Introductory note: This set of FAQs responds to questions from non-U.S. countries about the meaning and implications of the CLOUD Act. Some questions have arisen from the European Union in connection with the CLOUD Act, and this paper seeks to address those questions specifically. But it is important to note that countries outside of the EU are expected to seek executive agreements under the CLOUD Act as well.
The U.S. Department of Justice (DOJ) also recently published a Cloud Act White Paper, with accompanying FAQs, which covers many of the key questions as well. We encourage readers to look at the DOJ’s official explanation and clarification of the legislation. These FAQs here are meant to provide an independent, supplemental assessment of the legislation and the recurring questions that continue to arise. We also provide additional citations to assist the reader in further research. As with the other publications from CBDF, the views expressed here are solely those of the authors.
The other key part clarifies the rules governing U.S. law enforcement access to data in the hands of U.S. providers. The following seeks to answer key questions and clarify the operation of both parts.
Executive Agreements and Non-U.S. Access to Evidence
The SCA applies even if the non-U.S. government is seeking communications content with regard to one of its own nationals in the investigation of a local crime. It also applies even if the non-U.S. government has obtained a compelled disclosure order pursuant its national laws.
More specifically, the SCA states that a covered service provider “shall not divulge” stored communications content to “any person or entity,” unless pursuant to one of nine statutory exceptions, none of which authorizes disclosure to foreign governments. [4]
The SCA also sets out the situations in which service providers can be compelled to disclose communications content. Only a “governmental entity”—defined as a U.S. federal or state department or agency [5] —is given the authority to compel a provider to disclose communications content, and only according to specified substantive and procedural standards. As discussed further below, access to communications content requires a search warrant, signed by an independent U.S. judge, based on the judge’s finding that there is “probable cause” both that (a) a specific crime has occurred or is occurring and (b) the place to be searched, such as an email account, contains evidence of that specific crime. In addition, the warrant must describe with particularity the data to be searched or seized. Service providers who furnish the content of communications to a U.S. or foreign government, in the absence of such a search warrant or a CLOUD Act-authorized executive agreement, risk civil liability. Prior to the Cloud Act, there was no provision that authorized disclosure of communications content to foreign law enforcement in any circumstance, even in response to compelled disclosure orders issued by foreign courts.
For more detailed discussions of the current MLAT system and the potential scope and impact of proposed reforms, see:
There is some question under U.S. law about whether the European Union could sign an executive agreement under the CLOUD Act. The CLOUD Act permits an executive agreement with a “Qualifying Foreign Government” (QFG). We have written elsewhere that an EU Member State could be a QFG, but there is doubt whether the EU as whole would qualify. As we have suggested previously, however, the EU could enter into a framework agreement that would lay out the parameters of Member State agreements. Such a framework would be easier to negotiate than separate agreements with the over two dozen Member States, and create consistency across country-level agreements with the United States.
These safeguards resemble protections contained in the GDPR and EU Police Directive, such as (a) the requirement for a clear legal mandate for police agencies to access personal data; [12] (b) the principle of data minimization; [13] and (c) the requirement to institute transparency and accountability as foundational principles of law. [14]
CBDF has a separate article elaborating on this issue and the possible alternatives. That article contrasts the executive agreement procedure under the CLOUD Act with three alternative U.S. procedures – a non-CLOUD Act executive agreement, a treaty, or a new U.S. statute. The key takeaway is that additional votes by the U.S. Congress would be required for any of these alternative mechanisms to be implemented. [15] By contrast, a CLOUD Act executive agreement, once submitted to Congress, automatically takes effect in 180 days unless Congress disapproves the executive agreement, making it easier to put an agreement into effect.
By contrast, the CLOUD Act does permit an executive agreement to authorize wiretaps by the QFG on U.S. providers in specified circumstances and according to specified requirements. Specifically, such interception can only: “(i) be for a fixed, limited duration; (ii) may not last longer than is reasonably necessary to accomplish the approved purposes of the order; and (iii) be issued only if the same information could not reasonably be obtained by another less intrusive method.” [17] Whether any such wiretaps would be permitted would be governed by what the parties agree to when negotiating the executive agreement.
