Blog
Nov 21, 2025
The CLOUD Act: When American Law Enforcement Can Access Your Data Anywhere

The CLOUD Act: When American Law Enforcement Can Access Your Data Anywhere

The Clarifying Lawful Overseas Use of Data Act grants U.S. authorities unprecedented power to access data stored globally, raising fundamental questions about digital sovereignty, privacy rights, and the future of international data protection.

In March 2018, buried within a 2,232-page government spending bill that lawmakers received with less than 24 hours to review, the U.S. Congress passed legislation that fundamentally reshaped the landscape of international data access. The Clarifying Lawful Overseas Use of Data (CLOUD) Act received no committee hearings, no standalone floor debate, and no dedicated vote. It simply became law as part of a must-pass omnibus spending package (EFF, 2018).

Representative Jim McGovern captured the absurdity perfectly when he said: "People deserve the right to a better process." Yet here we are, seven years later, living with the consequences of a law that grants U.S. law enforcement unprecedented reach into data stored anywhere in the world—and allows foreign governments reciprocal access to data stored in the United States.

The Microsoft Case That Changed Everything

The CLOUD Act emerged from a Supreme Court case that never reached a decision. In United States v. Microsoft, the U.S. government sought to compel Microsoft to produce emails stored on servers in Ireland as part of a domestic drug trafficking investigation. Microsoft refused, arguing that U.S. law enforcement authority stopped at the border and that the government needed to use established diplomatic channels—the Mutual Legal Assistance Treaty (MLAT) process—to access data stored abroad (EPIC, 2018).

The case raised fundamental questions: Does the physical location of data matter in a cloud computing world? Can law enforcement unilaterally demand access to data stored in foreign jurisdictions? What happens when U.S. law conflicts with the privacy protections of other nations?

EPIC, in an amicus brief to the Supreme Court, warned that "a ruling for the government would also invite other countries to disregard sovereign authority" (EPIC, 2018). European privacy advocates watched nervously, recognizing that the outcome would set precedent for how nations balance law enforcement needs against privacy protections and national sovereignty.

The U.S. Congress mooted the case by passing the CLOUD Act before the Supreme Court could issue a ruling. But rather than resolving the underlying tensions, the legislation enshrined unilateral data access into law while creating a framework for executive agreements that bypass traditional diplomatic processes.

How the CLOUD Act Works

The legislation operates through two primary mechanisms, each with profound implications for data privacy and sovereignty.

U.S. Access to Foreign-Stored Data

The CLOUD Act explicitly authorizes U.S. law enforcement to demand access to data stored outside the United States, regardless of where that data physically resides. When authorities issue an order, communications providers must comply with existing requirements to preserve, backup, or disclose electronic communications and records—even if producing that data would violate the laws of the country where it's stored (Congress.gov, 2018).

The law provides a limited mechanism for providers to challenge such orders, but only under specific circumstances. A provider can contest a domestic warrant compelling disclosure if:

  • The customer or subscriber is not a U.S. citizen, national, lawful permanent resident, or entity
  • The customer or subscriber does not reside in the United States
  • The required disclosure creates a material risk that the provider violates the laws of a foreign government with which the United States has an executive agreement on data access

Notably, the legal protection of an individual's rights depends entirely on whether the provider chooses to object. There is no direct mechanism for individuals to challenge orders under the CLOUD Act (EPIC, 2018). If a provider decides compliance is easier than resistance, or if the foreign jurisdiction lacks an executive agreement with the United States, individuals have no recourse.

Even when a provider does object, a U.S. court will review the request under a multi-factor "comity" analysis weighing various interests. The court can ultimately require production of that data despite the objection, even when doing so violates another nation's laws.

Executive Agreements for Foreign Access to U.S. Data

The second mechanism proves even more controversial. The CLOUD Act permits the U.S. government to enter into executive agreements granting foreign governments direct access to data stored in the United States, bypassing protections established under the Electronic Communications Privacy Act (ECPA).

Before authorizing foreign access, executive branch officials must certify that the foreign government meets certain generalized standards for privacy and civil liberties protections. The foreign government must also agree to adopt minimization procedures for U.S. person data. However, the initial agreement requires only executive branch certification to take effect—no formal Congressional approval is necessary. The U.S. Congress can object to agreements, but objection requires active intervention rather than approval (EPIC, 2018).

