{"id":36925,"date":"2026-01-22T10:57:48","date_gmt":"2026-01-22T16:57:48","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=36925"},"modified":"2026-01-22T10:57:48","modified_gmt":"2026-01-22T16:57:48","slug":"cloud-act","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/cloud-act\/","title":{"rendered":"The CLOUD Act Explained"},"content":{"rendered":"<h1>Understanding the CLOUD Act: Data Sovereignty, Privacy, and Secure File Sharing<\/h1>\n<p><span style=\"font-weight: 400;\">As organizations continue to rely on cloud services for collaboration and data storage, questions around data access, jurisdiction, and control have become increasingly difficult to ignore. One piece of legislation that frequently surfaces in these discussions is the CLOUD Act.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For IT, security, compliance, and legal leaders, understanding what the CLOUD Act is\u2014and how it intersects with data sovereignty\u2014has become an important part of evaluating modern file sharing and collaboration strategies.<\/span><\/p>\n<h2>What Is the CLOUD Act?<\/h2>\n<p><span style=\"font-weight: 400;\">The Clarifying Lawful Overseas Use of Data (CLOUD) Act is a United States law enacted in 2018 to address how law enforcement agencies can access electronic data during criminal investigations. The law clarifies that U.S.-based service providers, such as Microsoft, Amazon, and Google, may be required to provide data requested through lawful orders, even if that data is stored outside of the United States.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The US CLOUD Act was introduced in response to legal uncertainty surrounding cross-border data access, particularly as cloud providers increasingly store data across global infrastructure. Prior to the passage of the CLOUD Act, disputes arose over whether U.S. warrants could compel access to data stored in foreign jurisdictions. The CLOUD Act sought to resolve this ambiguity by establishing a legal framework for accessing electronic data held by U.S. service providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the same time, the law allows providers to challenge requests that conflict with foreign data privacy legislation, creating a mechanism for balancing law enforcement needs with international legal obligations.<\/span><\/p>\n<h2>Why the CLOUD Act Matters to Organizations<\/h2>\n<p><span style=\"font-weight: 400;\">Interest in the CLOUD Act has grown as organizations become more aware of how cloud provider jurisdiction can impact data privacy and data security. While the CLOUD Act is primarily a law enforcement tool, its implications extend well beyond criminal investigations.<\/span><\/p>\n<p style=\"text-align: center;\"><strong>2025 Q1 \u2013 Global Cloud Infrastructure Services Market \u2013 Provider Comparison<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-36927 aligncenter\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/CLOUD-Act-Pie-Chart-1024x512.png\" alt=\"\" width=\"694\" height=\"347\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/CLOUD-Act-Pie-Chart-1024x512.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/CLOUD-Act-Pie-Chart-768x384.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/CLOUD-Act-Pie-Chart-1536x768.png 1536w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/CLOUD-Act-Pie-Chart.png 1800w\" sizes=\"(max-width: 694px) 100vw, 694px\"><\/p>\n<p style=\"text-align: center;\">\u201cCombined, AWS, Microsoft, and Google Cloud account for 63% of the total enterprise spending on cloud infrastructure services.\u201d<br \/>\n<strong><a href=\"https:\/\/www.sci-tech-today.com\/stats\/cloud-computing-statistics\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">\u201cCloud Computing Statistics\u201d, <em>Sci-Tech Today<\/em><\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">For organizations operating in regulated industries or managing sensitive data, the possibility that data could be subject to foreign government access introduces new risk considerations. Compliance leaders and legal teams must account for how data privacy legislation, contractual obligations, and regulatory frameworks interact with the CLOUD Act.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In France, this question of data sovereignty and the CLOUD Act was recently addressed via <\/span><a href=\"https:\/\/www.senat.fr\/compte-rendu-commissions\/20250609\/ce_commande_publique.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Senate hearing<\/span><\/a><span style=\"font-weight: 400;\">. Following up on a study of the role of procurement in promoting data sovereignty, Senators questioned a Microsoft executive, Mr. Carniaux, over the security of French citizens\u2019 data in the event of an exfiltration request from the United States government. As the Director of Public and Legal Affairs for Microsoft France, Mr. Carniaux confirmed that French citizens data may be transmitted to United States authorities even without explicit authorization from the French government.\u00a0<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">\u201c<\/span>In other words, if the United States were to issue a legal request to Microsoft for the data of a French citizen hosted in the EU, Microsoft would comply regardless of French or EU law.<\/p>\n<p>We can assume that this is irrespective of country, as France and the EU have some of the strictest data protection laws in the world and the U.S. law they are talking about is the United States CLOUD Act.\u201d<\/p>\n<p><strong>\u2014Alexander Rudolph, \u201c<a href=\"https:\/\/www.digitaljournal.com\/tech-science\/microsoft-says-u-s-law-takes-precedence-over-canadian-data-sovereignty\/article\" target=\"_blank\" rel=\"noopener\">Microsoft says U.S. law takes precedence over Canadian data sovereignty<\/a>\u201c, <em>Digital Journal<\/em><\/strong><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">As a result, the CLOUD Act is often discussed in the context of broader governance questions: who ultimately controls access to data, which laws apply, and how those laws align with organizational compliance requirements.<\/span><\/p>\n<h2>The CLOUD Act and Data Sovereignty<\/h2>\n<p><span style=\"font-weight: 400;\">Data sovereignty refers to the principle that data is subject to the laws and governance structures of the country in which it is stored or processed. In a cloud-driven environment, data sovereignty has become increasingly complex, especially when service providers operate infrastructure across multiple jurisdictions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The CLOUD Act challenges traditional assumptions about data residency by tying data access obligations to the service provider\u2019s home jurisdiction rather than solely to the physical location of the data. This means that even when data is stored outside the United States, it may still fall under U.S. legal authority if the provider is U.S.-based.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For organizations with strict data sovereignty requirements, this creates tension between regulatory expectations and cloud deployment models. Understanding this dynamic is essential for evaluating whether a particular cloud or file-sharing solution aligns with data governance policies.<\/span><\/p>\n<h2>Intersection With Global Data Privacy Legislation<\/h2>\n<p><span style=\"font-weight: 400;\">The CLOUD Act does not exist in isolation. It intersects with a growing body of global data privacy legislation, including the General Data Protection Regulation (GDPR). GDPR places strict requirements on how personal data is accessed, processed, and transferred, particularly when data moves across borders.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This overlap has raised concerns among privacy officers and compliance professionals about potential conflicts between U.S. legal obligations and international privacy laws. While the CLOUD Act includes provisions for challenging requests that violate foreign laws, the process can be complex and uncertain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For organizations subject to GDPR and similar regulations, these considerations reinforce the importance of carefully assessing cloud architectures, data access controls, and vendor jurisdiction when designing data protection strategies.<\/span><\/p>\n<h2>Impact on Regulated Industries<\/h2>\n<p><span style=\"font-weight: 400;\">Highly regulated industries such as healthcare, financial services, government, education, and legal services face heightened scrutiny around data handling practices. These sectors often manage large volumes of sensitive or protected data and are subject to strict oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For these organizations, the CLOUD Act adds another layer of complexity to compliance planning. Data access rights, audit readiness, and risk management strategies must account for both domestic and international legal frameworks. As a result, decision-makers in regulated industries often prioritize solutions that provide clear data ownership models and strong governance controls.<\/span><\/p>\n<h2>Secure File Sharing in a CLOUD Act Environment<\/h2>\n<p><span style=\"font-weight: 400;\">Secure file sharing plays a central role in how organizations manage sensitive information across teams, partners, and external stakeholders. As collaboration tools become more embedded in daily operations, the security model behind these tools becomes just as important as their usability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the context of the CLOUD Act, secure file sharing solutions are often evaluated based on how they support data security and control. Encryption, access management, auditability, and deployment flexibility all influence how exposed shared data may be to external access requests.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations increasingly look for file sharing platforms that align with data sovereignty requirements, allowing greater control over where data is stored and who can access it. These capabilities can help reduce uncertainty while supporting compliance with industry and regional regulations.<\/span><\/p>\n<h2>Evaluating Cloud and File Sharing Architectures<\/h2>\n<p><span style=\"font-weight: 400;\">As awareness of the CLOUD Act grows, many organizations begin re-evaluating existing cloud and file-sharing architectures. Public cloud services offer scalability and convenience, but they may also introduce jurisdictional dependencies that complicate compliance efforts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alternative deployment models, including private cloud and self-hosted solutions, are often considered as ways to maintain tighter control over enterprise data. These models can support data sovereignty initiatives by allowing organizations to define storage locations, access policies, and security controls more precisely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When assessing options, IT and security leaders frequently weigh factors such as compliance alignment, operational flexibility, and long-term risk exposure.<\/span><\/p>\n<h2>Sovereign File Sharing with FileCloud<\/h2>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-33341\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/04\/Admin-Dashboard-4-5-2022_Full-View.jpg\" alt=\"FileCloud Admin Dashboard\" width=\"1078\" height=\"728\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/04\/Admin-Dashboard-4-5-2022_Full-View.jpg 1078w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/04\/Admin-Dashboard-4-5-2022_Full-View-300x203.jpg 300w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/04\/Admin-Dashboard-4-5-2022_Full-View-1024x692.jpg 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/04\/Admin-Dashboard-4-5-2022_Full-View-768x519.jpg 768w\" sizes=\"(max-width: 1078px) 100vw, 1078px\"><\/p>\n<p><span style=\"font-weight: 400;\">FileCloud addresses many of the challenges raised by the CLOUD Act by focusing on data sovereignty, secure file sharing, and deployment flexibility. By supporting private cloud and self-hosted deployments, FileCloud enables organizations to retain greater control over their data and infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This approach can reduce reliance on third-party cloud environments where jurisdictional exposure may be harder to manage. Combined with strong data security features and administrative controls, FileCloud is designed to support compliance-driven organizations seeking a more controlled file-sharing environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For organizations navigating the implications of the US CLOUD Act, solutions that emphasize data ownership, security, and governance play an important role in supporting evolving compliance requirements.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding the CLOUD Act: Data Sovereignty, Privacy, and Secure File Sharing As organizations continue to rely on cloud services for collaboration and data storage, questions around data access, jurisdiction, and control have become increasingly difficult to ignore. One piece of legislation that frequently surfaces in these discussions is the CLOUD Act.