U.S. Access to Evidence under the CLOUD Act
As described by Richard Downing of DOJ, the rule in the Microsoft Ireland decision created significant obstacles for law enforcement—blocking access to evidence critical to U.S. investigations, based simply on where the data is stored. Among the many challenges, some companies regularly move customer data between data centers in different countries. The United States may not have any way to know where sought-after data is located and therefore where to go to attempt to access it; or even if it does learn where the data is at any given point in time, the location may have shifted by the time the MLAT request can be processed. In addition, in many instances there is no logical or normative relationship between where the data happens to be located and any sovereign interest in the case.
The CLOUD Act responds to this, making clear that the location of storage does not determine law enforcement access. Pursuant to the CLOUD ACT, the legal obligations of a provider with “possession, custody, or control” of the sought-after data remain the same “regardless of whether such communication, record, or other information is located within or outside of the United States.” [19] That said, the U.S. can only issue the order if there is personal jurisdiction over the provider and the data is needed for the investigation of a crime over which the United States has subject matter jurisdiction.
Moreover, as described by Eric Wenger (here) and Jennifer Daskal (here), the government has long demanded data in the possession, custody or control of entities subject to its jurisdiction — regardless of where those records are stored. This was the U.S. government’s understanding of the law, including under the SCA, both before and after the CLOUD Act, as recently expressed by the Department of Justice’s Deputy Assistant Attorney General, Richard Downing, here:
“Far from introducing a new surveillance power, the CLOUD Act codified what had been the longstanding practice in the United States until a single 2016 decision by a court of appeals in a case involving Microsoft. It is well established that a company present in our territory is subject to a U.S. subpoena for physical records in its possession, custody, or control, and must produce those records, regardless of where they are stored. For decades, the corollary principle – that a provider in our jurisdiction must produce evidence in its control, regardless of where the provider chooses to store the evidence – has been equally settled.”
The CLOUD Act thus codified for the SCA the Department of Justice’s view of what was longstanding U.S. doctrine and practice. It did not, according to the Department of Justice, and contrary to the claims of some, expand U.S. assertion of jurisdiction. As Downing stated:
“Nothing in the CLOUD Act’s clarification of U.S. law expands U.S. jurisdiction over foreign companies or any other entity. Nothing in the CLOUD Act expands the categories of providers subject to U.S. jurisdiction. The CLOUD Act does not alter who falls under the jurisdiction of U.S. courts; it merely confirms the obligations of the providers that already do.” [20]
As described in the DOJ Cloud Act White Paper, the CLOUD Act’s requirements are consistent with those of many other countries: “Australia, Belgium, Brazil, Canada, Colombia, Denmark, France, Ireland, Mexico, Montenegro, Norway, Peru, Portugal, Serbia, Spain, the United Kingdom, and other countries assert domestic authority to compel production of data stored abroad.”
Notably, the EU’s E-Evidence proposal adopts a similar approach, with a broad jurisdictional scope. The proposal is “applicable if the service providers are not established or represented in the Union, but offer services in the Union.” [21] As with the CLOUD Act, covered providers are required to relevant electronic evidence in response to a compelled disclosure order – regardless of where the underlying data is stored. [22]
In summary, the U.S. CLOUD Act did not expand the territorial reach of U.S. law, under the DOJ’s unchanging view and, in the view of the authors, the most likely prior reading of the law.
Notwithstanding this broad scope, there are legal limits on who is required to respond. Notably, DOJ can only compel production from an entity under the personal and subject matter jurisdiction of the U.S. The entity can only be compelled to provide the evidence where it has “possession, custody, or control” of the requested evidence. In addition, U.S. law enforcement must meet all of the usual requirements to access the content of communications. An independent judge must find probable cause both that (a) a specific crime has occurred or is occurring and (b) that the place to be searched, such as an email account, contains evidence of that specific crime.
Basic Subscriber Information (BSI): DOJ can obtain BSI with a subpoena or a court order. [26] If DOJ uses a subpoena, the subpoena must identify the subscribers or accounts for which DOJ seeks BSI. A provider can object to the subpoena by filing a motion to quash, which results in a court assessing the legality of the subpoena.
Telecommunications metadata and other non-content data: DOJ must obtain a court order to require a provider to produce a range of data that falls between subscriber information and content data. [27] To obtain the order, DOJ must present “specific and articulable facts” that convince the court there are reasonable grounds to believe the metadata is “relevant and material” to an ongoing criminal investigation. [28] The order must specifically identify the subscribers and/or accounts whose communications metadata is to be produced. After the order is issued, the provider can object to it before a court by filing a motion to quash.
Content: To obtain the content of communications, DOJ must obtain a warrant from a court based on probable cause. [29] DOJ must show a court (a) probable cause that a crime has been committed, and (b) probable cause that the content DOJ is requesting will be evidence of the crime. The warrant must particularly describe the content data that DOJ is authorized to obtain, and can require DOJ to collect the data within a specified time. A U.S. probable cause warrant, issued by an independent judge, is widely regarded as among the strictest, and quite possibly the strictest, standard in the world for law enforcement access to evidence of the contents of communications. [30]
It also is important to avoid confusion between the meaning of “control” in two different legal systems. The term “possession, custody, or control” has been used in U.S. litigation involving contested access to evidence. By contrast, the term “controller” is used in EU and other data protection laws, as distinguished from a “processor” of personal data. Non-U.S. lawyers should be alerted that the word “control” in that U.S. litigation is an entirely different term than the word “controller” under data protection law.
That said, providers are permitted to provide notice to their customers, except in those cases in which the government has explicitly obtained a “preclusion of notice” order. These orders are implicitly time-limited and available only in certain circumstances. In order to issue such an order, the court must first determine that notice will result in one of the following adverse consequences: “(1) endangering the life or physical safety of an individual; (2) flight from prosecution; (3) destruction of or tampering with evidence; (4) intimidation of potential witnesses; or (5) otherwise seriously jeopardizing an investigation or unduly delaying a trial.” [32]
In October 2017, the Department of Justice, in response to litigation initiated by Microsoft regarding what was perceived to be the over-use of such preclusion orders, issued guidance emphasizing the importance of a clear factual predicate to support such orders and one-year time limits, absent exceptional circumstances. (Note: this litigation initiated by Microsoft is entirely separate from the Microsoft Ireland case.)
More broadly, the CLOUD Act retained the existing range of motions available to providers to object to an order. The Act states: “Nothing in this section, or an amendment made by this section, shall be construed to modify or otherwise affect the common law standards governing the availability or application of comity analysis to other types of compulsory process.” [33]
Furthermore, nothing in the CLOUD Act reduces or otherwise affects the existing mechanism under the SCA for providers to move to quash certain kinds of court orders if “the information or records requested are unusually voluminous in nature or compliance with such order otherwise would cause an undue burden.” [34]
Similarly, the CLOUD Act does not amend the Federal Rules of Civil Procedure, which govern courts for civil litigation. And it does not amend the Administrative Procedure Act or any other statute that authorizes a U.S. government entity to access evidence outside of a criminal prosecution.
A forthcoming CBDF article explains in additional detail why U.S. law and policy mean that the CLOUD Act may not be used to steal trade secrets for the benefit of U.S. companies.
[1] The authors express their thanks for comments on earlier drafts from Théodore Christakis, Dan Felz, Justin Hemmings, and Robert Litt.
[2] These FAQs use the term “service provider” to apply to those companies whose production of evidence is covered by the CLOUD Act. The CLOUD Act itself refers to “communications service providers,” which includes both types of providers covered by the Stored Communication Act, “electronic communication services” and “remote computing services.” 18 U.S.C. § 2703.
[3] The statute does not contain such a prohibition for non-content data.
[4] 18 U.S.C. § 2702(a)(1), (2). In addition to these exceptions, a service provider can respond to a non-U.S. government request for communications content pursuant to a Cloud Act executive agreement.
[5] Id. § 2711(4) (“the term ‘governmental entity” means a department or agency of the United States or any State or political subdivision thereof.”).
[12] See Police Directive 2016/680, Art. 8(1): “Member States shall provide for processing to be lawful only if and to the extent that processing is necessary for the performance of a task carried out by a competent authority for the purposes set out in Article 1(1) and that it is based on Union or Member State law.”
[13] See GDPR, Art. 5(1)(c) (establishing the principle of data minimization); Police Directive 2016/680, Art. 4(1)(3) (requiring law enforcement processing of personal data to be “not excessive in relation to the purposes for which [personal data] are processed”).