Once an executive agreement is in place, the process for foreign access becomes remarkably streamlined: no federal official reviews incoming foreign requests, no U.S. court examines whether requests comply with the agreement's requirements, and no verification occurs that legal standards are being met. Only the service provider has an opportunity to review and object to foreign access requests, and the CLOUD Act establishes no formal procedures for providers to lodge such objections (EPIC, 2018).

Because the CLOUD Act permits data access based on each nation's unique domestic procedures, data becomes accessible under foreign law even when that law falls below international human rights standards. The legislation does not establish baseline human rights protections for foreign access to stored data. For example, it doesn't require that targets receive notice of data requests, a fundamental due process protection under many legal systems.

The Privacy Rights Erosion

The CLOUD Act fundamentally undermines privacy protections that took decades to establish. Foreign access requests routed through the United States via diplomatic channels previously benefited from ECPA protections, including the requirement that authorities demonstrate "probable cause" to access communications content. By creating a pathway that bypasses these protections, the CLOUD Act erodes these incidental yet impactful privacy safeguards (EPIC, 2018).

The implications for U.S. persons prove particularly troubling. Data collected by foreign governments under CLOUD Act agreements can be transferred to the United States and shared among multiple governments. Communications content can be transferred if merely determined to "relate to significant harm"—an exceptionally broad standard. Non-content information can be transferred without any limitation whatsoever.

Under these provisions, the U.S. government can access U.S. citizens' communications without satisfying existing U.S. legal standards. The law permits real-time interception of communications by foreign governments on U.S. soil for the first time, without requiring those countries to meet the "super warrant" standard established in the Wiretap Act for domestic surveillance (EPIC, 2018).

The GDPR Collision

The conflict between the CLOUD Act and the European Union's General Data Protection Regulation (GDPR) represents one of the most significant clashes in international data governance. The GDPR grants robust protections to individuals' personal data, imposing strict obligations on companies that process such information. The CLOUD Act, conversely, may allow U.S. authorities to access data without complying with these same protection standards (LexisNexis, 2025).

The tensions manifest across multiple dimensions:

Cross-Border Data Transfer Complications

The GDPR restricts personal data transfers to countries that don't provide "adequate" protection. The European Court of Justice has repeatedly struck down data transfer mechanisms between the EU and United States, finding that U.S. surveillance laws don't provide sufficient protections for EU citizens' data. The CLOUD Act exacerbates these concerns by explicitly authorizing access to data stored anywhere, regardless of local law.

GDPR places individuals at the center of data protection, granting them extensive rights to access, correct, delete, and control how their information is used. The CLOUD Act creates pathways for law enforcement access without individual notice or consent, fundamentally at odds with GDPR's emphasis on individual data rights.

Jurisdictional Conflicts

European companies using U.S. cloud providers face an impossible dilemma. Complying with CLOUD Act requests may violate GDPR obligations to protect personal data. Refusing to comply risks contempt of court in the United States. These companies find themselves trapped between conflicting legal regimes with no clear path to simultaneous compliance.

The "Minimum Contact" Test

European entities may be subject to CLOUD Act jurisdiction if they satisfy a "minimum contact" test with the United States. U.S. courts examine indicators including:

  • Selling products or services to U.S. persons or companies
  • Marketing or advertising in the United States
  • Business relationships with American suppliers
  • Operating websites accessible in the United States (particularly English-language sites)
  • Using servers located in the United States

These aren't strict criteria but rather a collection of indicators courts weigh holistically. Given the ubiquitous nature of international commerce and the dominance of U.S. technology platforms, many European companies now fall within CLOUD Act jurisdiction, subject to both GDPR requirements and potential U.S. data access demands (LexisNexis, 2025).

The U.K.-U.S. Agreement: A Case Study

In October 2019, the United States and United Kingdom signed the first CLOUD Act executive agreement, immediately drawing objections from civil society organizations. A coalition of 20 groups, including EPIC, sent the U.S. Congress a letter explaining that the agreement "fails to adequately protect the privacy and due process rights of U.S. and U.K. citizens" (EPIC, 2019).

The U.K.-U.S. agreement eliminates many traditional protections for cross-border law enforcement access. U.K. authorities can now directly request data from U.S. companies without going through diplomatic channels or U.S. courts. The agreement operates on the principle of reciprocity—U.S. authorities gain equivalent access to data stored by U.K. providers.

