Skip to main content

Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector

  • Chapter
  • First Online:
Ethics and Policies for Cyber Operations

Part of the book series: Philosophical Studies Series ((PSSP,volume 124))

Abstract

Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to their respective private sectors and to one another. The International Court of Justice (“ICJ”) has not explicitly considered the legality of cyber weapons to this point, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But what steps exactly do nations and companies under their jurisdiction have to take under international law to secure their networks, and what of the rights and responsibilities of transit states? This chapter reviews the arguments surrounding the creation of a cybersecurity due diligence norm and argues for a proactive regime that takes into account the common but differentiated responsibilities of public- and private-sector actors in cyberspace. The analogy is drawn to cybersecurity due diligence in the private sector and the experience of the 2014 National Institute of Standards and Technology (“NIST”) Framework to help guide and broaden the discussion.

An updated and expanded version of this article featuring both private and public-sector experiences with building out due diligence was published as Scott J. Shackelford, Scott Russell, & Andreas Kuehn, Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors, 17 Chicago Journal of International Law 1(2016).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    However, it should be noted that other jurisprudence is also on point and is not discussed here due to space constraints, including: Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion – General Assembly, ICJ Reports, 8 July 1996, at 22, para. 29; Gabcikovo-Nagymaros Project (Hungary v. Slovakia), Judgment, 25 September 1997, ICJ Reports (1997), at 7, para. 53; Case concerning pulp mills on the river Uruguay (Argentina v. Uruguay), Judgment, 20 April 2010, para. 193.

  2. 2.

    For further information on how cybersecurity governance is playing out in the arena of critical infrastructure protection around the world, see generally Shackelford and Craig <CitationRef CitationID="CR60" >2014</Citation Ref>.

  3. 3.

    A more comprehensive comparative case study of these cyber powers—including a cybersecurity due diligence matrix—is included in Shackelford, Russell, & Kuehn, supra note 1.

  4. 4.

    This sentiment may also be considered another manifestation of the sliding scale approach discussed in Section 16.2.1.

  5. 5.

    China is pursuing cyber diplomacy on an array of fronts. Among other actions, China is furthering the multilateral cybersecurity initiative with the Shanghai Cooperation Organization , is negotiating a bilateral cybersecurity treaty with Russia, is involved in a U.S.-China working group to diffuse tensions around mutually alleged cyber exploitations, and has been drafting cybersecurity-relevant proposals and declarations to garner support from like-minded states at the 2014 World Internet Conference in China and at various UN meetings.

  6. 6.

    N. Sea Continental Shelf (F.R.G./Den. v. Neth.) <CitationRef CitationID="CR44" >1969</Citation Ref> I.C.J. 41, 72 (Feb. 20).

  7. 7.

    Cf. Willingham v. Global Payment, 2013 WL 440,702 at 19 (N.D. Ga 2013) (unreported) (reflecting an alternative view in which courts are reluctant rely on data security standards as a means of determine whether a duty was owed, let alone whether they should be used to determine a reasonable standards of care).

  8. 8.

    For more on this topic, see Amanda N. Craig, Scott J. Shackelford, & Janine Hiller, Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis, 18 Am. Bus. L. J. 721 (2015).

  9. 9.

    See Martha Finnemore & Kathryn Sikkink, International Norm Dynamics and Political Change, 52 Int’l Org. 887, 895–98 (1998).

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Scott J. Shackelford .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Shackelford, S.J., Russell, S., Kuehn, A. (2017). Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector. In: Taddeo, M., Glorioso, L. (eds) Ethics and Policies for Cyber Operations. Philosophical Studies Series, vol 124. Springer, Cham. https://doi.org/10.1007/978-3-319-45300-2_8

Download citation

Publish with us

Policies and ethics