Data Residency complete

Control over where data is physically stored, processed, and replicated

L0 Unaware

No awareness of where data is physically stored, processed, or replicated. The organisation has no data residency policy and data may reside in any region at the provider's discretion.

Criteria

  • RES-L0-C1 Organisation has no documented data residency policy or requirements.
    Evidence guidance

    Absence of any policy document, board resolution, or architectural guideline referencing data location.

  • RES-L0-C2 No inventory exists mapping data assets to physical storage locations or provider regions.
    Evidence guidance

    Confirm that no data-location register, CMDB entries, or cloud-account region reports have been produced.

  • RES-L0-C3 Cloud services are deployed using provider defaults with no region selection applied.
    Evidence guidance

    Review cloud console settings or infrastructure-as-code templates; default or auto-selected regions indicate this criterion is met.

Indicators

  • No region or location field populated in any cloud deployment record.
  • Employees cannot name the country or region where primary data is stored.
  • No data-residency clause exists in any active vendor contract.
  • Risk register contains no entry for cross-border data transfer.

Regulatory mappings

RegulationArticlesRiskNote
GDPRart-44, art-45, art-46criticalTransfers to third countries without safeguards violate Chapter V. Without awareness, lawful transfer basis cannot be demonstrated.
NDSGart-16criticalCross-border disclosure without adequate protection assessment breaches nDSG art-16.
CLOUD-ACT18-usc-2703highData stored in US-controlled infrastructure is subject to CLOUD Act compelled disclosure regardless of physical location.

Upgrade path

Identify all cloud services in use and document the regions where data is stored. Begin drafting a data residency policy that defines acceptable jurisdictions.

Risk if stagnant

Regulatory enforcement actions under GDPR Chapter V or nDSG art-16 are likely. Data may be accessed by foreign authorities without the organisation's knowledge, leading to loss of client trust and potential legal liability.

Typical characteristics
  • Cloud accounts created with default region settings (commonly us-east-1 or similar).
  • No distinction made between data categories (personal data, metadata, backups) in terms of storage location.
  • IT and legal teams have not discussed data residency requirements.
  • Vendor contracts are signed without reviewing data processing locations.
Why this is dangerous
  • Regulatory exposure: GDPR Chapter V prohibits transfers to third countries without an adequacy decision or appropriate safeguards. Operating without awareness means no lawful basis can be demonstrated.
  • CLOUD Act reach: If the provider is a US-headquartered company, US authorities may compel disclosure under the CLOUD Act regardless of the data's physical location.
  • nDSG non-compliance: The revised Swiss Federal Act on Data Protection requires assessment before cross-border disclosure; without a location inventory this assessment is impossible.
Sovereignty implications

At Level 0, the organisation has no sovereignty over data location. It cannot demonstrate where data resides, cannot assess jurisdictional exposure, and has ceded all location decisions to providers. Data may cross borders without the organisation's knowledge, making it impossible to evaluate regulatory compliance or respond to jurisdictional challenges.