an agreement on applicable law for the contract but not on data protection law. This was on account of the provisions on data protection-falling within the concept of overriding mandatory provisions-within the meaning of Article 9 of the Rome I Regulation, making it impossible for the parties to make an agreement on applicable law in this regard.
Different from the EU, Chinese law does not generally limit party autonomy in the choice of applicable law for contracts between a data controller and a processor. However, Chinese law does not allow a data controller to disclose personal data of a child to an overseas processor and contract for a law providing a lower standard of privacy protection than Chinese law. The Provisions on Online Protection of Children's Personal Information provides that if a network operator transfers personal information of children to a third party, it shall conduct its own safety assessment, or engage an independent organization to conduct the same. 147 If a network operator entrusts a third party to process personal information of children, it should also conduct a security assessment of the entrusted party. 148 The entrustment contract between the network operator and the entrusted party shall provide that, among others, personal information of children shall be handled according to Chinese law and the entrusted party is not allowed to transfer the commission. 149 The purpose in restricting party autonomy in the contract between a data controller and a processor is to protect data subjects. There is often no direct contractual relationship between the data subject and the data processor, because the latter may not directly collect personal data from the former and, instead, the latter often obtains the data from a data controller. However, the right of the data subject against the data processor is derived from the contract between the data subject and the data controller. The contract between the data controller and the data processor should not impose any obligations on the data subject, and it should ensure that the data subject's information is well protected. Namely, the data subject is the third-party beneficiary of the contract between the data controller and the data processor. Restricting party autonomy in the contract between a data controller and a processor is consistent with the mandatory nature of personal information law to protect data subjects.

III. Applying Lex Fori in Equity Cases
Besides torts and contracts, a personal data breach may also be pursued as a breach of confidence claim in the UK and other commonwealth countries. The lex fori approach leads to the application of forum law-the same result as applying mandatory law and curtailing party autonomy discussed in previous sections. For  Provisions on Online Protection of Children's Personal Information, supra note 125, art. 17. 148 Id. art. 16. 149 Id.
a breach of personal privacy that was framed as a breach of confidence claim.'" 150 Traditionally, both the principle and the balance of AngloAustralian authority favored the general application of lex fori in equity cases. 151 Although the leading Australian case, Murakami v. Wiryadi & Ors, qualifies this approach by providing an unexhaustive list of exceptions, it never replaced the traditional lex fori approach. 152 Similarly, this approach was upheld by the Court of Appeal in the UK in Douglas v. Hello!. This case concerned the unauthorized publication of the Douglas' wedding photos in the UK. Subsequent to Michael Douglas and Catherine Zeta-Jones's wedding in New York, a member of the paparazzi took unauthorized photos of this wedding and sold them to Hello! Magazine. The couple brought a claim for breach of confidence in the UK. Though Hello! Magazine argued that the proper law should be the law of New York-where the unjust enrichment occurred 153 -this argument was effectively rejected by the Court of Appeal, who instead applied the English law of confidence to protect individual privacy. 154 Although the place of intrusion was New York, the court held that it was the English law of confidence that provided the remedy. This was consistent with the longstanding tradition of courts of equity using public policy concerns of the forum to exclude the operation of foreign law. 155 Scholars have advocated for other conflict of laws rules in breach of confidence cases. 156 However, it is undeniable that lex fori is the general rule for breach of confidence claims, which is most relevant in data breach cases.

D. De-Americanization of Substantive Data Protection Law
The nature of the right to personal data is characterized differently in the EU, the US, and China. Due to the mandatory nature of personal data protection law and the connecting factors leading to the law of the forum, the applicable law for transnational personal data depends on a race to courthouses or regulators. 157 Meanwhile, the domestic substantive data protection laws are experiencing a de-Americanization movement. The relationship between Internet data corporate giants and states needs to be reconsidered. The conventional wisdom is that Internet companies act, only to a small extent, in the shadow of state law. 158 Appearances, however, can be deceptive. These giants have to comply with the law of their domiciles, which is often US law. The developmental trend to regulate the Internet industry-especially the part of that industry concerned with data-has moved from Americanization to deAmericanization. This was triggered by the combination of legislative and nonlegislative approaches in the EU and China. Iconic examples include the passing of the GDPR in the EU, the Christchurch Call initiated by New Zealand and France, the Huawei ban, and the COVID-19 online propaganda that divide China and the US/EU. In this case, the Court also considered whether the action should be characterized as a tort and acknowledged that it was "shoehorning" the claim into an equity claim.

