ARTICLE
1 April 2026

Beyond The Server Location: Why The New Fight Over FISA 702 And The Cloud Act Matters To Corporate Privacy Strategy

BT
Barnes & Thornburg LLP

Contributor

In a changing marketplace, Barnes & Thornburg stands ready at a moment’s notice, adapting with agility and precision to achieve your goals. As one of the 100 largest law firms in the United States, our 800 legal professionals in 23 offices put their collective experience to work so you can succeed.
Data location is no longer the whole story. Even where data is stored abroad, U.S. legal authorities tied to provider jurisdiction, access, and control can still create meaningful compelled-access and surveillance risk.
United States Washington Privacy
Lyric D. Menges’s articles from Barnes & Thornburg LLP are most popular:
  • within Privacy topic(s)
  • with Senior Company Executives, HR and Inhouse Counsel
  • in United States
  • with readers working within the Advertising & Public Relations, Banking & Credit and Business & Consumer Services industries

Highlights

  • Data location is no longer the whole story. Even where data is stored abroad, U.S. legal authorities tied to provider jurisdiction, access, and control can still create meaningful compelled-access and surveillance risk.
  • Section 702 of the Foreign Intelligence Surveillance Act (FISA 702) is now a mainstream corporate governance issue. The current reauthorization debate, coupled with proposed reforms like the SAFE Act, has direct implications for vendor diligence, cross-border transfers, AI governance, and internal data-minimization strategy.
  • In-house counsel should prepare for more scrutiny, not less. Companies should revisit transfer assessments, cloud contracting, provider diligence, and internal response protocols now, particularly where sensitive data, centralized cloud environments, or AI-enabled analytics are involved.

For years, many companies saw foreign-intelligence surveillance law as a problem for governments, telecom carriers, and a small set of hyperscale infrastructure providers. That view is no longer tenable.

As of March 2026, the conversation around FISA Section 702 is not just a civil liberties debate in Washington. It is also a board-level governance issue for cloud customers, multinational businesses, and in-house counsel responsible for cross-border data strategy and incident response planning.

The immediate trigger is political: Section 702, as reauthorized in 2024, runs through April 2026, and House leadership is now pressing for another extension. U.S. House of Representatives Speaker Mike Johnson (R-La.) and senior intelligence officials in the current administration are pushing for a swift renewal.

Meanwhile, reform-minded lawmakers continue to argue that the existing regime permits warrantless access to Americans' communications with insufficient oversight. Sen. Dick Durbin (D-Ill.) has stated that Section 702 is valuable but has been used to conduct thousands of warrantless searches of Americans' private communications, and he highlighted a renewed push for statutory reform.

The SAFE Act and Section 702

That reform push has crystallized around the SAFE Act. According to Sen. Mike Lee (R-Utah) and Sen. Durbin, the bill would reauthorize Section 702 while adding a warrant or FISA Title I order requirement before the government accesses the content of Americans' communications returned in a U.S.-person query, It would also address the government's ability to obtain sensitive personal data from brokers without ordinary judicial process.

In other words, the present debate is no longer simply "renew or expire." It is whether Congress will continue to tolerate surveillance architecture in which foreign-intelligence collection, domestic querying, and commercially available data can be combined with relatively low friction.

That distinction matters because Section 702 is often described too narrowly. Formally, it is a foreign-intelligence authority directed at non-U.S. persons located abroad. Practically, however, it sits inside a broader data-access ecosystem. Incidental collection of U.S.-person communications, post-collection querying, and the widening universe of entities that may be compelled to assist all shape the operational privacy risk. European regulators have noticed this, too. In its 2024 review of the EU-U.S. Data Privacy Framework, the European Data Protection Board expressly warned that the 2024 amendment to the definition of "electronic communication service provider" under Section 702 creates uncertainty about the actual reach of 702 surveillance, even while recognizing other safeguards.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

The CLOUD Act complicates the picture further. The U.S. Department of Justice's own materials state that the act clarifies that providers subject to U.S. jurisdiction must disclose data responsive to valid U.S. legal process regardless of where the provider stores the data. The CLOUD Act also authorizes bilateral executive agreements designed to facilitate cross-border law enforcement access to data in serious-crime investigations. That framework is often discussed as a law-enforcement measure, not an intelligence one.