Critics identified several fundamental flaws:

Inadequate Judicial Oversight: The agreement doesn't require robust judicial authorization before access is granted, allowing law enforcement agencies significant discretion in making data requests.

Lack of Notice: Targets of data collection aren't necessarily informed that their communications have been accessed, eliminating the possibility of challenging potentially improper surveillance.

Insufficient Transparency: The agreement lacks strong reporting requirements, making it difficult for the public to understand how frequently these powers are used and whether they're being abused.

Weak Minimization: While the agreement nominally requires minimization of U.S. person data collected incidentally, the standards for minimization remain vague and enforcement mechanisms weak.

The coalition urged the U.S. Congress to block the agreement, but their efforts failed. The U.K.-U.S. CLOUD Act agreement took effect, establishing a template that subsequent agreements with other nations would likely follow.

Protecting Against Extraterritorial Reach

European companies and privacy-conscious organizations face difficult choices in this new landscape. Complete avoidance of CLOUD Act jurisdiction proves nearly impossible for most organizations, but several strategies can provide meaningful protection:

Data Encryption

Encryption represents the most effective technical barrier against CLOUD Act demands. Companies can encrypt sensitive data before storing it in the cloud, ensuring that even if U.S. authorities access the data, they cannot read it without the decryption key—which remains under the company's control (LexisNexis, 2025).

This approach requires careful implementation. Keys must be stored separately from encrypted data, preferably in a different jurisdiction with strong legal protections. Robust security measures must protect encryption keys from attacks aimed at compromising them. The encryption must use strong algorithms like AES-256, the standard used by banks and governments worldwide.

Jurisdiction Shopping

Organizations can choose cloud service providers based in Europe or countries offering adequate data protection, deliberately avoiding providers with U.S. connections. However, this strategy becomes increasingly difficult as major U.S. cloud providers dominate the market. Amazon Web Services, Microsoft Azure, and Google Cloud Platform collectively control over 60% of the global cloud infrastructure market (Statista, 2025).

European alternatives exist—providers like OVHcloud and Scaleway offer cloud services under French or European jurisdiction. But these alternatives often lack the scale, feature set, and price competitiveness of U.S. giants, creating a tradeoff between privacy protection and business practicality.

Contractual Protections

Companies can negotiate specific contractual clauses with cloud providers attempting to limit CLOUD Act exposure. Such clauses might require the provider to notify the customer of data requests (where legally permitted), to challenge requests that appear overbroad or inappropriate, and to provide transparency reports about the frequency and nature of government data demands.

However, contractual protections face inherent limitations. When U.S. courts issue valid orders under the CLOUD Act, providers must comply regardless of contractual obligations to customers. Contracts can shape provider behavior at the margins but cannot override legal compulsion.

Data Residency Requirements

Some organizations adopt policies ensuring that sensitive data never leaves specific jurisdictions. They use cloud regions located exclusively in preferred countries and configure systems to prevent data replication or backup to other regions. This approach provides some protection but doesn't eliminate CLOUD Act risk—the law explicitly authorizes access to data stored abroad when the provider has sufficient U.S. connection.

The Sovereignty Question

The CLOUD Act represents the latest example of American extraterritorial law, part of a pattern where U.S. legislation applies globally regardless of where people, companies, or data physically reside. This approach increasingly troubles foreign governments who view it as an assertion of digital sovereignty at their expense.

European regulators have characterized American cloud dominance as a sovereignty issue, with some authorities warning against using U.S.-based cloud services for sensitive data (LexisNexis, 2025). France and Germany have explored creating "sovereign cloud" initiatives—cloud infrastructure controlled by European companies, governed by European law, and immune to U.S. legal demands.

The European Union has worked since 2018 on drafting its own cross-border data access framework—the e-Evidence Directive and Regulation, sometimes called the "European CLOUD Act." However, negotiations have proceeded slowly, creating an asymmetry that benefits U.S. law enforcement while European authorities continue using slower, more cumbersome diplomatic channels.

This imbalance raises fundamental questions: In a world where data flows freely across borders but legal authority remains territorial, whose law should govern? When laws conflict, which jurisdiction's privacy standards should prevail? Does data stored by a U.S. company on European servers belong to the American or European legal sphere?

The CLOUD Act provides one answer—U.S. law applies whenever U.S.-connected companies store the data, regardless of physical location. But this answer satisfies only American interests while disregarding the legitimate sovereignty concerns of other nations and the privacy expectations of their citizens.

