falling short of the EU's minimum standards
(Rubinstein & Margulies, 2022). Despite the
restrictions on U.S. surveillance in the privacy
framework of the European Union-U.S. Data
Agreement that was later reached between the two
sides, the EU still cannot manage to fully constrain
the activities of U.S. intelligence agencies.
3.2.2 Current Status and Theoretical
Foundations of Cross-Border Data
Security Governance in the US
In terms of the legal system, the U.S. builds a
governance framework for cross-border data flows
through several laws (Jiménez-Gómez, 2021). The
Cloud Act, for example, emphasizes that data
sovereignty belongs to businesses and that the
government only enjoys the power to access data
across borders, and also restricts sensitive data from
leaving the country in the name of national security.
In terms of international cooperation, the U.S.
recently adopted the U.S.-U.S. Framework
Agreement on Data Privacy with the EU, which
builds new rules on data flows, restricts the scope of
access to data by intelligence agencies and complies
with the principle of necessity and proportionality,
and establishes a two-tier relief mechanism and a data
protection review court to meet the EU's privacy
protection demands. On the other hand, the U.S. tries
to promote self-interested data flow rules through
multilateral and regional agreements such as the U.S.-
Canada-Mexico agreement and excludes developing
countries such as China. In terms of industrial
practices, the U.S. has been encouraging enterprises
to adopt self-regulatory mechanisms such as "Safe
Harbor" certification through technological
advantages, and adopting mandatory restrictive
measures against foreign apps related to national
security (e.g., TikTok), reflecting the governance
logic of "prioritizing national security". Logic. The
United States actively supports the open movement of
data as one of the major foundations of cross-border
data security governance, arguing that it should be
used to strengthen the United States' dominant
position in the world's digital economy by
emphasizing the financial significance of data,
encouraging the inflow of foreign data, and limiting
the outflow of sensitive data from the country. At the
very same time, the U.S. focuses on prioritizing
national security and sovereignty, and uses data
security as a tool to maintain its hegemony in the
world, for example, empowering the government to
access data across borders through the CLOUD Act
and restricting the access of foreign firms to critical
data on the grounds of national security, as well as
advocating for the expansion of jurisdiction
extraterritoriality through the U.S. domestic law by
resorting to the long arm of jurisdiction (Murthy,
2022). For example, on March 21, 2025, the U.S.
placed a Chinese oil refinery in Shandong on the
sanctions list through long-arm jurisdiction because
of its procurement of crude oil from Iran. Its essence
is still to compete for the dominance of international
rules, to construct an international rule circle
dominated by itself, and to weaken the discourse
power of other countries. The United States in cross-
border data security regulation mainly relies on
enterprise industry self-regulation and self-
regulation, reduces government intervention, many
large enterprises such as Facebook, Apple, etc. have
developed their own internal data protection
regulations.
3.2.3 Lessons Learned from Cross-Border
Data Governance in Europe and the
US
Europe and the United States have accumulated a
great deal of experience in cross-border security of
data governance, and both sides emphasize the
classification and management of data and promote
international cooperation and the improvement of
regulatory mechanisms. Data classification and
management is the foundation, the U.S. will classify
data according to its value and adopt different
management modes, and the EU has also designated
relevant laws and regulations, such as the GDPR, to
classify and manage data. Regulatory tools are the
fundamental guarantee to ensure cross-border data
security. The U.S. implements two regulatory
measures during and at the end of the project,
focusing on real-time monitoring of market themes
and risk prevention, as well as reviewing and
evaluating the results of the project; and the EU has
set up a diversified rights redress mechanism. Finally,
international cooperation is an important data
protection tool. The EU's unique adequacy
determination method has helped it grow its
international impact on data security, whereas the
United States has promoted data freedom through
various international trade policies and multilateral
agreements. The lessons learned in Europe and the
United States are helpful models for global cross-
border data security governance.