\u00a0 For IT, security, compliance, [&hellip;]<\/p>\n","protected":false},"author":48,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1926,284,1867,1,237],"tags":[2087,2086,890,1055,2073],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The CLOUD Act Explained - FileCloud blog<\/title>\n<meta name=\"description\" content=\"Explore how the CLOUD Act impacts data sovereignty, cross-border data access, and enterprise control over cloud-stored information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/cloud-act\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The CLOUD Act Explained\" \/>\n<meta property=\"og:description\" content=\"Explore how the CLOUD Act impacts data sovereignty, cross-border data access, and enterprise control over cloud-stored information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/cloud-act\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-22T16:57:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/CLOUD-Act-Pie-Chart-1024x512.png\" \/>\n<meta name=\"author\" content=\"Sydney Lambert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sydney Lambert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/cloud-act\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/cloud-act\/\"},\"author\":{\"name\":\"Sydney Lambert\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/eb59e5fbf99b49e1f1b38c441d0e6df7\"},\"headline\":\"The CLOUD Act Explained\",\"datePublished\":\"2026-01-22T16:57:48+00:00\",\"dateModified\":\"2026-01-22T16:57:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/cloud-act\/\"},\"wordCount\":1308,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"keywords\":[\"Clarifying Lawful Overseas Use of Data Act\",\"CLOUD Act\",\"data privacy\",\"Data sovereignty\",\"sovereign file sharing\"],\"articleSection\":[\"Compliance\",\"data governance\",\"Enterprise Content Management\",\"Enterprise File Sharing\",\"government\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/cloud-act\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/cloud-act\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/cloud-act\/\",\"name\":\"The CLOUD Act Explained - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2026-01-22T16:57:48+00:00\",\"dateModified\":\"2026-01-22T16:57:48+00:00\",\"description\":\"Explore how the CLOUD Act impacts data sovereignty, cross-border data access, and enterprise control over cloud-stored information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/cloud-act\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/cloud-act\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/cloud-act\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The CLOUD Act Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/eb59e5fbf99b49e1f1b38c441d0e6df7\",\"name\":\"Sydney Lambert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5600c095ba607a8a3bf45b7780b071ec?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5600c095ba607a8a3bf45b7780b071ec?s=96&d=mm&r=g\",\"caption\":\"Sydney Lambert\"},\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/sydney-lambert\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The CLOUD Act Explained - FileCloud blog","description":"Explore how the CLOUD Act impacts data sovereignty, cross-border data access, and enterprise control over cloud-stored information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/cloud-act\/","og_locale":"en_US","og_type":"article","og_title":"The CLOUD Act Explained","og_description":"Explore how the CLOUD Act impacts data sovereignty, cross-border data access, and enterprise control over cloud-stored information.","og_url":"https:\/\/www.filecloud.com\/blog\/cloud-act\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2026-01-22T16:57:48+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/CLOUD-Act-Pie-Chart-1024x512.png"}],"author":"Sydney Lambert","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Sydney Lambert","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/cloud-act\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/cloud-act\/"},"author":{"name":"Sydney Lambert","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/eb59e5fbf99b49e1f1b38c441d0e6df7"},"headline":"The CLOUD Act Explained","datePublished":"2026-01-22T16:57:48+00:00","dateModified":"2026-01-22T16:57:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/cloud-act\/"},"wordCount":1308,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"keywords":["Clarifying Lawful Overseas Use of Data Act","CLOUD Act","data privacy","Data sovereignty","sovereign file sharing"],"articleSection":["Compliance","data governance","Enterprise Content Management","Enterprise File Sharing","government"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/cloud-act\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/cloud-act\/","url":"https:\/\/www.filecloud.com\/blog\/cloud-act\/","name":"The CLOUD Act Explained - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2026-01-22T16:57:48+00:00","dateModified":"2026-01-22T16:57:48+00:00","description":"Explore how the CLOUD Act impacts data sovereignty, cross-border data access, and enterprise control over cloud-stored information.","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/cloud-act\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/cloud-act\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/cloud-act\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The CLOUD Act Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/eb59e5fbf99b49e1f1b38c441d0e6df7","name":"Sydney Lambert","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5600c095ba607a8a3bf45b7780b071ec?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5600c095ba607a8a3bf45b7780b071ec?s=96&d=mm&r=g","caption":"Sydney Lambert"},"url":"https:\/\/www.filecloud.com\/blog\/author\/sydney-lambert\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/36925"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=36925"}],"version-history":[{"count":4,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/36925\/revisions"}],"predecessor-version":[{"id":36930,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/36925\/revisions\/36930"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=36925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=36925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=36925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}