Comparative Legal Analysis of Civil Liability for Cybersecurity Violations by Participants in International Commercial Arbitration
DOI:
https://doi.org/10.59022/ujldp.586Keywords:
International Commercial Arbitration, Cybersecurity, Civil Liability, Data Protection, Comparative Law, Digital Arbitration, AccountabilityAbstract
This study examines the civil liability of participants in international commercial arbitration arising from cybersecurity violations. As arbitration proceedings increasingly migrate to digital platforms, they become vulnerable to cyber threats, including data breaches, unauthorized access, and ransomware attacks. The research applies a comparative legal methodology, analyzing frameworks from the European Union, the United States, the United Kingdom, and selected Asian jurisdictions. The findings reveal that existing arbitration rules and national laws inadequately address cybersecurity liability, creating enforcement gaps and accountability ambiguities. The study identifies three primary liability categories: institutional, arbitrator, and party and counsel liability, each governed by distinct legal standards. The analysis demonstrates that harmonized international standards are essential for effective regulation. The study concludes by recommending the adoption of cybersecurity-specific provisions within major arbitral institutions' rules and the development of a model international convention on arbitration cybersecurity liability.
References
Ali, S., Wang, J., & Leung, V. C. M. (2025). AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms—A comprehensive review. Information Fusion, 118, 102922. https://doi.org/10.1016/j.inffus.2024.102922
Benyahya, M., Collen, A., & Nijdam, N. A. (2023). Analyses on standards and regulations for connected and automated vehicles: Identifying the certifications roadmap. Transportation Engineering, 14, 100205. https://doi.org/10.1016/j.treng.2023.100205
Burbank, J., Greene, T., & Kaabouch, N. (2024). Detecting and mitigating attacks on GPS devices. Sensors, 24(17), 5529. https://doi.org/10.3390/s24175529
El-Rewini, Z., Sadatsharan, K., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. (2020). Cybersecurity challenges in vehicular communications. Vehicular Communications, 23, 100214. https://doi.org/10.1016/j.vehcom.2019.100214
Giannaros, A., Karras, A., Theodorakopoulos, L., Karras, C., Kranias, P., Schizas, N., Kalogeratos, G., & Tsolis, D. (2023). Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions. Journal of Cybersecurity and Privacy, 3(3), 493–543. https://doi.org/10.3390/jcp3030025
Hu, X., Liu, T., Shu, T., & Nguyen, D. (2024). Spoofing detection for LiDAR in autonomous vehicles: A physical-layer approach. IEEE Internet of Things Journal, 11(11), 20673–20689. https://doi.org/10.1109/JIOT.2024.3371378
Huszár, V. D., & Adhikarla, V. K. (2021). Live spoofing detection for automatic human activity recognition applications. Sensors, 21(21), 7339. https://doi.org/10.3390/s21217339
Jakobsen, S., Knudsen, K., & Andersen, B. (2023). Analysis of sensor attacks against autonomous vehicles. In Proceedings of the 8th International Conference on Internet of Things, Big Data and Security (pp. 131–139). SCITEPRESS. https://doi.org/10.5220/0011841800003482
Kifor, C. V., & Popescu, A. (2024). Automotive cybersecurity: A survey on frameworks, standards, and testing and monitoring technologies. Sensors, 24(18), 6139. https://doi.org/10.3390/s24186139
Kollarova, M., Granak, T., Strelcova, S., & Ristvej, J. (2023). Conceptual model of key aspects of security and privacy protection in a smart city in Slovakia. Sustainability, 15(8), 6926. https://doi.org/10.3390/su15086926
Lin, X., Lee, C.-Y., & Fan, C. K. (2025). Exploring the impacts of autonomous vehicles on the insurance industry and strategies for adaptation. World Electric Vehicle Journal, 16(3), 119. https://doi.org/10.3390/wevj16030119
Lingras, S., & Basu, A. (2025). The security of autonomous vehicle software and its national security implications. European Journal of Applied Science, Engineering and Technology, 3(1), 180–188. https://doi.org/10.59324/ejaset.2025.3(1).16
Margaret, I., Schoubben, F., & Verwaal, E. (2024). When do investors see value in international environmental management certification of multinational corporations? Global Strategy Journal, 14(1), 25–55. https://doi.org/10.1002/gsj.1490
Matos, F., Bernardino, J., Durães, J., & Cunha, J. (2024). A survey on sensor failures in autonomous vehicles: Challenges and solutions. Sensors, 24(16), 5108. https://doi.org/10.3390/s24165108
Pande, D., & Taeihagh, A. (2023). Navigating the governance challenges of disruptive technologies: Insights from regulation of autonomous systems in Singapore. Journal of Economic Policy Reform, 26(3), 298–319. https://doi.org/10.1080/17487870.2023.2197599
Schellekens, M. (2016). Car hacking: Navigating the regulatory landscape. Computer Law & Security Review, 32(2), 307–315. https://doi.org/10.1016/j.clsr.2015.12.019
Schepis, D., Purchase, S., Olaru, D., Smith, B., & Ellis, N. (2023). How governments influence autonomous vehicle (AV) innovation. Transportation Research Part A: Policy and Practice, 178, 103874. https://doi.org/10.1016/j.tra.2023.103874
Taeihagh, A., & Lim, H. S. M. (2019). Governing autonomous vehicles: Emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transport Reviews, 39(1), 103–128. https://doi.org/10.1080/01441647.2018.1494640
Verma, P., Newe, T., O’Mahony, G. D., Brennan, D., & O’Shea, D. (2025). Toward a unified understanding of cyber resilience: Concepts, strategies, and future directions. IEEE Access, 13, 49945–49965. https://doi.org/10.1109/ACCESS.2025.3551887
Zweigert, K., & Kötz, H. (1998). An introduction to comparative law (3rd ed.). Oxford University Press.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Uzbek Journal of Law and Digital Policy

This work is licensed under a Creative Commons Attribution 4.0 International License.

