Government Access
Legal frameworks enabling government access to data (CLOUD Act, FISA, etc.)

When Your Values Become a Liability: Digital Sovereignty and Moral Independence
The ICC sanctions show how US digital dominance can be weaponized against organizations that stand for justice. Who's next?

Norway's Digitalisation Minister: All Organizations Need a Cloud Exit Strategy
Minister Karianne Tung urges Norwegian organizations to prepare contingency plans for US cloud providers
CLOUD Act
US law enabling law enforcement to compel US technology companies to disclose data regardless of where it is physically stored.
Data Security Law
Chinese law establishing data classification, cross-border transfer controls, and government access for national security.
ECPA
US law governing government access to electronic communications, with different standards for content, metadata, and stored communications.
Ekomloven
Norwegian law regulating electronic communications networks, services, and lawful interception requirements.
EO 12333
Presidential directive authorizing US intelligence agencies to collect signals intelligence on foreign targets outside US territory.
FISA Section 702
US law authorizing warrantless surveillance of non-US persons located outside the United States for foreign intelligence purposes.
IT Act
Indian law enabling government interception, monitoring, and decryption of any computer resource in the interest of national security.
LED
EU directive setting data protection rules for police and criminal justice authorities.
National Intelligence Law
Chinese law requiring all organizations and citizens to support, assist, and cooperate with state intelligence activities.
Patriot Act
Post-9/11 US law significantly expanding surveillance powers for terrorism investigations, including Section 215 business records collection.
Schrems II
Landmark 2020 CJEU ruling that invalidated EU-US Privacy Shield and imposed strict requirements for international data transfers.
TOLA Act
Australian law enabling authorities to compel technology companies to build backdoors, assist with decryption, and provide technical capabilities for surveillance.