Skip to main content

Part of the book series: Progress in IS ((PROIS))

  • 411 Accesses

Abstract

Conflict of laws—also called private international law—is the set of rules or laws a jurisdiction applies to a case, transaction or other occurrences that has connections to more than one jurisdiction, for example, when the parties involved in a dispute are from different legal jurisdictions, when parties from different jurisdictions are engaged in a matter in yet another jurisdiction or when there are conflicting legal remedies for an issue which arises between legal jurisdictions.

This body of law deals with three broad topics: jurisdiction, rules regarding when it is appropriate for a court to hear such a case; foreign judgements, dealing with the rules by which a court in one jurisdiction mandates compliance with a ruling of a court in another jurisdiction; and choice of law, which addresses the question of which substantive laws will be applied in such a case. These issues can arise in any private-law context, but they are especially prevalent in contract and tort law.

In this chapter, we will discuss the concepts of jurisdictionality and how jurisdiction for a legal issue can be determined. We will discuss the personal connecting factors and determinants for jurisdiction to hear an issue. Finally, we will explore international law and related legal strategies in dealing with conflicting laws between jurisdictions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Part I of the Constitution Act, 1982. Canadian Charter of Rights and Freedoms, s 7, Part 1 of the Constitution Act, 1982, being Schedule B to the Canada Act 1982 (UK), 1982, c 11.

  2. 2.

    Thomson v Minister of National Revenue, 1946 CanLII 1 (SCC), [1946] SCR 209. Available at: https://canliiconnects.org/en/cases/1946canlii1

  3. 3.

    Office of the Children’s Lawyer v Balev. 2018 SCC 16.

  4. 4.

    These words mean different things but both have been accepted in the jurisprudence.

  5. 5.

    Agulian v Cyganik [2006] EWCA Civ 129. Available at: https://www.familylawweek.co.uk/site.aspx?i=ed1657

  6. 6.

    IRC v Bullock [1976] 1 WLR 1178.

  7. 7.

    Foote Estate, Re (2011), 493 AR 354 (CA), 502 WAC 354, 2011 ABCA 1.

  8. 8.

    National Trust Co. Ltd. v Ebro Irrigation and Power Co. Ltd. [1954], 3 DLR 326 (Ont.H.C.).

  9. 9.

    Gasque v Inland Revenue Commissioners [1940], 2 KB 80.

  10. 10.

    Voyage Co. Industries v Craster [1998] BCJ No 1884 (Unreported) (BCSC).

  11. 11.

    Club Resorts Ltd. v Van Breda, 2012 SCC 17 [2012] 1 SCR 572.

  12. 12.

    Moran v Pyle National (Canada) Ltd. [1975] 1 SCR 393.

  13. 13.

    Court et al. v Debaie, 2012 ABQB 640.

  14. 14.

    “Pecuniary” means “related to money”.

  15. 15.

    Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139169288.

  16. 16.

    International Institute of Humanitarian Law (1995). San Remo Manual on International Law Applicable to Armed Conflicts at Sea (L. Doswald-Beck, Ed.). Cambridge: Cambridge University Press. doi:10.1017/CBO9780511622052.

  17. 17.

    Program on Humanitarian Policy and Conflict Research at Harvard University (2013). HPCR Manual on International Law Applicable to Air and Missile Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139525275.

  18. 18.

    Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (second ed.). Cambridge: Cambridge University Press. doi:10.1017/9781316822524.

  19. 19.

    Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139169288.

  20. 20.

    Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press. doi:10.1017/CBO9781139169288.

  21. 21.

    Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (second ed.). Cambridge: Cambridge University Press. doi:10.1017/9781316822524.

  22. 22.

    The United Nations (1948). Universal Declaration of Human Rights.

  23. 23.

    999 UNTS 171.

  24. 24.

    https://www.ohchr.org/en/instruments-mechanisms/instruments/convention-rights-child

  25. 25.

    2225 UNTS 209.

  26. 26.

    2171 UNTS 227.

  27. 27.

    https://uncitral.un.org/en/texts/ecommerce/conventions/electronic_communications

  28. 28.

    https://www.echr.coe.int/documents/convention_eng.pdf

  29. 29.

    ETS 5.

  30. 30.

    The United Nations (1948). Universal Declaration of Human Rights.

  31. 31.

    The United Nations (1948). Universal Declaration of Human Rights.

  32. 32.

    1577 UNTS 3.

  33. 33.

    999 UNTS 171.

  34. 34.

    https://www.ohchr.org/en/instruments-mechanisms/instruments/international-covenant-economic-social-and-cultural-rights

  35. 35.

    https://www.un.org/en/about-us/universal-declaration-of-human-rights

  36. 36.

    https://www.ohchr.org/en/what-are-human-rights/international-bill-human-rights

  37. 37.

    https://www.un.org/en/about-us/universal-declaration-of-human-rights

  38. 38.

    https://www.ohchr.org/sites/default/files/documents/publications/guidingprinciplesbusinesshr_en.pdf

  39. 39.

    https://www.coe.int/en/web/cybercrime/the-budapest-convention

  40. 40.

    https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection

  41. 41.

    https://carnegieendowment.org/2021/06/14/brief-primer-on-international-law-and-cyberspace-pub-84763

  42. 42.

    Criminal Law of the People’s Republic of China (adopted at the Second Session of the Fifth National People’s Congress on 1 July 1979; revised at the Fifth Session of the Eighth National People’s Congress on 14 March 1997 and promulgated by Order No.83 of the President of the People’s Republic of China on 14 March 1997) https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf

  43. 43.

    https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf

  44. 44.

    Criminal Law of the People’s Republic of China (adopted at the Second Session of the Fifth National People’s Congress on 1 July 1979; revised at the Fifth Session of the Eighth National People’s Congress on 14 March 1997 and promulgated by Order No.83 of the President of the People’s Republic of China on 14 March 1997) https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf

  45. 45.

    Xiaobing Li, Yongfeng Qin, “Research on Criminal Jurisdiction of Computer Cybercrime” in Procedia Computer Science, Volume 131, 2018, pp. 793–799. ISSN 1877–0509. https://doi.org/10.1016/j.procs.2018.04.263. (https://www.sciencedirect.com/science/article/pii/S1877050918306434).

  46. 46.

    Criminal Law of the People’s Republic of China (adopted at the Second Session of the Fifth National People’s Congress on 1 July 1979; revised at the Fifth Session of the Eighth National People’s Congress on 14 march 1997 and promulgated by Order No.83 of the President of the People’s Republic of China on 14 March 1997) https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf

  47. 47.

    https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/5375/108071/F-78796243/CHN5375%20Eng3.pdf

  48. 48.

    Federal Bureau of Investigation Internet Crime Report 2021. Available online at: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

  49. 49.

    https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

  50. 50.

    Federal Bureau of Investigation Internet Crime Report 2021. Available online at: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

  51. 51.

    https://www.ibm.com/security/data-breach

  52. 52.

    IBM. Cost of a Data Breach Report 2021. https://www.ibm.com/security/data-breach.

  53. 53.

    Morgan, Steve. “Cybercrime To Cost The World $10.5 Trillion Annually By 2025” in Cyberwarfare In The C-Suite a Special Report by Cybercrime Magazine. 13 November 2020. Available online at: https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/

  54. 54.

    Pete Boden. “The Emerging Era of Cyber Defense and Cybercrime”. Microsoft Security Blog. 27 January 2016. Available online at: https://www.microsoft.com/security/blog/2016/01/27/the-emerging-era-of-cyber-defense-and-cybercrime/

  55. 55.

    “Protect your data through innovation” in AT&T Cybersecurity Insights: The CEO’s Guide to Data Security, Volume 5. Available online at: https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2021/01/attceocyberreport_compressed.pdf

  56. 56.

    Rajinder Tumber. “Cyber Attacks: Igniting The Next Recession?” in Forbes. 5 January 2019. Available online at: https://www.forbes.com/sites/rajindertumber/2019/01/05/cyber-attacks-igniting-the-next-recession

  57. 57.

    Kami Periman. “How to Prevent the Bank Robbery No One Can See” in Cisco Blogs. 29 August 2017. Available online at: https://blogs.cisco.com/financialservices/how-to-prevent-the-bank-robbery-no-one-can-see

  58. 58.

    “German hospital hacked, patient taken to another city dies” in AP News. 17 September 2020. Available online at: https://apnews.com/article/technology-hacking-europe-cf8f8eee1adcec69bcc864f2c4308c94

  59. 59.

    Emsisoft Malware Lab. “The State of Ransomware in the US: Report and Statistics 2019” in Emsisoft Blogs. 12 December 2019. Available online at: https://blog.emsisoft.com/en/34822/the-state-of-ransomware-in-the-us-report-and-statistics-2019/

  60. 60.

    Dow Jones and Company Inc v Gutnick [2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255. https://adsdatabase.ohchr.org/IssueLibrary/HIGH%20COURT%20OF%20AUSTRALIA_Dow%20Jones%20and%20Company%20Inc%20v%20Gutnick.pdf

  61. 61.

    Dow Jones and Company Inc v Gutnick [2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255. https://adsdatabase.ohchr.org/IssueLibrary/HIGH%20COURT%20OF%20AUSTRALIA_Dow%20Jones%20and%20Company%20Inc%20v%20Gutnick.pdf

  62. 62.

    Massarani v Kriz [2022] FCA 80. https://www.judgments.fedcourt.gov.au/judgments/Judgments/fca/single/2022/2022fca0080

  63. 63.

    Newman v Whittington [2022] NSWSC 249. As per: https://www.natlawreview.com/article/and-so-it-begins-first-consideration-serious-harm-threshold-australian-defamation

  64. 64.

    Lachaux v Independent Print Ltd [2019] UKSC 27, [2020] AC 612, [2019] 4 All ER 485, [2019] 3 WLR 18, 169 NLJ 7845, [2019] All ER (D) 42 (Jun). Available online at: https://www.lexiswebinars.co.uk/legal/tmt/defamation-claims-post-lachaux-2020/supporting-materials/Lachaux-v-Independent-Print-Limited-2019-UKSC-27.DOC.pdf

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lukings, M., Habibi Lashkari, A. (2022). Conflicts of Law. In: Understanding Cybersecurity Law in Data Sovereignty and Digital Governance. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-031-14264-2_3

Download citation

Publish with us

Policies and ethics