UNITED STATES
Since October 1999
Pillar Domestic data policies |
Indicator Minimum period for data retention
Network Security Agreements
It is reported that foreign communications infrastructure providers have been asked to sign Network Security Agreements (NSAs) in order to operate in the U.S. The agreements impose local storage requirements for certain customers' data as well as minimum periods of data retention for data such as billing records and access logs. It is also reported that the agreements require companies to maintain what amounts to an “internal corporate cell of American citizens with government clearances”, ensuring that “when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely.”
Coverage Telecommunications sector
Sources
- https://web.archive.org/web/20220309003607/https://info.publicintelligence.net/US-NSAs/US-NSAs-Level3.pdf
- https://web.archive.org/web/20231004153206/https://publicintelligence.net/us-nsas/
- https://web.archive.org/web/20240308115454/https://www.justice.gov/opa/press-release/file/1457291/download
- https://web.archive.org/web/20231209101441/https://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df...
- Show more...
UNITED STATES
Since December 2000
Pillar Domestic data policies |
Indicator Requirement to perform a Data Protection Impact Assessment (DPIA) or have a data protection officer (DPO)
HIPAA Privacy Rule - Title 45 of the Code of Federal Regulations
Pursuant to Section 164.530(a) of Title 45 of the Code of Federal Regulations, a covered entity is required to designate a privacy official who shall be responsible for the development and implementation of the entity’s privacy policies and procedures. The term "covered entity" encompasses: (1) a health plan; (2) a health care clearinghouse; and (3) a health care provider who transmits any health information in electronic form in connection with a transaction subject to the provisions of this subchapter.
Coverage Health sector
UNITED STATES
Since 1978, last amended in 2018
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
Foreign Intelligence Surveillance Act (FISA) of 1978
Section 702 of the Foreign Intelligence Surveillance Act allows the National Security Agency to conduct searches of foreigners' communications without any warrant. It is reported that these searches incidentally collect an unknown amount of communications belonging to Americans.
Coverage Horizontal
Sources
- https://web.archive.org/web/20230329221053/https://www.govinfo.gov/content/pkg/STATUTE-92/pdf/STATUTE-92-Pg1783.pdf
- https://web.archive.org/web/20230404122759/https://www.reuters.com/article/us-usa-trump-cyber-surveillance/trump-signs-bill-renewing-nsas-internet-surveillance-program-idUSKBN1F82MK
- https://web.archive.org/web/20230322172706/https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1286
- https://web.archive.org/web/20230112063151/https://sgp.fas.org/crs/intel/IF11451.pdf
- Show more...
UNITED STATES
Since October 1999, most recently in December 2021
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
Network Security Agreements
It is reported that foreign communications infrastructure providers have been asked to sign Network Security Agreements (NSAs) in order to operate in the US. These agreements ensure that U.S. government agencies have the ability to access communications data when legally requested, often through a National Security Letter (NSL). NSLs do not require prior approval from a judge. The data in question can include call-identifying information, user location, call duration, start time, end time, IP addresses, location information, URLs, etc., and must be reported to the federal Department in question within five business days following request.
Coverage Telecommunication sector
Sources
- https://web.archive.org/web/20200124052851/https://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df...
- https://web.archive.org/web/20230401043853/https://info.publicintelligence.net/US-NSAs/US-NSAs-Level3.pdf
- https://web.archive.org/web/20230121215530/https://www.csis.org/analysis/real-national-security-concerns-over-data-localization
- https://web.archive.org/web/20211019140021/https://news.bloomberglaw.com/privacy-and-data-security/move-over-ccpa-the-california-privacy-rights-act-gets-the-spotlight-now
- Show more...
UNITED STATES
Since January 2018
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
Directive No. 3340-049a
Under Directive No. 3340-049a of 2018, US Customs and Border Protection (CBP) asserts broad powers to conduct device searches and requires travellers to provide their device passwords to CBP agents. Section 5.3.1 provides that "travellers are obligated to present electronic devices and the information contained therein in a condition that allows inspection of the device and its contents. If presented with an electronic device containing information that is protected by passcode encryption or other security mechanism, an officer may request the individual's assistance in presenting the electronic device and the information contained therein in a condition that allows inspection of the device and its contents." It is reported that CBP officers have compelled American citizens to unlock and hand over their phones, even after being told that the phones contained sensitive data. The directive also includes a provision that allows officers to examine a phone with external equipment if there is a "national security concern (Section 5.1.4).
Coverage Horizontal
Sources
- https://web.archive.org/web/20230306134251/https://www.dhs.gov/sites/default/files/publications/CBP%20Directive%203340-049A_Border-Search-of-Electronic-Media.pdf
- https://web.archive.org/web/20211019120334/https://www.cato.org/testimony/examining-warrantless-smartphone-searches-border
- https://web.archive.org/web/20230923022053/https://freedomhouse.org/country/united-states/freedom-net/2022
- Show more...
UNITED STATES
Since October 1998
Pillar Intermediary liability |
Indicator Safe harbour for intermediaries for copyright infringement
Digital Millennium Copyright Act (DMCA)
The Digital Millennium Copyright Act (DMCA) establishes a safe harbour regime for intermediaries for copyright infringements. Title II of DMCA protects online intermediaries from liability in the case of copyright infringement, provided a notice and takedown system to deal with infringements is implemented. The DMCA amended Title 17 of the United States Code to extend the reach of copyright while limiting the liability of the providers of online services for copyright infringement by their users.
Intermediaries also have the right to counter-notify when they believe there is no copyright infringement involved. Safe harbour is available only to an intermediary that “does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity."
Intermediaries also have the right to counter-notify when they believe there is no copyright infringement involved. Safe harbour is available only to an intermediary that “does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity."
Coverage Internet intermediaries
Sources
- https://web.archive.org/web/20240623182148/https://wilmap.stanford.edu/entries/digital-millennium-copyright-act-1998-17-usc-ss-512
- https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf
- https://wilmap.stanford.edu/country/mexico
- https://digital.gov/resources/digital-millennium-copyright-act/#:~:text=Passed%20on%20October%2012%2C%201998,copyright%20infringement%20by%20their%20users.
- Show more...
UNITED STATES
Since February 1996
Pillar Intermediary liability |
Indicator Safe harbour for intermediaries for any activity other than copyright infringement
Communication Decency Act
The Communication Decency Act (Section 230) establishes a safe harbour regime for intermediaries beyond copyright infringement.
Coverage Internet intermediaries
UNITED STATES
Since March 2020, last amended in September 2022
Pillar Telecom infrastructure & competition |
Indicator Licensing restrictions to operate in the telecom market
List of Equipment and Services Covered By Section 2 of The Secure Networks Act
Section 1.50002 of the Commission's rules mandates that the Public Safety and Homeland Security Bureau publish a "Covered List" of communications equipment and services deemed to pose an unacceptable risk to U.S. national security or the safety of U.S. persons. This designation is based on specific sources of risk assessment. Telecommunications providers in the U.S. are required to remove any equipment or services from companies on this list from their networks and are prohibited from using Federal Communications Commission (FCC) funds to acquire such equipment or services. The Covered List includes several foreign companies, such as Huawei, ZTE, Hytera Communications, Hangzhou Hikvision Digital Technology, Dahua Technology, AO Kaspersky Lab, China Mobile International USA, China Telecom (Americas) Corp, Pacific Networks Corp, and China Unicom (Americas) Operations Limited.
Coverage Huawei, ZTE, Hytera Communications, Hangzhou Hikvision Digital Technology, Dahua Technology, AO Kaspersky Lab, China Mobile International USA, China Telecom (Americas) Corp, Pacific Networks Corp, China Unicom (Americas) Operations Limited
Sources
- https://web.archive.org/web/20240330165029/https://www.fcc.gov/supplychain/coveredlist
- https://web.archive.org/web/20241206152103/https://www.lexology.com/library/detail.aspx?g=1726ece7-98c7-4a44-a12a-ef6d21b8dfd3
- https://web.archive.org/web/20241206152149/https://investmentpolicy.unctad.org/investment-policy-monitor/measures/3963/united-states-of-america-expands-list-of-equipment-and-services-from-companies-po...
- Show more...
UNITED STATES
Since April 1997
Pillar Telecom infrastructure & competition |
Indicator Signature of the WTO Telecom Reference Paper
WTO Telecom Reference Paper
The United States has appended the World Trade Organization (WTO) Telecom Reference Paper to its schedule of commitments.
Coverage Telecommunications sector
UNITED STATES
Since June 1934, as amended in 1996
Pillar Telecom infrastructure & competition |
Indicator Presence of an independent telecom authority
Communications Act of 1934
According to the Communications Act of 1934 (as amended by the Telecommunications Act of 1996), the Federal Communications Commission (FCC), the executive authority for the supervision and administration of services in the telecommunications sector, is independent of the government in the decision-making process.
