Frequently Asked Questions about the U.S. CLOUD Act

Cross-Border Data Forum Bannner

Introductory note: This set of FAQs responds to questions from non-U.S. countries about the meaning and implications of the CLOUD Act. Some questions have arisen from the European Union in connection with the CLOUD Act, and this paper seeks to address those questions specifically. But it is important to note that countries outside of the EU are expected to seek executive agreements under the CLOUD Act as well.

The U.S. Department of Justice (DOJ) also recently published a Cloud Act White Paper, with accompanying FAQs, which covers many of the key questions as well. We encourage readers to look at the DOJ’s official explanation and clarification of the legislation. These FAQs here are meant to provide an independent, supplemental assessment of the legislation and the recurring questions that continue to arise. We also provide additional citations to assist the reader in further research. As with the other publications from CBDF, the views expressed here are solely those of the authors.

    1. What are the two major parts of the CLOUD Act?
    2. How does the Stored Communications Act create obstacles for non-U.S. law enforcement to access evidence?
    3. Why not simply improve the current MLAT system?
    4. What would be the advantages to the EU or a Member State of signing an Executive Agreement with the United States under the CLOUD Act?
    5. Why is the United States attempting to make it easier for foreign governments to gain access to evidence held by US companies?
    6. What terms would have to be in an Executive Agreement for each individual request from a qualifying foreign government?
    7. What ongoing institutional safeguards for protection of personal data would have to be in an Executive Agreement for requesting countries (such as a Member State) to qualify under the CLOUD Act?
    8. The EU has suggested negotiating with the U.S. outside of the CLOUD Act framework. What would be different if a non-CLOUD Act approach were adopted?
    9. The CLOUD Act says that Executive Agreements have to provide “reciprocal” access to the United States. What does the term “reciprocal” mean in the CLOUD Act?
    10. Under a CLOUD Act Executive Agreement, would DOJ be able to access evidence about persons from the non-U.S. country?
    11. Executive Agreements would apply only for “serious crimes.” What constitutes a “serious crime”?
    12. If a company refuses to comply with a non-U.S. evidence request made under an Executive Agreement, what are the penalties?
    13. Would the U.S. gain the power to conduct wiretaps in the E.U. under an Executive Agreement?
    14. How would DOJ requests under the executive agreement fit with the EU’s privacy protections?
    15. How will U.S. law enforcement make requests under an Executive Agreement?
    16. Will US agencies be able to send evidence requests to companies in a qualifying foreign country?
    17. When a provider receives an evidence request under an Executive Agreement, can the provider challenge the request?
    18. Are the individuals whose data is requested by investigating agencies under an Executive Agreement notified about the request?
    19. What was the goal of this part of the CLOUD Act?
    20. Does the U.S. CLOUD Act expand the territorial reach of U.S. law?
    21. What sort of “providers” of “electronic communication services” and “remote computing services” are required to respond to DOJ under the CLOUD Act?
    22. What sorts of evidence can DOJ collect under the CLOUD Act?
    23. How strict are the procedural requirements before DOJ can access this evidence?
    24. How broad is the power of DOJ to seek information under the “possession, custody, or control” of a service provider?
    25. Does this part of the CLOUD Act enable DOJ to gain evidence held by a European company doing business only in Europe?
    26. Does the U.S. require notice to the individual when a request for evidence is made?
    27. Does a U.S. service provider have any legal way to challenge an order issued under the CLOUD Act?
    28. Can the CLOUD Act be used for U.S. intelligence purposes? For U.S. civil, commercial, or administrative litigation?
    29. Can the CLOUD Act be used to steal intellectual property or trade secrets of non-U.S. companies, for the benefit of U.S. competitors?
    1. What are the two major parts of the CLOUD Act?
      The CLOUD Act contains two key parts. One part responds to foreign governments’ concerns about U.S. laws that restrict foreign law enforcement’s access to communications content held by U.S. service providers [2] —restrictions that apply even when foreign governments are seeking to access data regarding their own nationals in the investigation of local crime. This part of the CLOUD Act authorizes the creation of bilateral executive agreements that would lift those restrictions and thereby enable foreign governments to access communications content directly from U.S.-based service providers, subject to a set of conditions.

    The other key part clarifies the rules governing U.S. law enforcement access to data in the hands of U.S. providers. The following seeks to answer key questions and clarify the operation of both parts.

    Executive Agreements and Non-U.S. Access to Evidence

    1. How does the Stored Communications Act create obstacles for non-U.S. law enforcement to access evidence?
      The Stored Communications Act (SCA) operates as a “blocking statute.” Except where a statutory exception applies, it prohibits U.S.-based service providers from disclosing communications content to a foreign government, unless there is a CLOUD Act agreement in place (as discussed below). [3]

    The SCA applies even if the non-U.S. government is seeking communications content with regard to one of its own nationals in the investigation of a local crime. It also applies even if the non-U.S. government has obtained a compelled disclosure order pursuant its national laws.

    More specifically, the SCA states that a covered service provider “shall not divulge” stored communications content to “any person or entity,” unless pursuant to one of nine statutory exceptions, none of which authorizes disclosure to foreign governments. [4]

    The SCA also sets out the situations in which service providers can be compelled to disclose communications content. Only a “governmental entity”—defined as a U.S. federal or state department or agency [5] —is given the authority to compel a provider to disclose communications content, and only according to specified substantive and procedural standards. As discussed further below, access to communications content requires a search warrant, signed by an independent U.S. judge, based on the judge’s finding that there is “probable cause” both that (a) a specific crime has occurred or is occurring and (b) the place to be searched, such as an email account, contains evidence of that specific crime. In addition, the warrant must describe with particularity the data to be searched or seized. Service providers who furnish the content of communications to a U.S. or foreign government, in the absence of such a search warrant or a CLOUD Act-authorized executive agreement, risk civil liability. Prior to the Cloud Act, there was no provision that authorized disclosure of communications content to foreign law enforcement in any circumstance, even in response to compelled disclosure orders issued by foreign courts.

    1. Why not simply improve the current MLAT system?
      The increasing globalization of criminal evidence creates significant challenges for law enforcement. Historically, requests for evidence held in other countries have been handled through a Mutual Legal Assistance Treaty (MLAT). According to a 2018 European Commission impact assessment report, more than half of all criminal investigations include a cross-border request to access electronic evidence. As the U.S. Department of Justice Deputy Assistant Attorney General Richard W. Downing explained, “[t]he exponential rise in demand for electronic evidence also places extraordinary demands on the existing [MLAT] process.” While the MLAT system is and will continue to a critically-important information gathering system in many cases, it is widely considered too slow and cumbersome to handle the increasing volume and frequency of requests. In addition, because some service providers move data among multiple different data storage centers, located in multiple different countries, it can be difficult to identify where particular sought-after data is even located at a given point of time. Moreover, the place where the data is located may have no connection to the case other than the fact that a service provider decided to store it there. Multiple scholars and government reports have concluded that incremental improvements to the existing MLAT system cannot effectively address these issues, given the volume of requests, the inability to identify a stable location for particular data, and the ongoing frustration about having to get foreign government consent for a domestic investigation that would not otherwise involve the foreign government but for the location of the data.

    For more detailed discussions of the current MLAT system and the potential scope and impact of proposed reforms, see: