The EU and GDPR

The European Union offers the strongest legal privacy protections of any major jurisdiction. Privacy is enshrined as a fundamental right in Articles 7 and 8 of the EU Charter of Fundamental Rights — not a statutory convenience, but a constitutional guarantee. The General Data Protection Regulation (GDPR), in force since 2018, operationalises this right for digital services.

Under GDPR, email providers operating in the EU must have a lawful basis for every piece of data they process. They must minimise data collection, respect purpose limitation, and respond to user requests for access, correction, or deletion. Penalties for violations reach up to 4% of global annual turnover — a meaningful deterrent for even the largest corporations.

Crucially, GDPR creates barriers to cross-border data transfers. EU user data cannot simply be handed to non-EU governments without going through established legal frameworks, which typically require notification and an opportunity for judicial review.

The United States: ECPA, CLOUD Act, and FISA

The United States presents a very different picture. The Electronic Communications Privacy Act (ECPA) of 1986 — written before the web existed — governs email access in the US, and it is badly outdated. Under ECPA, emails stored on a server for more than 180 days were historically treated as "abandoned" and accessible without a warrant. While courts and some legislative reforms have improved this, the underlying framework remains a patchwork.

More significant is the CLOUD Act of 2018. This law allows US law enforcement agencies to compel US companies to produce data stored anywhere in the world — including on servers located in the EU. If your email provider is incorporated in the US, or is a subsidiary of a US company, CLOUD Act requests can reach your data regardless of where the servers physically sit.

FISA (Foreign Intelligence Surveillance Act) goes further still, enabling bulk collection of communications involving non-US persons under programmes like PRISM — the programme revealed by Edward Snowden in 2013 — which compelled major US technology companies to provide ongoing access to their users' data.

The United Kingdom: The Investigatory Powers Act

The UK's Investigatory Powers Act 2016, dubbed the "Snoopers' Charter" by critics, is among the most expansive surveillance laws in any democracy. It authorises bulk collection of communications data, equipment interference (hacking) by intelligence services, and requires telecommunications operators — including email providers — to retain metadata on all communications for twelve months and to cooperate with interception warrants.

Post-Brexit, the UK operates outside GDPR, though it has retained a domestic UK GDPR equivalent. However, the surveillance-law picture is considerably bleaker than in the EU, and providers operating under UK jurisdiction face mandatory cooperation requirements that EU-based providers do not.

Five Eyes, Nine Eyes, and Fourteen Eyes

Beyond individual country laws, a network of intelligence-sharing alliances substantially extends the reach of surveillance. The Five Eyes alliance — comprising the US, UK, Canada, Australia, and New Zealand — share signals intelligence freely and have historically used this arrangement to circumvent domestic restrictions on surveilling their own citizens: one country surveils another's citizens and shares the results.

The Nine Eyes (adding Denmark, France, Netherlands, Norway) and Fourteen Eyes (adding Germany, Belgium, Italy, Spain, Sweden) extend this network further. If your email provider is based in any of these countries, its data may be accessible to intelligence agencies across the entire alliance — often without any judicial oversight visible to the user.

Switzerland: Privacy Reputation vs. Legal Reality

Switzerland is frequently cited as a privacy haven, and several encrypted email providers have chosen it for this reason. Switzerland is not an EU member, so it is not subject to GDPR — but it has its own Federal Act on Data Protection (FADP), revised in 2023 to be more GDPR-aligned. Swiss providers are subject to Swiss law, including Swiss criminal procedures and mutual legal assistance treaties.

In practice, Swiss providers have complied with legally compelled requests from Swiss authorities. In 2021, a well-known Swiss encrypted email provider was ordered to log and hand over the IP address of a user, leading to that user's arrest. This case illustrated clearly that legal jurisdiction — not just technical architecture — determines what a provider can be compelled to do. A zero-knowledge provider can be compelled to begin logging going forward, even if it cannot hand over historical message content.

Austria: The enemail Jurisdiction

Austria combines strong constitutional privacy protections with full GDPR compliance, and sits outside the Five Eyes and Fourteen Eyes networks. The Austrian constitution explicitly protects the privacy of communications (Fernmeldegeheimnis), and the Datenschutzgesetz (Data Protection Act) implements GDPR at the national level with strong enforcement by the Austrian Data Protection Authority (Datenschutzbehörde).

Austrian authorities can compel providers to cooperate with legitimate criminal investigations — no jurisdiction is a lawless zone — but the bar is significantly higher than in the US or UK, and EU data-protection rights apply in full. Cross-border data transfers to non-EU authorities face substantial legal obstacles.

This is why enemail chose Austria. The combination of EU fundamental rights, GDPR, constitutional communications privacy, and distance from the Five Eyes alliance makes Austrian jurisdiction one of the strongest available for an email privacy service. When zero-knowledge encryption is added on top of this legal foundation, the combination is as strong as it gets.

What This Means When Choosing an Email Provider

The technical security of an email provider — its encryption implementation, its zero-knowledge architecture — is necessary but not sufficient. Jurisdiction determines what a provider can be legally compelled to do. Consider these practical points:

  • A US-based provider, no matter how technically secure, is subject to CLOUD Act orders and FISA collection. This is not a theoretical risk.
  • A UK-based provider must retain metadata and cooperate with interception warrants under the Investigatory Powers Act.
  • A Swiss provider offers better legal protection than a US or UK provider, but Switzerland is not the EU, and legal compulsion is possible as the 2021 case demonstrated.
  • An EU-based provider in a country with strong constitutional privacy protections — combined with zero-knowledge encryption — offers the most complete protection available.
  • Zero-knowledge encryption protects message content even from compelled disclosure, but providers can still be ordered to log metadata going forward. Minimal metadata retention policies are therefore equally important.
Key insight: A zero-knowledge provider in the US still has to respond to CLOUD Act requests — the cryptography is the only real protection. Jurisdiction determines what the provider must do; encryption determines what the provider can hand over.

The complete privacy package

Austrian jurisdiction. GDPR. Zero-knowledge encryption. enemail combines the strongest legal framework with cryptographic guarantees — so even a compelled disclosure reveals nothing of value.

Create your free account