1. bookVolume 11 (2021): Issue 2 (September 2021)
Journal Details
License
Format
Journal
eISSN
2674-4619
First Published
18 Jun 2013
Publication timeframe
2 times per year
Languages
English
access type Open Access

5G and Digital Sovereignty of the EU: The Slovak Way

Published Online: 15 Nov 2021
Volume & Issue: Volume 11 (2021) - Issue 2 (September 2021)
Page range: 25 - 47
Journal Details
License
Format
Journal
eISSN
2674-4619
First Published
18 Jun 2013
Publication timeframe
2 times per year
Languages
English
Abstract

Some recent views question the concept of sovereignty (especially the sovereignty of states), arguing that sovereignty is to be abandoned as a historical concept, because it existed in the world of the Westphalian system (created after 1648), where states were the major players, centers of power and objects of interest. Instead, we suggest that sovereignty should be perceived again as a “supreme power” (summa potestas), meaning a return to the pre-Bodinian concept of sovereignty and perceive it as a “power to exert control”. With regard to cyberspace, this does not mean direct control of all entities in the cyberspace, but only those that provide services which are perceived as “essential” or “critical” for the security and interests of the state. That is actually the approach taken with regard to ensuring the safety of 5G networks—through control imposed on the network operators, as required by the respective EU legislation and the EU Toolbox on 5G Networks specifically.

Keywords

Andraško, J.; Mesarčík, M. and Hamuľák, O. (2021), ‘The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework,’ AI & Soc., vol. 36, no. 2, pp. 623–636. https://doi.org/10.1007/s00146-020-01125-510.1007/s00146-020-01125-5 Search in Google Scholar

Camilleri, J. (1992), The End of Sovereignty? The Politics of a Shrinking and Fragmenting World, Aldershot: Edward Elgar Publishing Ltd. Search in Google Scholar

Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions 5G for Europe: An Action Plan, COM/2016/0588 final, 14.9.2016. Search in Google Scholar

Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions Secure 5G deployment in the EU - Implementing the EU toolbox, COM/2020/50 final, 29.1.2020. Search in Google Scholar

Communication from the Commission. Guidance to the Member States concerning foreign direct investment and free movement of capital from third countries, and the protection of Europe’s strategic assets, ahead of the application of Regulation (EU) 2019/452 (FDI Screening Regulation), 2020/C 99 I/01, OJ C 99I, 26.3.2020. Search in Google Scholar

Commission Recommendation (EU) 2019/534 of 26 March 2019 Cybersecurity of 5G networks, OJ L 88, C/2019/2335, 29.3.2019, pp. 42–47. Search in Google Scholar

Commission Staff Working Document 5G Global Developments Accompanying the document Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions 5G for Europe: An Action Plan, SWD/2016/0306 final, 14.9.2016. Search in Google Scholar

Directive 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, OJ L 194, 19.7.2016, pp. 1–30. Search in Google Scholar

European 5G Observatory (n.d.), [Home page]. Retrieved from http://5gobservatory.eu/ [accessed 11 Nov 2020] Search in Google Scholar

European Commission (2020), Secure 5G Networks: Questions and Answers on the EU Toolbox, 29.1.2020. Retrieved from https://ec.europa.eu/commission/presscorner/detail/en/qanda_20_127 [accessed 11 Nov 2020] Search in Google Scholar

Hamuľák, O. (2015), Lessons from the “constitutional mythology” or how to reconcile the concept of state sovereignty with European integration,’ DANUBE: Law, Economics and Social Issues Review, vol. 6, no. 2, pp. 75–90. https://doi.org/10.1515/danb-2015-000510.1515/danb-2015-0005 Search in Google Scholar

Hamuľák, O.; Kiss, L. N.; Gábriš, T. & Kocharyan, H. (2021), ‘This content is not available in your country. A general summary on geo-blocking in and outside the European Union,’ International and Comparative Law Review, vol. 21, no. 1, pp. 153–183. https://doi.org/10.2478/iclr-2021-000610.2478/iclr-2021-0006 Search in Google Scholar

Kabat-Rudnicka, D. (2020), ‘Autonomy or sovereignty: the case of the European Union,’ International and Comparative Law Review, vol. 20, no. 2, pp. 73–92. https://doi.org/10.2478/iclr-2020-001810.2478/iclr-2020-0018 Search in Google Scholar

Kasper, A. & Krasznay, C. (2019), ‘Towards pollution-control in cyberspa¬ce: problem structure and institutional design in international cybersecurity,’ International and Comparative Law Review, vol. 19, no. 2, pp. 76–96. https://doi.org/10.2478/iclr-2019-001510.2478/iclr-2019-0015 Search in Google Scholar

Lindahl, H. (2006), ‘Sovereignty and symbolization,’ in N. Walker (ed.) Relocating Sovereignty, Abingdon & New York: Ashgate Publishing, pp. 53–78. Search in Google Scholar

Maiolo, F. (2007), Medieval Sovereignty: Marsilius of Padua and Bartolus of Saxoferrato, Delft: Eburon Academic. Search in Google Scholar

National Security Office (2020), Draft bill to amend Act no. 69/2018, with comments, Office of the Government of the Slovak Republic, Department of Legislation of Other Central State Administration Bodies. Retrieved from https://www.slovlex.sk/legislativne-procesy/SK/LP/2020/400 [accessed 11 November 2020]. Search in Google Scholar

NIS Cooperation Group (2019), EU Coordinated Risk Assessment of the Cybersecurity of 5G Networks, Report, European Commission, 9.10.2019. Search in Google Scholar

NIS Cooperation Group (2020a), Cybersecurity of 5G Networks. EU Toolbox of Risk Mitigating Measures, CG Publications, European Commission, 01/2020. Search in Google Scholar

NIS Cooperation Group (2020b), Report on Member States’ Progress in Implementing the EU Toolbox on 5G Cybersecurity, European Commission, July 2020. Search in Google Scholar

Regulation 2019/452 of the European Parliament and of the Council of 19 March 2019 establishing a framework for the screening of foreign direct investments into the Union, OJ L 79 I, 21.3.2019, pp. 1–14. Search in Google Scholar

Regulation 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA Relevance), OJ L 151, 7.6.2019, pp. 15–69. Search in Google Scholar

Roguski, P. (2019), ‘Layered sovereignty: adjusting traditional notions of sovereignty to a digital environment,’ in 11th International Conference on Cyber Conflict: Silent Battle, Tallinn: NATO CCD COE Publications. https://doi.org/10.23919/CYCON.2019.875690010.23919/CYCON.2019.8756900 Search in Google Scholar

Tropina, T. & Callanan, C. (2015), Self- and Co-regulation in Cybercrime, Cybersecurity and National Security, Cham: Springer. https://doi.org/10.1007/978-3-319-16447-210.1007/978-3-319-16447-2 Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo