Abstract
Conflict of laws—also called private international law—is the set of rules or laws a jurisdiction applies to a case, transaction or other occurrences that has connections to more than one jurisdiction, for example, when the parties involved in a dispute are from different legal jurisdictions, when parties from different jurisdictions are engaged in a matter in yet another jurisdiction or when there are conflicting legal remedies for an issue which arises between legal jurisdictions.
This body of law deals with three broad topics: jurisdiction, rules regarding when it is appropriate for a court to hear such a case; foreign judgements, dealing with the rules by which a court in one jurisdiction mandates compliance with a ruling of a court in another jurisdiction; and choice of law, which addresses the question of which substantive laws will be applied in such a case. These issues can arise in any private-law context, but they are especially prevalent in contract and tort law.
In this chapter, we will discuss the concepts of jurisdictionality and how jurisdiction for a legal issue can be determined. We will discuss the personal connecting factors and determinants for jurisdiction to hear an issue. Finally, we will explore international law and related legal strategies in dealing with conflicting laws between jurisdictions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Part I of the Constitution Act, 1982. Canadian Charter of Rights and Freedoms, s 7, Part 1 of the Constitution Act, 1982, being Schedule B to the Canada Act 1982 (UK), 1982, c 11.
- 2.
Thomson v Minister of National Revenue, 1946 CanLII 1 (SCC), [1946] SCR 209. Available at: https://canliiconnects.org/en/cases/1946canlii1
- 3.
Office of the Children’s Lawyer v Balev. 2018 SCC 16.
- 4.
These words mean different things but both have been accepted in the jurisprudence.
- 5.
Agulian v Cyganik [2006] EWCA Civ 129. Available at: https://www.familylawweek.co.uk/site.aspx?i=ed1657
- 6.
IRC v Bullock [1976] 1 WLR 1178.
- 7.
Foote Estate, Re (2011), 493 AR 354 (CA), 502 WAC 354, 2011 ABCA 1.
- 8.
National Trust Co. Ltd. v Ebro Irrigation and Power Co. Ltd. [1954], 3 DLR 326 (Ont.H.C.).
- 9.
Gasque v Inland Revenue Commissioners [1940], 2 KB 80.
- 10.
Voyage Co. Industries v Craster [1998] BCJ No 1884 (Unreported) (BCSC).
- 11.
Club Resorts Ltd. v Van Breda, 2012 SCC 17 [2012] 1 SCR 572.
- 12.
Moran v Pyle National (Canada) Ltd. [1975] 1 SCR 393.
- 13.
Court et al. v Debaie, 2012 ABQB 640.
- 14.
“Pecuniary” means “related to money”.
- 15.
Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139169288.
- 16.
International Institute of Humanitarian Law (1995). San Remo Manual on International Law Applicable to Armed Conflicts at Sea (L. Doswald-Beck, Ed.). Cambridge: Cambridge University Press. doi:10.1017/CBO9780511622052.
- 17.
Program on Humanitarian Policy and Conflict Research at Harvard University (2013). HPCR Manual on International Law Applicable to Air and Missile Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139525275.
- 18.
Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (second ed.). Cambridge: Cambridge University Press. doi:10.1017/9781316822524.
- 19.
Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139169288.
- 20.
Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139169288.
- 21.
Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (second ed.). Cambridge: Cambridge University Press. doi:10.1017/9781316822524.
- 22.
The United Nations (1948). Universal Declaration of Human Rights.
- 23.
999 UNTS 171.
- 24.
- 25.
2225 UNTS 209.
- 26.
2171 UNTS 227.
- 27.
- 28.
- 29.
ETS 5.
- 30.
The United Nations (1948). Universal Declaration of Human Rights.
- 31.
The United Nations (1948). Universal Declaration of Human Rights.
- 32.
1577 UNTS 3.
- 33.
999 UNTS 171.
- 34.
- 35.
- 36.
- 37.
- 38.
- 39.
- 40.
- 41.
- 42.
Criminal Law of the People’s Republic of China (adopted at the Second Session of the Fifth National People’s Congress on 1 July 1979; revised at the Fifth Session of the Eighth National People’s Congress on 14 March 1997 and promulgated by Order No.83 of the President of the People’s Republic of China on 14 March 1997) https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf
- 43.
- 44.
Criminal Law of the People’s Republic of China (adopted at the Second Session of the Fifth National People’s Congress on 1 July 1979; revised at the Fifth Session of the Eighth National People’s Congress on 14 March 1997 and promulgated by Order No.83 of the President of the People’s Republic of China on 14 March 1997) https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf
- 45.
Xiaobing Li, Yongfeng Qin, “Research on Criminal Jurisdiction of Computer Cybercrime” in Procedia Computer Science, Volume 131, 2018, pp. 793–799. ISSN 1877–0509. https://doi.org/10.1016/j.procs.2018.04.263. (https://www.sciencedirect.com/science/article/pii/S1877050918306434).
- 46.
Criminal Law of the People’s Republic of China (adopted at the Second Session of the Fifth National People’s Congress on 1 July 1979; revised at the Fifth Session of the Eighth National People’s Congress on 14 march 1997 and promulgated by Order No.83 of the President of the People’s Republic of China on 14 March 1997) https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf
- 47.
- 48.
Federal Bureau of Investigation Internet Crime Report 2021. Available online at: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
- 49.
- 50.
Federal Bureau of Investigation Internet Crime Report 2021. Available online at: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
- 51.
- 52.
IBM. Cost of a Data Breach Report 2021. https://www.ibm.com/security/data-breach.
- 53.
Morgan, Steve. “Cybercrime To Cost The World $10.5 Trillion Annually By 2025” in Cyberwarfare In The C-Suite a Special Report by Cybercrime Magazine. 13 November 2020. Available online at: https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/
- 54.
Pete Boden. “The Emerging Era of Cyber Defense and Cybercrime”. Microsoft Security Blog. 27 January 2016. Available online at: https://www.microsoft.com/security/blog/2016/01/27/the-emerging-era-of-cyber-defense-and-cybercrime/
- 55.
“Protect your data through innovation” in AT&T Cybersecurity Insights: The CEO’s Guide to Data Security, Volume 5. Available online at: https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2021/01/attceocyberreport_compressed.pdf
- 56.
Rajinder Tumber. “Cyber Attacks: Igniting The Next Recession?” in Forbes. 5 January 2019. Available online at: https://www.forbes.com/sites/rajindertumber/2019/01/05/cyber-attacks-igniting-the-next-recession
- 57.
Kami Periman. “How to Prevent the Bank Robbery No One Can See” in Cisco Blogs. 29 August 2017. Available online at: https://blogs.cisco.com/financialservices/how-to-prevent-the-bank-robbery-no-one-can-see
- 58.
“German hospital hacked, patient taken to another city dies” in AP News. 17 September 2020. Available online at: https://apnews.com/article/technology-hacking-europe-cf8f8eee1adcec69bcc864f2c4308c94
- 59.
Emsisoft Malware Lab. “The State of Ransomware in the US: Report and Statistics 2019” in Emsisoft Blogs. 12 December 2019. Available online at: https://blog.emsisoft.com/en/34822/the-state-of-ransomware-in-the-us-report-and-statistics-2019/
- 60.
Dow Jones and Company Inc v Gutnick [2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255. https://adsdatabase.ohchr.org/IssueLibrary/HIGH%20COURT%20OF%20AUSTRALIA_Dow%20Jones%20and%20Company%20Inc%20v%20Gutnick.pdf
- 61.
Dow Jones and Company Inc v Gutnick [2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255. https://adsdatabase.ohchr.org/IssueLibrary/HIGH%20COURT%20OF%20AUSTRALIA_Dow%20Jones%20and%20Company%20Inc%20v%20Gutnick.pdf
- 62.
Massarani v Kriz [2022] FCA 80. https://www.judgments.fedcourt.gov.au/judgments/Judgments/fca/single/2022/2022fca0080
- 63.
Newman v Whittington [2022] NSWSC 249. As per: https://www.natlawreview.com/article/and-so-it-begins-first-consideration-serious-harm-threshold-australian-defamation
- 64.
Lachaux v Independent Print Ltd [2019] UKSC 27, [2020] AC 612, [2019] 4 All ER 485, [2019] 3 WLR 18, 169 NLJ 7845, [2019] All ER (D) 42 (Jun). Available online at: https://www.lexiswebinars.co.uk/legal/tmt/defamation-claims-post-lachaux-2020/supporting-materials/Lachaux-v-Independent-Print-Limited-2019-UKSC-27.DOC.pdf
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lukings, M., Habibi Lashkari, A. (2022). Conflicts of Law. In: Understanding Cybersecurity Law in Data Sovereignty and Digital Governance. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-031-14264-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-14264-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-14263-5
Online ISBN: 978-3-031-14264-2
eBook Packages: Business and ManagementBusiness and Management (R0)