Gathering CLOUD Requests Forecast for Technology and Communications Service Providers
Republished in The Computer & Internet Lawyer.
Gathering CLOUD Requests Forecast for Technology and Communications Service Providers
Republished in The Computer & Internet Lawyer.
As a result of a recent agreement between the United Kingdom and United States, technology and communications service providers should prepare for changes in the landscape of data access requests by UK and U.S. law enforcement agencies.
The U.S. Department of Justice (DOJ) recently announced the entry into force, as of October 3, 2022, of a bilateral agreement between the United Kingdom and United States on Access to Electronic Data for the Purpose of Countering Serious Crime (the “UK CLOUD Agreement”), which is authorized in the United States under the Clarifying Lawful Overseas Use of Data Act (the “CLOUD Act”).
The UK CLOUD Agreement will enable law enforcement agencies in either country (through the DOJ’s Office of International Affairs and UK Home Office’s Investigatory Powers Unit) to access data held by electronic communications or remote computing service providers (such as social media, messaging platforms, and cloud service providers) (“Service Providers”) in the other country, for the purpose of combatting serious crime.
The CLOUD Act was passed by the U.S. Congress in 2018 to address two issues arising from the Stored Communications Act (SCA), 18 U.S.C. §§ 2701-2713, regarding the production of data to law enforcement agencies, namely:
Both issues led to potentially untenable conflicts of laws. On the one hand, for example, a U.S.-based Service Provider doing business in a foreign country could be subject to both foreign requirements to produce data and the SCA’s prohibition on producing that data. On the other hand, U.S. agencies might serve a warrant on a U.S.-based Service Provider calling for production of data located in a foreign country which might have a statute blocking production of such data.
The CLOUD Act addresses these issues by:
Upon the request of law enforcement agencies, Service Providers may be required to preserve, back up, or disclose data to the agencies for the purposes of the prevention, detection, investigation, or prosecution of serious crime, including terrorism, sexual exploitation of children, and cybercrime.
The UK CLOUD Agreement enables law enforcement agencies of either country to make requests directly to Service Providers in the other country (“Requests”), provided the requirements in the UK CLOUD Agreement are satisfied (as summarized below). Previously, law enforcement requests would have to go through the MLAT process.
The UK CLOUD Agreement, in turn, also removes barriers under U.S. domestic law (as noted above) which previously prohibited Service Providers from responding to law enforcement agencies of the other country to disclose electronic data.
The scope of the CLOUD Act and UK CLOUD Agreement is limited to Service Providers (i.e., those entities which are subject to the SCA restrictions described above). All other organizations are therefore unaffected by this regime. Furthermore, the CLOUD Act and UK CLOUD Agreement only concern access to data by law enforcement. As such, the CLOUD Act regime does not affect access to data for national security purposes.
Furthermore, we should note that the CLOUD Act does not give either the United States or any foreign country additional bases to seek data, which would still be governed by the laws of the requesting country.
However, the UK CLOUD Agreement includes specific requirements that must be met for the U.S. or UK law enforcement agencies to issue Requests, including that:
Service Providers are not compelled to decrypt the data requested by law enforcement agencies. Furthermore, the UK CLOUD Agreement also permits a Service Provider to raise specific objections when it has a reasonable belief that the UK CLOUD Agreement may not be properly invoked. Any objections should be raised by a Service Provider to the law enforcement agency issuing the Request within a reasonable time after its receipt. If the objections are not resolved, the Service Provider may thereafter raise objections with its domestic law enforcement agency. The two agencies may then work together to resolve the objections. However, if the Service Provider’s domestic law enforcement agency concludes that the UK CLOUD Agreement was not properly invoked, the UK CLOUD Agreement will not apply to the Request.
Service Providers will also be expected to respond to Requests in a much shorter timeframe under the UK CLOUD Agreement, namely in a matter of weeks, rather than months, as is commonplace under the MLAT process. Any actions taken in the event of non-compliance will be governed by the legislation of the country of the law enforcement agency making the Request.
The CLOUD Act aims to deal with the multi-jurisdictional nature of electronic data and avoid problems of data localization through bilateral negotiations. As criminal investigations become ever more global, we expect that more countries will have a strong incentive to increase ways to permit data flows across borders to assist in law enforcement investigations.
To that end, in addition to the United Kingdom and Australia, the United States has already started further CLOUD Act agreement negotiations with Canada and the EU. The EU negotiations, however, are likely to be more protracted than others. This is primarily because the EU will need to resolve its own internal e-evidence rules and because it does not have a single law enforcement agency. EU Member States would therefore need to make their own data requests, some of which may not meet U.S. due process standards.
We are grateful to Harry Anderson, trainee solicitor, for his contribution to this alert.
Practices