Cybervize – Cybersecurity Beratung

US CLOUD Act & FISA 702: Why US Cloud Providers Are Problematic

Alexander Busse·November 28, 2025

The Uncomfortable Truth About US Cloud Providers

"If your data is stored with American cloud providers, US authorities can access it at any time." This statement is often heard behind closed doors in conversations with IT managers, CISOs, and executives. But is this a rumor or a legal fact?

The answer is clear: It is a legal reality. US providers such as Microsoft, Google, or Amazon are subject to US law, regardless of whether the data is physically stored in Frankfurt, Amsterdam, or any other European data center. This fact has far-reaching consequences for German and European companies using cloud services.

The Legal Framework: US CLOUD Act and FISA 702

To understand the scope of this issue, we need to examine two central pieces of US legislation that regulate US authorities' access to data.

The US CLOUD Act: Access for Law Enforcement

The CLOUD Act (Clarifying Lawful Overseas Use of Data Act) was passed in 2018 and grants US law enforcement agencies extensive powers. The main requirements for data access are:

  • A lawful court order exists
  • The provider falls under US jurisdiction (regardless of data storage location)
  • There is a criminally relevant purpose
  • A non-disclosure obligation often applies, meaning the affected company may not be informed

This means in practice: If Microsoft, Google, or Amazon are requested by US authorities to hand over data, they must comply, even if the data resides on servers in the EU. The storage location is legally irrelevant.

FISA 702: The Intelligence Agency Perspective

Even more far-reaching is FISA Section 702 (Foreign Intelligence Surveillance Act). This regulation allows US intelligence agencies to access data under the following conditions:

  • The targets are non-US citizens outside the USA
  • The purpose is obtaining "Foreign Intelligence"
  • The cloud provider qualifies as an "Electronic Communication Service Provider"

FISA 702 enables much more comprehensive surveillance than the CLOUD Act and is subject to less stringent judicial oversight. For European companies, this means their communication and data can potentially be accessed without their knowledge.

What Does This Mean for German Companies?

The practical consequences of this legal situation are significant and affect nearly every company using US cloud services.

Affected Services and Platforms

The following commonly used services fall under the described regulations:

  • Microsoft 365 (formerly Office 365)
  • Google Workspace
  • Amazon Web Services (AWS)
  • Numerous US SaaS solutions for CRM, marketing, project management, and more

Even if contracts explicitly reference EU data centers, this does not change the fundamental access rights of American authorities.

Conflict with GDPR and Schrems II

This creates a fundamental conflict with European data protection law. The Schrems II ruling by the European Court of Justice in 2020 made it clear that US data protection standards do not match those of the EU. However, GDPR requires an adequate level of protection when transferring data to third countries.

The consequences of a violation can be severe:

  • Fines up to 4% of global annual revenue or 20 million euros
  • Reputational damage and loss of customer trust
  • Competitive disadvantages compared to data protection-compliant competitors
  • Legal disputes with supervisory authorities

Particularly Critical Areas

For certain industries and data types, the issue is especially acute:

Critical Infrastructure Operators: Operators of critical infrastructure are subject to strict regulatory requirements. Using US cloud services can lead to compliance violations.

Highly Regulated Industries: Financial service providers, healthcare facilities, and insurance companies process highly sensitive data and must adhere to particularly strict data protection standards.

Intellectual Property: Companies with valuable IP portfolios risk having strategically important information potentially accessed.

Confidential Business Strategies: M&A activities, product developments, and strategic planning do not belong in the cloud if access by third parties cannot be ruled out.

The Myth of the German Data Center

A widespread misconception must be clarified at this point: "The data is stored in a German data center" is no longer sufficient as a security argument.

The physical location of servers is legally irrelevant if the operator falls under US jurisdiction. What matters is the corporate structure and legal jurisdiction of the provider, not the server location.

Marketing statements like "Made in Germany Cloud" or "EU data centers" can be misleading if they suggest automatic protection from US government access.

Required Measures: What Companies Must Do Now

Given this legal situation, concrete actions are required. Inaction is no longer an option.

1. Conduct Honest Risk Analysis

The first step is a transparent assessment of the current situation:

  • Data Protection Impact Assessment (DPIA): What personal data is processed in US clouds? What risks exist?
  • Transfer Impact Assessment (TIA): How high is the risk of government access specifically? What would be the impact?
  • Compliance Check: Are all regulatory requirements being met?

These analyses should be documented and serve as the basis for strategic decisions.

2. Implement Technical Protective Measures

Where the use of US cloud services is unavoidable or economically sensible, additional technical protective measures must be taken:

End-to-End Encryption: Data should be encrypted before upload, so the cloud provider has no access to plaintext.

Customer Managed Keys: Encryption keys must remain in your own possession and must not be managed by the cloud provider.

Bring Your Own Key (BYOK): Many providers now offer BYOK solutions, which must be carefully examined for their actual effectiveness.

Hold Your Own Key (HYOK): Even more secure is keeping keys from ever leaving your own company.

3. Strategic Use of EU and Non-US Solutions

For particularly sensitive data and critical applications, the conscious use of European alternatives should be evaluated:

  • European cloud providers without US parent companies
  • Open-source solutions with self-hosted infrastructure
  • Hybrid approaches: non-critical data in US clouds, sensitive data with EU providers

This often requires rethinking and possibly higher investments but offers genuine legal security.

4. Contractual Safeguards and Transparency

Even though contractual clauses do not offer complete protection, they should still be part of the strategy:

  • Standard Contractual Clauses (SCCs) following Schrems II
  • Transparency clauses regarding government requests
  • Notification obligations (where legally permissible)

The Strategic Perspective: Cloud Sovereignty as Competitive Advantage

The described issue is not just a compliance matter but a strategic question of considerable significance.

Companies that adopt data protection-compliant cloud solutions early can use this as a competitive advantage:

  • Building trust with privacy-conscious customers
  • Avoiding future regulatory risks
  • Independence from non-European legal jurisdictions
  • Protection of trade secrets and IP

Investment in European cloud infrastructure or appropriate protective measures is an investment in the company's digital sovereignty.

Conclusion: Honesty Is the First Step

The question is not whether US authorities can access data held by American cloud providers, but how companies deal with this fact.

Many decision-makers have largely ignored this issue until now, out of convenience, cost considerations, or lack of awareness. But the legal and reputational risks are real and continuously increasing.

The first step is honesty: A transparent analysis of the current situation, without sugar-coating. Only then can informed decisions be made that are both legally compliant and economically viable.

The good news: There are solutions and strategies to minimize risks. But they require active engagement and willingness to confront uncomfortable truths.

How does your company handle this challenge? What experiences have you had? Open dialogue about these issues is crucial for developing better solutions together.