I. Americanization
Professor Jack M. Balkin indicates that "[c]urrently the Internet is mostly governed by the values of the least censorious regime-that of the United States." 159 From the perspective of conflict of laws, this phenomenon can be explained by the significance of the law of domicile. The main global Internet players are US companies and industry associations registered in the US. Among the top ten Internet companies in the world, six are US companies: Amazon, Google, Facebook, Netflix, Booking, and eBay. 160 The domicile of a data company is significant, sometimes determinative, in identifying the law that would apply to protect personal data collected by the company. The US data regulatory environment features freedom of speech, 161 industry self-regulation, 162 the Federal Trade Commission's consent decrees, 163 and weak consumer privacy regulations. 164 The domicile of a company is also important for the purpose of judgment recognition and enforcement. 165 Consequently, it is concerned about whether a domestic law on personal data protection can be respected in other jurisdictions. In LICRA & UEJF v. Yahoo! Inc. & Yahoo France, Yahoo! was ordered by a French court to block French users from accessing the auction site on Yahoo.com offering Nazi memorabilia in contravention of French law. 166 Yahoo! was domiciled in the US. Unsurprisingly, it went to a US district court and successfully obtained a judgment declaring that the French judgment was not recognizable or enforceable because it violated the First Amendment of the US Constitution. 167 Although the district court judgment was reversed at the appellate level on the grounds of a lack of personal jurisdiction on LICRA & UEJF and the "ripeness" of the enforcement claim, it nevertheless demonstrates that the First Amendment to the US Constitution can potentially be used to protect US-domiciled websites from enforcing foreign judgments. 168 Similarly, in Google Inc. v. Equustek Solutions Inc., Google was required by a Canadian court to block websites violating Canadian law. 169 Google, yet another company with a domicile in the US, obtained a judgment at its home court that rendered the Canadian judgment unenforceable. 170 Furthermore, the US Securing the Protection of our Enduring and Established Constitutional Heritage Act (SPEECH Act 2010) expressly prohibits the recognition and enforcement of foreign defamation judgments against online providers, unless the defendant would have been liable under US law. 171 entered into legally binding conventions or instruments relating to the protection of personal data. 184 The adequacy decision is not a final decision. The European Commission should conduct a periodic review at least quadrennially 185 and monitor developments in countries that receive a positive adequacy decision. 186 Besides the GDPR, another important global effort to curtail the impacts of lax US internet regulations is the Christchurch Call. On March 15, 2019, a gunman attacked two mosques in Christchurch, New Zealand. 187 The gunman livestreamed the massacre at the first mosque on his Facebook page. The attacks killed 51 people. 188 According to § 230 of the Communications Decency Act (CDA), an internet intermediary like Facebook is immune from civil liability caused by third-party contents. 189 Therefore, by applying US law, Facebook would have no liability for allowing the gunman to livestream the massacre online. 190 On May 15, 2019, New Zealand Prime Minister Jacinda Arden, French President Emmanuel Macron, heads of many other states, and leaders of technology companies all adopted the Christchurch Call. 191 The Call aims to "bring together countries and tech companies in an attempt to bring to an end the ability to use social media to organise and promote terrorism and violent extremism." 192 Online service providers, including Facebook, have committed to take transparent and specific measures to prevent the uploading of terrorist and violent extremist content, and to stop its dissemination on content-sharing services. 193 Unlike the GDPR, the Christchurch Call is non-binding. Nevertheless, it has gained wide support in Oceania and the EU, and its soft-law nature may help to promote its popularity in the global community. Thus far, the Call has been signed by seventeen countries, ranging from developing countries like Senegal and India to developed countries such as Japan and Germany. 194 Many big-name US Internet companies have endorsed the Call. 195 Unlike the GDPR and other legislation, the Christchurch Call represents a non-legislative approach, which is increasingly used to obtain compliance of US Internet giants. 196 An important difference between a legislative and non-legislative approach is that the latter can circumvent the difficulties of enforcing foreign judgments under the SPEECH Act in the US. 197 This is because industrial compliance is embodied in the terms of service and can be applied all over the world. 198 In contrast, a court judgment may be enforced only in the judgment-rendering state. 199 If it is not recognizable and enforceable in the state where the company is domiciled-for example, the US-its efficacy is limited. Its global impact is further limited by the insufficient international mechanism for recognition and enforcement of judgments. 200

China
China is another strong proponent of de-Americanization of data industry regulations. It does so for reasons very different from the EU. The EU promotes de-Americanization because it considers protecting personal data a fundamental human right and the US laissez-faire protection insufficient. For China, the main drive for de-Americanization is national security. This drive has been boosted by two recent incidents.
