Navigating the Cloud Exodus: EU Data Act's Impact on Switching and Interoperability

2025-11-06 • Source: IAPP

The EU Data Act ushers in a new era for cloud services, mandating easier switching between providers and eliminating vendor lock-in. This legislation introduces significant compliance and technical challenges for European businesses and cloud providers, requiring a deep dive into data portability, interoperability, and contractual transparency.

The digital landscape has long embraced the agility and scalability of cloud computing. However, the process of migrating data and applications between different cloud providers has frequently been perceived as an intricate and resource-intensive endeavor, leading to concerns about interoperability and the dreaded vendor lock-in. Organisations often grapple with several hurdles, including safeguarding data portability without degradation, adapting applications to diverse architectural frameworks, upholding security and compliance throughout the migration, and minimising service interruptions to preserve business continuity. These efforts also demand meticulous management of expenditures and resources, while overcoming specific vendor dependencies that hinder interoperability and complicate transitions. The EU Data Act is poised to accelerate a new phase of data portability and cloud interoperability, striving to rebalance the digital market by empowering users, irrespective of their size or nature, with enhanced control over their data. A particularly impactful facet, especially for cloud service providers, is the imperative to facilitate seamless switching between cloud services. ## Unlocking Cloud Freedom: The Data Act's Core Ambition At its heart, the Data Act's provisions concerning cloud switching aim to dismantle vendor lock-in, diminish economic reliance on dominant providers, and cultivate a more competitive and innovative cloud ecosystem. This objective is clearly articulated in Recitals 77-80. However, achieving this comes with a suite of compliance obligations and technical complexities that all stakeholders must meticulously address. This article delves into the pertinent legal requirements imposed by the Data Act and the hurdles in achieving effective implementation. It also explores potential parallels with similar obligations found within the Digital Operational Resilience Act (DORA) and the Network and Information Security Directive 2 (NIS2). ### Legal Imperatives for Cloud Switching Under the Data Act Set to come into force progressively between 2024 and 2027, the Data Act establishes a right for users to transition between "providers of data processing services" – encompassing cloud service providers – or to migrate workloads on-premises with minimal disruption. Chapter VI (Articles 23-26) mandates that digital service providers ensure that switching data processing services is technically feasible, contractually transparent, and financially equitable. This is achieved by removing commercial, contractual, and technical barriers to cloud service switching. The Act introduces mandatory portability interfaces and documentation designed to facilitate smooth transfers. Crucially, it eliminates data export fees, specifically egress charges, by January 2027. Furthermore, it supports the functional equivalence of digital services post-switch and establishes clearer guidelines on termination clauses and what constitutes proportionate charges during transitions. Cloud providers are required to ensure that users can retrieve all their digital assets – encompassing structured and unstructured data, metadata, and configurations – in a structured, widely supported, and machine-readable format. For instance, users should be able to export databases as CSV or JSON files, download configuration files in XML, and obtain metadata in standardised formats such as Dublin Core or ISO 19115. Any loss of functionality during migration, such as the inability to utilise certain analytics features after export, must be transparently documented and objectively justified; silent degradation is explicitly unacceptable. Interoperability is no longer an optional feature or a mere technical preference; it has become a regulatory mandate. For example, if a customer moves from one cloud provider to another, the new provider must be capable of ingesting the exported data without necessitating extensive manual reformatting. While the legislation permits some flexibility in defining what constitutes reasonable effort, service providers and users must be able to demonstrate compliance through contractual commitments, including data portability clauses in service agreements, and verifiable system capabilities, such as providing automated export/import tools and audit logs of data transfers. ### Overcoming Technical Hurdles in Enabling Portability While the Data Act outlines a robust regulatory vision, the practical execution of cloud switching presents significant technical complexities. Organisations may encounter several key obstacles. #### Legacy Systems and Proprietary Architectures Many cloud applications are constructed using provider-specific APIs, proprietary services, or orchestration layers. Migrating such workloads often necessitates re-architecting components or introducing abstraction layers, which may not be