[14] See GDPR, Art. 5(1)(a) (establishing the principles of fair processing and transparency), Art. 5(2) (establishing the principle of accountability).
[15] As discussed in the more detailed article on this topic, the description of the voting procedures assumes that a treaty would not be “self-executing.” In other words, after a treaty were signed, there would remain the need to pass implementing legislation through Congress.
[18] Those alternative cases concluded that, as the government argued, the warrant authority under SCA reached communications content within a service provider’s possession, custody, and control, irrespective of the location of the servers. See, e.g., In re Info. Associated with @gmail.com, Case No. 16–mj–757, 2017 U.S. Dist. LEXIS 130153, 2017 WL 3445634, at *27 (D.D.C. July 31, 2017) (“[T]he SCA warrant [is] simply a domestic execution of the court’s statutorily authorized enforcement jurisdiction over a service provider, which may be compelled to retrieve electronic information targeted by the warrant, regardless of where the information is ‘located;’ ”); In re Search Warrant No. 16-960-M-01 to Google, 275 F. Supp. 3d 605, 606 (E.D. Pa. 2017); In re Two Email Accounts Stored at Google, Inc., No. 17-M-1235, 2017 WL 2838156, at *4 (E.D. Wis. June 30, 2017); In re Search of Content that Is Stored at Premises Controlled by Google, No. 16-mc-80263-LB, 2017 WL 1487625, at *4 (N.D. Cal. Apr. 25, 2017); In re Search of Information Associated with Accounts Identified as [Redacted]@gmail.com, 268 F.Supp.3d 1060, 1071 (C.D. Cal. 2017).
[20] The DOJ Cloud Act White Paper, at 17, provided additional detail on the reach of U.S. jurisdiction: “United States requirements for exercising jurisdiction over a person are often more stringent than those in the law of other countries. Whether a company providing services in U.S. territory is subject to U.S. jurisdiction is a highly fact-dependent analysis regarding whether the entity has sufficient contacts with the U.S. to make the exercise of jurisdiction fundamentally fair. The more a company has purposefully availed itself of the privilege of conducting activities in the United States or purposefully directed its conduct into the U.S., the more likely a U.S. court is to find that the company is subject to U.S. jurisdiction.”
[21] See Electronic Evidence Proposal, Art. 3(1); Explanatory Memorandum at 13.
[22] See Electronic Evidence Proposal, Explanatory Memorandum at 13: “The Regulation [] moves away from data location as a determining connecting factor, as data storage normally does not result in any control by the state on whose territory data is stored. Such storage is determined in most cases by the provider alone, on the basis of business considerations.”
[24] Peter Swire, Independent Expert Testimony in case of Schrems v. Facebook, ch. 9 (2016), available at https://www.alston.com/-media/files/insights/publications/peter-swire-testimony-documents/chapter-9–the-broad-scope-of-electronic-communica.pdf?la=en. These providers include not only the expected sorts of providers of email and social network services, but a broader array, including a company that provides its employees with corporate email or similar ability to send and receive electronic communications.
[29] Although the SCA on its face does not require a warrant when communications have been stored for more than 180 days, the requirement to obtain a warrant even in such cases originates from the case of United States v. Warshak, 631 F.3d 266 (6th Cir. 2010). Following Warshak, DOJ adopted a policy of obtaining a warrant whenever it seeks to obtain the content of emails or other “similar stored content information” from a service provider in a criminal investigation. See U.S. Department of Justice, Acting Assistant Attorney General Elana Tyrangiel Testifies Before the U.S. House Judiciary Subcommittee on Crime, Terrorism, Homeland Security, and Investigations (Mar. 19, 2013), https://www.justice.gov/opa/speech/acting-assistant-attorney-general-elana-tyrangiel-testifies-us-house-judiciary.
[30] See Peter Swire & Debrae Kennedy-Mayo, How Both the EU and the U.S. Are “Stricter” Than Each Other for the Privacy of Government Requests for Information, 66 Emory L. J. 617 (2016), 66 Emory Law Journal 101 (2017), available at https://ssrn.com/abstract=2920748.
[31] See Carpenter v. United States, 138 S.Ct. 2206, 2222 (2018) (holding that a warrant is required to access more than six days of cell-site historical location data and describing as “sensible” a warrant requirement for communications content).