It is known from judgments (e.g. SchremsII), legal texts (e.g. PRISM) and expert commissions that there are so-called “Secret Orders” in the USA. These allow the US intelligence services, such as the NSA or CIA, to access customer data from US cloud providers if there is a suspicion of terrorism, for example. This access is […]