feasible without substantial effort or cost. For instance, if a company's legacy customer relationship management platform was deeply integrated with a particular cloud provider's proprietary workflow engine, migrating to a multi-cloud model would require the team to rebuild automation logic using open-source orchestration tools, incurring additional development time and expense. #### Data Gravity and Export Complexity Large datasets, particularly in analytics-heavy workloads or AI training pipelines, can be physically challenging to export or re-ingest into a different environment. This can be due to bandwidth limitations, format discrepancies, or compliance restrictions, such as data localisation requirements. For example, during the migration of a company's regional data lakes, exporting multi-terabyte analytics datasets from the current provider could be hindered by bandwidth throttling, and a need to convert proprietary storage formats to open standards. #### Security and IAM Misalignments Identity and access management (IAM) policies vary significantly across cloud platforms. Securely translating these into another provider's framework while preserving integrity and audit trails poses a risk if not managed meticulously. For example, when consolidating IAM across multiple cloud environments, mapping fine-grained access controls and audit logs from one provider to another might require custom scripts and manual validation to ensure privileged access and compliance reporting are not compromised. #### Absence of Unified Standards Despite the existence of some open standards and frameworks, such as GAIA-X or ISO/IEC 19941, a universally adopted industry standard for switching between data processing services is still lacking. Transitioning between clouds, especially in multi-service or hybrid deployments, is not a simple plug-and-play operation. Experience demonstrates that meticulous planning, robust tooling, and the adoption of standardised interfaces are crucial for overcoming these technical and compliance-related complexities. ### Compliance Considerations for Cloud Providers To meet the Data Act's requirements and customer expectations, cloud providers must not only offer appropriate tools but also reassess their governance frameworks and service offerings. Key areas for compliance include: * **Contractual Transparency:** The terms and conditions applicable to switching cloud providers must be clearly articulated in customer contracts. This includes timelines, service levels during transition, supported export formats, and any termination charges. * **Documenting Switching Processes:** Providers should develop and publish standard operating procedures for data extraction, service decommissioning, and migration support. These procedures should align with internal cybersecurity risk management frameworks, particularly under NIS2 obligations. * **Security and Continuity Controls:** During a switch, the provider retains responsibility for data confidentiality, availability, and integrity. Therefore, safeguards such as access control, encryption, secure logging, and business continuity measures must remain in place throughout the entire process. * **Proportionality and Justification:** Where providers are unable to fully meet the switching obligations, they must document and justify this, ideally referencing technical infeasibility, workload criticality, or proportionality under resource constraints. This is especially pertinent for smaller cloud service providers. ### Lessons from DORA The Digital Operational Resilience Act (DORA), applicable to financial entities, includes a parallel mandate for managing third-party information and communication technology (ICT) risk and ensuring portability and exit strategies from critical ICT service providers, including, notably, cloud providers. Similar to the Data Act, exit strategies must be integrated into operational risk frameworks, ensuring functional continuity post-switch or transition to on-premise solutions. This involves tested and documented termination processes and contracts guaranteeing data access, availability, and retrievability upon exit. The Data Act extends this principle across the entire economy. For the provider, the challenge remains consistent: construct systems that customers can exit without chaos. For the customer, the message is equally clear: rigorously test your exit strategy before it becomes an emergency. ### Practical Steps for Both Sides Companies falling under the scope of the Data Act should initiate data mapping without delay. At a minimum, organisations should maintain a clear understanding of their data assets, including their location and the format in which they can be exported. It is crucial to have reliable, user-friendly data migration tools in place. If customers require extensive support or multiple tickets simply to exit, the migration process is not yet adequate. Review existing contracts and replace complex exit clauses with clear, transparent procedures and timelines. Organisations should conduct internal migration tests to identify vulnerabilities, then rectify and retest until full compliance is achieved. From a customer perspective, organisations should meticulously scrutinise the terms before agreeing to a cloud service contract.

Tags: policy, procurement