Coverage Telecommunications sector
Sources
- https://web.archive.org/web/20221226153549/https://transition.fcc.gov/Reports/1934new.pdf
- https://web.archive.org/web/20231013214946/https://www.govinfo.gov/content/pkg/BILLS-104s652enr/pdf/BILLS-104s652enr.pdf
- https://web.archive.org/web/20250310165027/https://datahub.itu.int/data/?i=100088&s=3109&e=USA
- Show more...
UNITED STATES
Since August 2015, last amended in October 2021
Since December 2017
Since December 2017
Pillar Cross-border data policies |
Indicator Ban to transfer and local processing requirement
Code of Federal Regulations
Federal Risk and Management Program Control Specific Contract Clauses
Federal Risk and Management Program Control Specific Contract Clauses
Pursuant to the Code of Federal Regulations (§239.7602-2 of Part 239 of Chapter 2 of Title 48), cloud computing service providers to the U.S. Department of Defence (DOD) may be required to store data relating to the DOD within the U.S. The service provider's authorising official may authorise storage of such data outside of the US, but this will ultimately depend on the sensitivity of the data in question. Similarly, Section 2.1 of the Federal Risk and Management Program (FedRAMP) Control Specific Contract Clauses require agencies with 'specific data location requirements' to include contractual obligations identifying where 'data-at-rest […] shall be stored'.
Coverage Public sector
Sources
- https://web.archive.org/web/20240716221103/https://www.ecfr.gov/current/title-48/chapter-2/subchapter-F/part-239/subpart-239.76/section-239.7602-2
- https://web.archive.org/web/20240204122324/https://www.fedramp.gov/assets/resources/documents/Agency_Control_Specific_Contract_Clauses.pdf
- https://www.dataguidance.com/notes/usa-data-transfers
- https://web.archive.org/web/20240406045822/https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/
- Show more...
UNITED STATES
Since February 2024
Since December 2024, entry into force in April 2025
Since April 2024, entry into force in June 2024
Since December 2024, entry into force in April 2025
Since April 2024, entry into force in June 2024
Pillar Cross-border data policies |
Indicator Ban to transfer and local processing requirement
Executive Order No. 14117 on Preventing Access to Americans’ Bulk Sensitive Data and United States Government-Related Data by Countries of Concern
DOJ Final Rule implementing Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons
Protecting Americans’ Data from Foreign Adversaries Act of 2024
DOJ Final Rule implementing Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons
Protecting Americans’ Data from Foreign Adversaries Act of 2024
Section 1 of Executive Order No. 14117 introduces stringent review mechanisms for the transfer of personal data and explicitly prohibits data sharing with foreign entities affiliated with designated "countries of concern". Section 2 of the Order directs the United States Department of Justice (DOJ) to establish regulations aimed at preventing the large-scale transfer of sensitive personal and government-related data to such countries. In accordance with this Order, the DOJ promulgated the "Final Rule Implementing Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons". This regulation governs, restricts, and, in certain instances, prohibits the dissemination of U.S. Government-related information and bulk sensitive personal data to entities associated with countries of concern. Under Section 202.601, the current list of countries of concern includes China (inclusive of Hong Kong and Macau), Cuba, Iran, North Korea, Russia, and Venezuela. The Rule delineates two categories of transactions: specific highly sensitive transactions are outright prohibited, whereas other classes of transactions are subject to compliance with defined security protocols designed to mitigate the risk of unauthorised access to high-risk bulk data. Section 202.249 defines sensitive personal data to encompass precise geolocation information, biometric identifiers, human genomic data, personal health and financial information, as well as personal identifiers.
In addition, the "Protecting Americans’ Data from Foreign Adversaries Act of 2024" further empowers the federal government to block transactions involving the transfer of sensitive data that may pose national security risks. Section 2 of the Act prohibits data brokers from selling, licensing, renting, trading, transferring, releasing, disclosing, providing access to, or otherwise making available personally identifiable sensitive data of U.S. individuals (i.e., persons residing in the United States) to any foreign adversary country or to entities under their control. Currently, foreign adversary countries are defined as China, Iran, North Korea, and Russia. Although the Act is ostensibly directed at data brokers, the term is defined broadly and may encompass a substantial proportion of U.S. businesses engaged in data-sharing practices for purposes such as digital marketing, online engagement, and other routine commercial activities.
In addition, the "Protecting Americans’ Data from Foreign Adversaries Act of 2024" further empowers the federal government to block transactions involving the transfer of sensitive data that may pose national security risks. Section 2 of the Act prohibits data brokers from selling, licensing, renting, trading, transferring, releasing, disclosing, providing access to, or otherwise making available personally identifiable sensitive data of U.S. individuals (i.e., persons residing in the United States) to any foreign adversary country or to entities under their control. Currently, foreign adversary countries are defined as China, Iran, North Korea, and Russia. Although the Act is ostensibly directed at data brokers, the term is defined broadly and may encompass a substantial proportion of U.S. businesses engaged in data-sharing practices for purposes such as digital marketing, online engagement, and other routine commercial activities.
Coverage Horizontal
Sources
- https://web.archive.org/web/20240810025914/https://www.whitehouse.gov/briefing-room/presidential-actions/2024/02/28/executive-order-on-preventing-access-to-americans-bulk-sensitive-personal-data-and-u...
- https://web.archive.org/web/20250605105359/https://www.justice.gov/nsd/media/1382521/dl
- https://web.archive.org/web/20250709215133/https://www.congress.gov/bill/118th-congress/house-bill/815/text#toc-HCC58F0DED71047C2BE42E0885BA5AB4D
- https://web.archive.org/web/20250709210549/https://resourcehub.bakermckenzie.com/en/resources/global-data-and-cyber-handbook/north-america/united-states/topics/international-data-transfer
- https://web.archive.org/web/20250709210651/https://www.dlapiperdataprotection.com/?t=transfer&c=US#insight
- https://web.archive.org/web/20250709210636/https://iclg.com/practice-areas/data-protection-laws-and-regulations/usa
- https://web.archive.org/web/20250709210710/https://practiceguides.chambers.com/practice-guides/data-protection-privacy-2025/usa
- https://www.dataguidance.com/opinion/usa-protecting-americans-data-foreign-adversaries
- Show more...
UNITED STATES
Since October 1999
Pillar Cross-border data policies |
Indicator Local storage requirement
Network Security Agreements
The United States has not adopted laws or regulations requiring that data be stored locally in the United States. Nevertheless, it is reported that in some cases, Team Telecom - an informal grouping of the Departments of Defence, Homeland Security and Justice, and the Federal Bureau of Investigation - imposes requirements to store data locally in security agreements and assurances letters as a condition for the grant of a licence or consent for a merger or acquisition. In such cases, Team Telecom may require that such data be stored only in the United States or that copies of such data be made available in the United States.
Coverage Telecommunications sector
Sources
- https://web.archive.org/web/20240221191721/https://www.lexology.com/library/detail.aspx?g=9e7ab642-d7f6-43ed-814b-4025b62cbeaf
- https://web.archive.org/web/20240222135542/https://publicintelligence.net/us-nsas/
- https://web.archive.org/web/20231209101441/https://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df...
- Show more...
UNITED STATES
N/A
Pillar Telecom infrastructure & competition |
Indicator Functional/accounting separation for operators with significant market power
Lack of mandatory functional separation for dominant network operators
It is reported that the U.S. does not mandate functional separation for operators with significant market power (SMP) in the telecom market. However, accounting separation is required by law.
Coverage Telecommunications sector
UNITED STATES
Reported in 2021, last reported in 2022
Pillar Telecom infrastructure & competition |
Indicator Licensing restrictions to operate in the telecom market
Reported impact of ownership on licensing timelines
It is reported that entities intending to offer telecommunications services between the United States and any foreign destination are required to apply for, and obtain, an international Section 214 authorisation from the Federal Communications Commission (FCC), pursuant to the Communications Act of 1934, prior to initiating service. The approval of licence assignment applications may occur as swiftly as overnight or may extend over several months, depending on various factors, including the involvement of foreign ownership. Although the FCC has established detailed licensing timelines, including a 14-day streamlined review process for the majority of international Section 214 applications, this expedited procedure is typically suspended in cases where aggregate foreign ownership exceeds 10%. In such instances, the FCC refers the application to the Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector (commonly referred to as Team Telecom), which conducts potentially protracted national security reviews.
Coverage Telecommunications sector
Sources
- https://www.dlapiperintelligence.com/telecoms/index.html?t=registration&c=US
- https://web.archive.org/web/20250718001227/https://www.lexology.com/library/detail.aspx?g=9f3179c8-bf58-4f33-ba80-9191a3de231a
- https://web.archive.org/web/20250718001258/https://www.law.cornell.edu/uscode/text/47/214
- Show more...