The first is the US Huawei ban. 201 Huawei is a leading Chinese 5-G manufacturer and the second-largest smartphone manufacturer in the world. 202 On May 16, 2019, President Donald Trump added Huawei to the US blacklist and banned US companies from doing business with them, without first obtaining US government approval, 203 on the allegation that Huawei posed "threats against information and communications technology and services in the US." 204 Due to the ban, companies that stopped supplying Huawei include not only US companies, such as Google and Intel, but also non-US companies, including the UK's ARM and Vodafone, 205 Germany's Infineon, 206 and Japan's KDDI and Docomo. 207 These non-US companies have production lines in the US and are thus concerned over the US sanction in the case of noncompliance. Although the Huawei ban was issued by the US government, it has led to a broad snowball effect to largely preclude Huawei from the global supply chain. The Huawei Ban teaches a vivid lesson to private companies domiciled in China and other countries which are traditionally not allies to the US: Even though they are registered outside of the US, they are still subject to US law by relying on the global supply chain that is dominated by US companies and industry associations. Consequently, they may have to join the internet sovereignty camp. Previously, the internet sovereignty camp was constituted by states such as China and Russia, rather than 198 private technology companies. 208 Internet sovereignty is often considered to be more concerned with national security than private commercial interest. The prominent example is China's 2017 Cybersecurity Law aiming to "safeguard cyber security, protect cyberspace sovereignty and national security." 209 However, the Huawei Ban may drag private companies domiciled in non-US allies into the internet sovereignty camp because the US does not treat companies as separate legal entities from the strate that they domicile. Therefore, the Huawei Ban will promote the deAmericanization in the data industry.
The second incident is the global pandemic of COVID-19. As discussed in Section I, Lex Fori Based on Connecting Factors and Mandatory Law of the Forum, the Notification on Protecting Personal Information and Using Big Data to Support Joint Prevention and Control of Disease is a mandatory law and should be applied to international travelers in China. 210 This Notification provides that all localities and departments should attach great importance to the protection of personal information; except for those agencies authorized by the State Council's Sanitary and Health Department in accordance with China Cyber Security Law, the Law on Prevention and Control of Infectious Diseases, and Regulations on Public Health Emergencies, no other unit or individual may use personal information on the grounds of epidemic prevention and control or disease prevention without the consent of the person being collected. 211 Where laws and administrative regulations provide otherwise, they shall be implemented accordingly. 212 The collector of personal information necessary for joint prevention and control should refer to the national standard of Personal Information Security Regulations and adhere to the principle of minimum collection. 213 The collection object is limited to key groups-such as diagnosed persons, suspects, and close contacts in principle-and is generally not targeted at specific areas, to prevent de facto discrimination against specific geographic groups. 214 Personal information collected for epidemic prevention and control and disease prevention shall not be used for other purposes. 215 No entity or individual may disclose personal information such as name, age, identity card number, phone number, or home address without the consent of the person from whom the data is collected, except for the joint disease defense and control work. 216 All personal information used should be desensitized and anonymized. 217 Therefore, the Chinese media violated this Notification in the COVID-19 case discussed in the first paragraph of the Article, because they published that lady's detailed personal information without her consent. The collection and release of her information did not comply with the minimum principle because her employment information, the university from where she graduated, and the year of her graduation have nothing to do with disease prevention and control.
According to the Notification, the Chinese network information department shall promptly deal with the illegal collection, use, and disclosure of personal information, and incidents that cause a large amount of leakage of personal data in accordance with China Cyber Security Law and related regulations. 218 The police department should severely crack down on relevant crimes according to law. 219 Yet, the Chinese authorities have not done anything to remedy the 208 personal information violation caused to the lady discussed in the first paragraph of this Article. This reveals two issues. First, compared with the EU GDPR, the enforcement mechanism of the Notification and other Chinese law for personal data protection is much weaker. Violating the GDPR can result in a fine of up to €20 million, or up to 4% of the annual worldwide turnover of the preceding financial year, whichever is greater. 220 Comparatively, the China Cyber Security Law provides that personal data breaches can lead to a fine of up to ten times the illegal income; if there is no illegal income, the fine is less than RMB 1 million. 221 Second, Chinese law for personal information protection is subject to China's national interest. This is especially true for COVID-19 online propaganda. In January and early February 2020, Chinese media widely reported that the spread of COVID-19 was due to people who sold and ate wild animals illegally. 222 However, with COVID-19 spreading to the rest of the world, the Chinese media has begun to publish articles criticizing the US as the origin of the disease since March 2020. 223 It is not the intention of this Article to discuss what is the origin of COVID-19 and who should be liable. The point is that the sharp divide between China and the US regarding the origin of COVID-19 and the relevant state liability will further push China to firmly control online media and Internet companies located in China. De-Americanization is consistent with China's national interest.

