Designing an infrastructure to be compatible with many legal environments can ward off privacy headaches. The differences between e-commerce and traditional commerce are glaring when you squint at them through a regulatory spyglass. While industrial age governmental policy freezes like a 10-point buck in headlights, the legal prey of tomorrow is only a distant blur. Designing an enterprise requires long-term vision, but strategic planning is next to impossible when the networks you build today will outlast the laws that govern their behavior.Let’s say you’ve just been hired in a senior information security position at a U.S.-based company that sells collectible widgets online. You have been asked to sit down with the general counsel (GC) and CFO to map out a long-range enterprise architecture that will support the company’s growth. The CFO insists that the company converge on a centralized infrastructure to reduce costs in the business units. The GC innocently asks about conforming to legal and privacy rules. “Which ones?” you ask.In traditional commerce, governance rules are negotiated and captured in treaties. The exceptions to that are products with cultural significance that override the economicsthe sex and drugs type commodities. In e-commerce, all transactions fall into this category because the marketplace incorporates hot issues like privacy, intellectual property and taxation, regardless of the product. Not only are the rules subject to change, it’s also unclear whose rules are applicable. The jurisdiction of a single e-commerce transaction could equally be where: The company is incorporated Servers are located The company does business The customer lives The fiber-optic cable runs A remote employee accesses the customer databaseThe first wave of e-commerce was defined by the workarounds. Institutions and authorities kept policy afloat like a beach ball at a rock concertuntil the bubble popped. That resulted in stopgap policies such as the Internet sales tax moratorium and the Safe Harbor privacy provisions for doing business in the European Union. The second wave of e-commerce will be defined by the exceptions. These irregularities will be created by the mismatches of overlapping sovereignty. For some businesses, this will be disastrous; for others an opportunity. Economic need will twist the legal areas of commerce further out of alignment with the physical location of the systems and servers. That incongruence causes the problem. How do you design an enterprise architecture for legal compliance when you don’t know whose laws may be relevant and which laws likeliest to cause trouble are in flux? Here are some suggestions: Pay careful attention to where the data comes out, not in; most countries will probably attach conditions and penalties to data use, not aggregation. Tag accounts with their geographic location so that they can be policy controlled. For instance, if you have an auction site, don’t let French or German customers see, let alone buy, Nazi memorabilia. Transfer your servers to the most subpoena-favorable legal climate available internationally, most likely in the Caribbean. This is similar to companies incorporating in Delaware for tax reasons. Indian reservations may become prime locations for server farms. Don’t ask, don’t tell. If your customers are not buying goods that require shipping, don’t ask for more information than you need. The more you ask for, the likelier that you’ll violate an ordinance. If you have too much information, you lose plausible deniability as a defense. The price barriers to international commerce will continue to drop because of the Internet, and all markets will soon be global. Visionary leaders who optimize their infrastructure for legal flexibility will be able to tack against the winds of change and move on to new markets. Those who elect to play it safe will find themselves stalled in the Sargasso Sea of corporate compliance. We may not be able to direct the wind, but we can always adjust the sails. Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe