EU Data Sovereignty for Email Marketers in 2026: The Regulatory Floor Just Moved Again
Informational only — not legal advice
This article is provided for general information and discussion. It is not legal advice, not legal analysis, and not a substitute for advice from a qualified attorney or Data Protection Officer. The author is not a lawyer. Reading this article does not create an attorney–client relationship. EU data protection, NIS2, and US surveillance law evolve rapidly — specifics referenced here may change after publication. Before making compliance, vendor, or architecture decisions, consult a qualified Datenschutzbeauftragter (DPO) or data-protection counsel in your jurisdiction. Broadcast and the author expressly disclaim liability for any action taken or not taken in reliance on this content.
In a 30-day window starting this week, three things land that quietly redraw the legal map for any EU company doing email marketing:
- May 7, 2026. CNBC reported the European Commission is weighing restrictions on US cloud providers for sensitive sectors — healthcare, finance, judicial systems.
- May 27, 2026. The EU Tech Sovereignty Package drops, bundling the Cloud and AI Development Act (CADA) and the Chips Act 2.0.
- By 30 June 2026. The NIS2 cybersecurity audit deadline hits in most member states (Belgium runs ahead at 18 April 2026). The directive’s scope reaches further than many companies realise.
If you’re sending newsletters or transactional email out of an EU company, your stack now sits on legal foundations that have moved several times in the past 18 months. This post walks through what’s actually load-bearing, where the conflict bites email-marketing specifically, and what “self-hosted” does and doesn’t fix. It is a developer’s read on the legal architecture, written for orientation — not a substitute for the professional advice noted above.
Disclosure: we make Broadcast, a self-hosted newsletter and email-marketing platform, so the framing leans toward what self-hosting does and doesn’t change. We’ve tried to be honest about both. There is a section at the end mapping each issue raised here to how Broadcast specifically addresses it.
The legal stack as it stands in May 2026
GDPR, controller and processor. The structural primitive. You’re the controller of your subscribers’ data. Your email tool is the processor. The controller has historically carried most of the liability — but as of late 2025, regulators are fining processors directly. More on that below.
Schrems II and the Data Privacy Framework. Schrems II (July 2020) invalidated Privacy Shield. The Data Privacy Framework (10 July 2023) replaced it, declaring the US “adequate” again under a specific set of conditions including a new redress mechanism. On 3 September 2025, the EU General Court dismissed the Latombe challenge in T-553/23 — the DPF’s first major judicial test — and the framework survived at first instance. The story did not stop there: Latombe filed an appeal to the Court of Justice on 31 October 2025, so the DPF is currently before the CJEU on appeal. Separately, Max Schrems’s NOYB has openly indicated it intends to mount a broader, more ambitious challenge of its own. The pressure on the DPF is real and immediate, not hypothetical, and arguably increased after the January 2025 removal of the three Democratic members of the Privacy and Civil Liberties Oversight Board (PCLOB), leaving the board without a quorum — and PCLOB sits inside the DPF’s redress chain.
The CLOUD Act. Independent of everything above, and the most under-appreciated part of the picture. The 2018 US CLOUD Act lets US law enforcement compel any US-incorporated company to produce user data regardless of where that data is stored. AWS Frankfurt? Microsoft Dublin? Doesn’t matter. If the parent entity is US-incorporated, the demand reaches them. SCCs (Standard Contractual Clauses) don’t override this — they’re a contractual instrument; the CLOUD Act is statutory.
EU Data Act. In force January 2024, applying since September 2025. Adds explicit anti-third-country-government-access provisions for non-personal data. Doesn’t reach personal data directly — that’s still GDPR’s job — but it shows where the legislative wind is blowing.
NIS2. The cybersecurity directive. Member-state transposition is in, and the first wave of compliance audits for Essential entities lands by 30 June 2026 in most member states. NIS2 scope is determined by sector and size, not by data volume — so a small in-house newsletter operation is almost certainly out of scope. Two paths bring email-marketing work in: providing email infrastructure as a B2B service (potentially “digital providers” or “ICT service management” under Annex II), or serving clients in in-scope sectors (energy, health, finance, transport, public administration, etc.) and inheriting obligations through the directive’s supply-chain provisions. The reporting cadence for in-scope entities is a 24-hour early warning, a 72-hour incident notification, and a final report within one month.