But from a corporate-risk perspective, the distinction can be less comforting than lawyers sometimes assume. The central point is that geographic storage alone does not eliminate U.S. legal exposure where the provider remains subject to U.S. jurisdiction.

This is where FISA 702 and the CLOUD Act become strategically connected. They do not create one seamless master authority, and that oversimplification should be resisted.

Together, they reinforce a reality that privacy professionals already understand intuitively: data location is not the same thing as data sovereignty, and vendor nationality can matter as much as server geography. One regime speaks to intelligence collection; the other to compelled disclosure in criminal investigations and executive-agreement frameworks. Yet both undermine the simplistic marketing claim that offshore hosting, standing alone, meaningfully resolves government-access risk. That is precisely why transatlantic transfer analysis still turns on legal exposure, proportionality, redress, and practical access pathways, not just on which region is selected in a cloud console.

For companies operating in or with Europe, this remains a live issue. The European Data Protection Board (EDPB)'s first review of the Data Privacy Framework acknowledged improvements but continued to express concern about Section 702's scope and the lack of additional codified safeguards. That should be read as a warning against complacency. The existence of an adequacy mechanism or transfer tool does not erase the need for careful transfer-impact analysis where a business relies heavily on U.S.-linked cloud, communications, analytics, or managed-service providers.

AI, Surveillance and Data Security

There is also a technological reason the current debate feels more urgent than past renewal fights. Civil-liberties groups are increasingly focusing not just on collection, but on what happens when large datasets are paired with AI-enabled analysis. Just this month, the American Civil Liberties Union (ACLU) and Center for Democracy & Technology (CDT) argued in an amicus filing and related public statements that forcing AI companies to support mass domestic surveillance would heighten privacy and civil-liberties risks, while the ACLU has separately warned that AI can make surveillance more detailed, scalable, and intrusive. The precise legislative consequences of those warnings remain unsettled, but the direction of travel is clear: the legal system is still organized around access authorities, while the real-world privacy impact increasingly turns on searchability, inference, and automation.

That mismatch is what in-house teams should be paying attention to. The central corporate question is no longer merely whether the government can obtain data — it is how quickly disparate datasets can be correlated and operationalized once access is available. A regime built for stored communications and targeted process can produce very different risks when overlaid onto cloud-native environments, centralized identity systems, unified telemetry, and AI-assisted pattern analysis. That is true whether the requesting authority sounds in intelligence, criminal process, or commercially purchased data.

Key Takeaways for Clients and In-House Counsel

For clients and in-house counsel, the most prudent response is not panic; it is maturity:

  • First, companies should stop treating data residency as a complete answer and instead evaluate jurisdictional exposure at the provider level: who controls the environment, which entity can be compelled, what subcontractors sit underneath the service, and whether the architecture meaningfully limits provider access in practice.
  • Second, legal and privacy teams should revisit transfer-impact assessments and vendor diligence questionnaires to address government-access exposure expressly, including Section 702 status, subcontractor chains, encryption key custody, challenge policies, transparency reporting, and incident-notification commitments.
  • Third, organizations should align data minimization with legal realism: if a category of data does not need to be centralized, retained, or linked, reducing that footprint is often the most durable safeguard available.
  • Fourth, counsel should ensure the company's internal governance documents match the external risk narrative. Privacy notices, Data Protection Agreements (DPAs), security exhibits, data maps, records of processing, and law-enforcement response playbooks should not speak as though storage location alone resolves compelled-access risk.
  • Fifth, companies deploying AI across customer or workforce data should include government-access and downstream-use scenarios in AI governance reviews. An AI inventory that ignores lawful-access risk is incomplete, especially where the underlying datasets include communications content, location data, behavioral signals, or other sensitive information.

Finally, leadership should resist the temptation to view this debate as a contest between privacy rhetoric and national-security necessity. Serious legal analysis does not require choosing slogans. Section 702 may remain operationally important; even the SAFE Act's sponsors say as much.

The harder question is whether Congress will modernize the rules governing access to Americans' communications and commercially available sensitive data before surveillance capability is further amplified by AI and ever more centralized cloud infrastructure. As of March 2026, that answer remains unsettled. What is settled is that sophisticated companies should no longer assume these questions belong only to cyber intelligence lawyers or Washington policymakers. They now belong squarely within mainstream privacy, cybersecurity, procurement, and cross-border data governance.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More