E. Dynamics Among Trends
Three trends have emerged at each stage of identifying the applicable law for transnational personal data: (1) The EU, the US, and China characterize the right to personal data differently, (2) the spread-out unilateral applicable law approach comes from the fact that all three jurisdictions either consider the law for personal data protection as a mandatory law or adopt connecting factors leading to the law of the forum, and (3) the EU and China strongly advocate de-Americanization of substantive data protection laws. These trends are developing and interacting with one another. Their dynamics are two-fold.
At the macro level, the trends are consistent with one another. The multi-faceted legal nature of the right to protect personal data fosters the spread-out unilateral applicable law approach. Consequently, de-Americanization has been supported by the EU and China. All the trends embody the fundamental value and national interest of states. However, because these values and interests are so diverse, the trends demonstrate the regulatory competition among states on personal data in transnational contexts. For instance, the US overarchingly values the freedom of speech, thus elucidating their adoption of lax data regulation and blockage of foreign judgments that violate the First Amendment of the US Constitution. Contrarily, in the EU, privacy of personal data is considered a fundamental human right. Therefore, it is unsurprising that the GDPR imposes broad extra-territorial jurisdiction. Chinese data governance derives from the national interest in using personal data as a valuable resource to develop the data industry and maintain social stability. Therefore, China distinguishes the right to personal data from the right to privacy and supports de-Americanization.
At the micro level, if we look into each individual trend, it is apparent that the divergent laws adopted by each jurisdiction in that trend are not actually reconcilable. The typical example is the industry self-regulation of personal data in the US that conflicts with the laws in China and the 220 For a list of fines and notices issued under the GDPR, see GDPR Fines and Notices, WIKIPEDIA, https://en.wikipedia.org/ wiki/GDPR_fines_and_notices (last updated June 17, 2020 EU, which clearly push for more government regulations-in other words, de-Americanization. However, in the de-Americanization camp, the differences existing in the laws adopted by the EU and China exceed nuance. Because the contents of substantive laws adopted by the US, the EU, and China are so different, coordination of substantive law at the regional level by the GDPR adequacy decisions actually leads to a wider gap internationally.

F. Conclusions
As German Chancellor Angela Merkel indicated at the Harvard University 368th Commencement Ceremony on May 30, 2019: "[A]re we laying down the rules for technology, or is technology dictating how we act? Do we prioritize people as individuals with human dignity with all the manifests or do we see them as many consumers, data sources, objects of surveillance?" These questions are especially relevant for protecting personal information of international travelers and combating COVID-19. According to conflict of laws, determining an applicable law in a transnational case requires three stages: characterization, connecting factors, and identifying a legal system. Using the incident where the personal data of an international traveler was illegally released by Chinese media, this Article identifies three trends that have emerged at each stage: the multi-faceted legal nature of the right to protect personal data, the spread-out unilateral applicable law approach, and the de-Americanization of substantive law for personal data protection. The trends and their dynamics provide valuable implications for developing the choice of laws for transnational personal data. First, the choice of laws aims to provide comity, consistency, and predictability to international civil litigations and discourage forum shopping. 224 Nevertheless, due to the spread-out unilateral applicable law approach and the consequent lesser possibility of applying foreign law, the importance of choice of laws significantly decreases in cases of transnational personal data breach. This finding informs parties that jurisdiction is a predominant issue in data breach cases because courts and regulators would apply the forum law. Second, currently there is no international treaty or model law on choice-of-law issues for transnational personal data. International harmonization efforts will be a long and difficult journey considering how the trends demonstrate not only the states' irreconcilable interests, but also how states may consider these interests as their fundamental values that they do not want to trade off. Therefore, for states and international organizations, a feasible priority is to achieve regional coordination or interoperation among states with similar values on personal data protection.