Where the conflict actually bites email marketers
The major email tools used in Europe are almost all US-controlled:
- Mailchimp — Intuit, Mountain View.
- Klaviyo — Boston.
- SendGrid — owned by Twilio, San Francisco.
- HubSpot — Cambridge, Massachusetts.
- ActiveCampaign — Chicago.
When your subscribers’ email addresses, names, behaviour data, and engagement history sit in any of those, that data is — legally — reachable under the CLOUD Act. The “EU region” toggle these vendors increasingly offer changes where bytes physically rest. It does not change who can be compelled to produce them. SCCs and an Auftragsverarbeitungsvertrag (AVV) document the relationship; they don’t structurally fix it.
Two enforcement signals from the past twelve months matter here.
In December 2025, France’s CNIL fined Optimove €1 million for retaining personal data of 46.9 million users after its contract ended and processing data outside the controller’s instructions. Optimove is a processor. CNIL is treating processor accountability as a live lever, not a theoretical one.
In March 2025, the UK ICO issued its first-ever fine against a processor — £3.07 million against Advanced Computer Software Group following a 2022 ransomware attack that disrupted NHS 111 and exposed data on around 79,000 people. The ICO had initially proposed £6.09 million; the final figure reflects cooperation discounts. Same direction of travel.
Translation: if your email vendor messes up, “but we’re just the processor” stops being a complete answer. And if that vendor is US-controlled, you can’t make their structural CLOUD Act exposure go away by reading the AVV more carefully.
What “EU data residency” actually buys you — and doesn’t
This is where most marketing copy quietly misleads.
AWS European Sovereign Cloud. Operationally separate from the rest of AWS, run by EU-based personnel, with a stated commitment to legal isolation from US parent control. The proposed governance is more elaborate than anything the hyperscalers offered before. But the legal entity providing the service is still ultimately part of a US-incorporated group. Whether the new governance is enough to make a CLOUD Act request fail in practice is legally untested — there is no court case yet that has tested it.
Microsoft EU Data Boundary. Same fundamental shape: a layer of organisational and contractual commitments on top of an ultimately US-controlled corporate structure.
SaaS providers’ “EU region” flags. Useful for latency. Useful for some data-localisation checkboxes. Not a fix for the controller-vs-processor jurisdiction problem. The processor’s jurisdiction is determined by where its corporate parent is incorporated, not where its servers are.
There is currently no legally tested escape from CLOUD Act exposure other than: data on infrastructure controlled by an EU-jurisdictional entity that is not part of a US-controlled corporate group.
That’s a real bar. There are roughly two ways to clear it:
- Use an EU-jurisdictional SaaS (Brevo, GetResponse, CleverReach, Rapidmail, MailerLite — we’ve put together a sober side-by-side here).
- Self-host on EU-jurisdictional infrastructure (Hetzner, OVH, Scaleway, IONOS).
Both routes change the shape of the problem. Both come with tradeoffs.
The self-hosting case, stated honestly
Self-hosting fixes one specific thing: the jurisdictional exposure. When you run your email-sending application yourself, on a server you rent from an EU-jurisdictional hoster, the controller and processor are both you. There’s no third-country transfer to assess. The CLOUD Act has nothing to grab.
What self-hosting does not fix:
- Your obligations don’t disappear. You still need a DPA with your hoster, your SMTP relay (if any), your error-tracking service. You still need an up-to-date Records of Processing Activities. You still need a DPO if your headcount or processing volume puts you in scope.
- Deliverability is still your problem. No vendor is warming your sending IPs for you. You warm them yourself, monitor blocklists yourself, manage feedback loops yourself.
- NIS2 doesn’t go away. If you’d have been in scope using Mailchimp, you’re still in scope running your own stack — you just have more of the controls in your own hands.
- Subprocessors creep back in. If you use Postmark, Resend, AWS SES, or any third-party SMTP relay for outbound, you’ve reintroduced a processor relationship. Pick EU-jurisdictional ones if you care about closing the loop entirely.
The honest claim: self-hosting on EU infrastructure removes one structural category of legal exposure (the CLOUD Act / Schrems chain) and replaces it with operational responsibility (you’re now running infrastructure). For a developer-led shop, that’s a trade many will take. For others, it isn’t. Both choices can be defensible. The wrong move is to assume “EU region” on a US SaaS dashboard has done the work for you.
For the practical version of the self-hosted stack — hoster, application, database, SMTP, backups, what we’d actually pick today — see our DSGVO stack walkthrough.
A five-question diagnostic for your current setup
Before your next renewal, walk your email stack through these:
- Who is the controller of record for your subscriber list? Almost always: you.
- Where is your email processor incorporated? Not where their data centre is — where the parent company is.
- Who has root access to the machines your subscribers’ personal data lives on? Trace it — including the cloud provider’s privileged engineers and any escalation path back to the parent group.
- What subprocessors does your processor use? Pull the list. If you can’t find it, ask. If they can’t tell you, that itself is a problem.
- If a regulator asked tomorrow, could you produce a Records of Processing Activities, plus an up-to-date Transfer Impact Assessment, for this stack?
If you got stuck on any of those, you have homework. The good news: most of the homework is one-time, and most of it gets easier the closer your stack lives to your own jurisdiction.
The trajectory matters more than any single rule. Every six months for the past three years, the regulatory floor has moved up. The Data Privacy Framework survived its first challenge but probably won’t survive every challenge. The CLOUD Act isn’t going away. The next round of enforcement is going to land on processors more often than controllers, not less.
Whatever you pick, pick it with eyes open. The direction of travel is one-way.
How Broadcast addresses each of these issues
We promised to be specific about this, so here is the mapping from the issues raised in this article to the architectural choices in Broadcast:
CLOUD Act exposure. Broadcast runs on a server you rent from a hoster of your choice. When that hoster is EU-jurisdictional (Hetzner, OVH, Scaleway, IONOS), your subscriber list never sits inside a US-controlled corporate group. There is no Broadcast-operated cloud holding the data. The CLOUD Act has nothing to grab.
Processor liability. Because you operate the application, you are both controller and operational processor. There is no third-party SaaS processor whose AVV you have to police, whose subprocessor list might shift overnight, or whose €1M CNIL fine could implicate your subscriber data.
DPF / Schrems uncertainty. When there is no transatlantic transfer, the DPF’s status at the CJEU stops being a load-bearing dependency for your stack. Schrems III becomes someone else’s problem.
“EU residency” theatre. Broadcast does not have an “EU region” toggle to mismarket. The only region is the one you picked when you spun up the server, governed by the law of that jurisdiction.
NIS2 alignment. We maintain a documented self-hosted DSGVO stack — application, database, SMTP, backups, error tracking — that maps cleanly to the technical and organisational measures NIS2 expects. For German companies actively comparing options, our Mailchimp Alternative Deutschland comparison and Mailchimp DSGVO assessment cover the side-by-side detail.
Vendor lock-in. Broadcast is sold under a perpetual license. Your subscribers’ data lives in your Postgres database. We do not operate your instance, and we do not keep a copy of anything.
The honest tradeoff. Self-hosting moves operational responsibility back onto you: IP warming, deliverability monitoring, backups, patching. We have tried to make those the easy parts. They remain your parts. We have written about why we built it this way and how we test deliverability across providers if you want to see the engineering choices in detail.
Broadcast does not solve every problem in this article. It does eliminate the structural CLOUD Act / Schrems / processor-liability category in exchange for operational responsibility. For a developer-led EU shop, that is often the right trade. For others, it is not. Both choices can be defensible — the wrong move is to assume the problem isn’t there.
Disclaimer & review notes
Last reviewed: 9 May 2026. This article is informational only and does not constitute legal advice, legal analysis, a Transfer Impact Assessment, or any other professional service. The author is not a lawyer; reading this article creates no attorney–client relationship. The legal landscape described here — the Data Privacy Framework, the Latombe appeal at the CJEU, NIS2 transposition and enforcement, the EU Data Act, the CLOUD Act, and related instruments — moves quickly, and specifics may be out of date by the time you read this. Before relying on anything in this article for compliance, vendor selection, or architectural decisions, please consult a qualified Datenschutzbeauftragter (DPO), data-protection counsel, or specialist attorney in the relevant jurisdiction. Broadcast and the author expressly disclaim any liability arising from action or inaction taken in reliance on this content.