The Path Forward

Seven years after passage, the CLOUD Act continues generating controversy and concern. Critics argue it was bad policy implemented through terrible process—complex legislation affecting fundamental rights passed without meaningful debate or public input. Supporters contend it provides necessary tools for law enforcement in an era when criminals use global communications infrastructure to plan and coordinate illegal activities.

Several reforms could address the most egregious privacy concerns:

Individual Challenge Rights: Establishing mechanisms for individuals to challenge data requests would restore due process protections currently absent from the law.

Stronger Judicial Oversight: Requiring meaningful judicial review of both outgoing U.S. requests and incoming foreign requests would provide a check against overreach.

Baseline Human Rights Standards: Mandating that executive agreements meet specific human rights protections—including notice, necessity, proportionality, and independent oversight—would prevent a race to the bottom in privacy protections.

Congressional Approval: Requiring formal U.S. Congressional approval of executive agreements rather than passive review would increase democratic accountability for decisions affecting fundamental rights.

Enhanced Transparency: Mandatory detailed reporting about how CLOUD Act authorities are used would enable public evaluation of whether the law is being used appropriately.

But meaningful reform faces steep obstacles. Law enforcement agencies defend the CLOUD Act as essential to their mission. Technology companies have largely accepted the law, viewing compliance as preferable to the legal uncertainty that preceded it. U.S. Congressional appetite for revisiting the legislation remains minimal.

Meanwhile, individuals and organizations worldwide navigate a legal landscape where data stored in the cloud exists simultaneously under multiple, sometimes conflicting jurisdictions. Privacy protections depend not on universal rights but on the accidents of where companies are headquartered and which governments have negotiated executive agreements.

Conclusion

The CLOUD Act represents more than a technical update to outdated electronic privacy laws. It embodies a fundamental assertion about the nature of sovereignty and authority in the digital age—that legal authority over data follows corporate nationality rather than physical location or individual citizenship.

This approach benefits U.S. law enforcement by granting broad access to data worldwide. It serves U.S. technology companies by providing legal clarity about their obligations. But it comes at significant cost to individual privacy, national sovereignty, and international cooperation on data governance.

As more of human life moves online and into the cloud, the question of who can access that data and under what circumstances becomes increasingly consequential. The CLOUD Act provides one answer, but it's an answer that prioritizes law enforcement convenience over privacy rights, American interests over international cooperation, and expedience over meaningful democratic debate.

Whether this proves sustainable remains to be seen. The tensions between the CLOUD Act and GDPR continue unresolved. European governments grow increasingly concerned about digital sovereignty. Privacy advocates mobilize against surveillance authorities they view as excessive. And individuals worldwide confront the uncomfortable reality that data stored "in the cloud" may be more accessible to government scrutiny than they ever imagined.

The debate over cross-border data access will continue, shaped by technological change, geopolitical tensions, and evolving understandings of privacy in a connected world. But the CLOUD Act—passed without debate and implemented without meaningful democratic input—will remain a case study in how not to make policy affecting fundamental rights in a democratic society.

References

Congress.gov. (2018). H.R.4943 - CLOUD Act, 115th Congress (2017-2018). U.S. House of Representatives. https://www.congress.gov/bill/115th-congress/house-bill/4943

Electronic Frontier Foundation. (2018, March 22). Responsibility deflected, the CLOUD Act passes. EFF Deeplinks Blog. https://www.eff.org/deeplinks/2018/03/responsibility-deflected-cloud-act-passes

Electronic Privacy Information Center. (2018). The CLOUD Act. EPIC. https://epic.org/the-cloud-act/

Electronic Privacy Information Center. (2019, October 29). EPIC, NGOs object to U.S.-U.K. CLOUD agreement, urge congressional action. EPIC. https://epic.org/the-cloud-act/

LexisNexis. (2025, June 20). Cloud Act and GDPR: What implications for EU companies' data protection? LexisNexis International Legal Blog. https://www.lexisnexis.com/blogs/int-legal/b/insights/posts/cloud-act-gdpr-implications

Statista. (2025). Worldwide market share of leading cloud infrastructure service providers. Statista. https://www.statista.com/chart/18819/worldwide-market-share-of-leading-cloud-infrastructure-service-providers/

Julian Morley • © 2025