\|/ias/|\ Overview Codeberg ↗
\|/ias/|\ › Individual Protection

Individual Protection — A Practical Guide

Practical self-defence for anyone who processes data. Not legal advice. Not a political statement. Just the framework, the tools, and the records that matter if questions ever arise.

Global coverage

This guide covers ~24 data-protection regimes in detail and another 11 briefly, shown on the map below. Countries are coloured by the regulatory family their primary law belongs to. Uncovered countries are shown in muted slate — the methodology in this guide still applies, but you'll need to substitute your local law for the worked GDPR examples.

Four orthographic globes showing jurisdictions covered in this guide, highlighted in cyan.
Four orthographic views — Americas · Europe/Africa/Mid-East · South + East Asia · Asia-Pacific/Oceania — together showing every jurisdiction on Earth. Base geography: Natural Earth 1:110m (public domain). Each country rendered as <path id="{ISO3}"> for reproducible highlighting via tools/generate-globe-views.py.
Covered in this guide (60 countries — 24 in detail + 36 briefly or via EU/EEA) Not yet covered in detail — methodology still applies; swap your local law for the GDPR examples

Ocean + land: OpenEarth Pangea palette (--oe-bg-space · --oe-earth). Covered-country highlight: IAS theme cyan (--oe-process). Space ring + twinkling stars match the OpenEarth logo.
Microstates (Malta, Liechtenstein, Singapore) are too small to appear at 1:110m resolution but are covered through EU/EEA membership or national law.

Who this guide is for

You process data. Maybe client notes, collaborator emails, interview transcripts, a dataset of survey responses, your own coding history in an AI assistant — any information that could identify a specific person, including yourself. You're not a Fortune-500 corporation with a dedicated legal department. You're one person, or a small team, trying to understand what laws apply to what you're doing.

This guide exists because the structural question faced by solo developers is identical to the one faced by enterprises: which of my providers could be compelled to produce my data under a law other than the one that's supposed to protect it, and what do I do about that?

What this guide is not

The core observation

Most people's data is protected by the data protection law of their jurisdiction. In the EU it's the General Data Protection Regulation (Regulation (EU) 2016/679, "GDPR"). It grants specific rights (Arts. 12-22), places obligations on anyone processing data (Arts. 24-43), and — critically for this guide — restricts when controllers may respond to data access requests from outside the EU (Art. 48).

At the same time, some providers that solo developers and small teams use every day — cloud APIs, code-hosting services, ML services — are incorporated in jurisdictions whose laws can compel them to produce data regardless of where the data physically sits. The US CLOUD Act (18 U.S.C. §2713) and the UK Investigatory Powers Act 2016 are the most commonly cited examples.

When data protected by one framework reaches a provider governed by another, the two frameworks interact. GDPR Art. 48 is written precisely for this interaction.

This guide uses GDPR as the primary example — but the methodology is global. Most major economies now have their own data protection regime: India's DPDPA (2023), China's PIPL + DSL (2021), Brazil's LGPD (2018), Russia's Federal Law 152-FZ (2006, heavily amended since 2015), Canada's PIPEDA, Australia's Privacy Act, Japan's APPI, South Korea's PIPA, and many more. The structural question is the same in every jurisdiction: which of my providers are subject to a foreign legal framework with extraterritorial reach, and what protective mechanism does my local law offer? Substitute your local law for "GDPR," your local supervisory authority for "EDPB/national DPAs," and the methodology — map your providers, minimise your data flow, document your actions — transfers directly.

Your jurisdiction shapes the analysis

The methodology of this guide — map your providers, minimise the data flow, document your actions — is universal. The specific protective mechanism you can invoke depends on which data-protection law you live under. Below is a deliberately concrete description of eight major jurisdictions, with the precise citations a lawyer would want.

European Union / EEA — GDPR

Primary law: Regulation (EU) 2016/679 ("GDPR"). Effective 25 May 2018. Applies in all EU and EEA states.

Authoritative source: eur-lex.europa.eu/eli/reg/2016/679

United Kingdom — UK GDPR + Data Protection Act 2018

Primary law: The UK GDPR (post-Brexit retained EU law, mirrors EU GDPR with domestic amendments) + Data Protection Act 2018.

Sources: DPA 2018 (legislation.gov.uk) · ico.org.uk

United States — sectoral + state-level + extraterritorial reach

The US has no comprehensive federal data-protection law. The framework is a patchwork:

Sources: CCPA — oag.ca.gov · US CLOUD Act · FTC privacy

India — Digital Personal Data Protection Act 2023 (DPDPA)

Primary law: Digital Personal Data Protection Act, 2023 (Act No. 22 of 2023). Replaces the prior Sec. 43A regime under the IT Act. Implementation rules notified progressively from 2024 onwards.

Sources: indiacode.nic.in (Act text — official) · meity.gov.in (Ministry of Electronics & IT — DPDPA implementation)

China — PIPL + DSL + CSL trilogy

Primary laws: Personal Information Protection Law (PIPL, 2021), Data Security Law (DSL, 2021), Cybersecurity Law (CSL, 2017). Applied together by the Cyberspace Administration of China (CAC).

Sources: PIPL English translation (NPC Observer) · cac.gov.cn · DigiChina (Stanford) PIPL translation

Brazil — LGPD

Primary law: Lei Geral de Proteção de Dados Pessoais (LGPD) — Law No. 13.709/2018. Effective August 2020. Highly aligned with GDPR but with important divergences.

Sources: planalto.gov.br (LGPD) · gov.br/anpd

Russian Federation — Federal Law 152-FZ + State Duma amendments

Primary law: Federal Law No. 152-FZ "On Personal Data" (2006), heavily amended by the State Duma. Key amendments: FZ-242 (2014, data-localisation), Yarovaya laws (2016, telecom data retention), FZ-266 (2022, breach notification + scope).

Sources: consultant.ru (FZ-152 consolidated text) · garant.ru (FZ-152 reference)

Canada — PIPEDA + provincial regimes

Primary law: Personal Information Protection and Electronic Documents Act (PIPEDA, 2000). Provincial laws apply in BC, Alberta (PIPA), and Quebec (Law 25 / Act 64).

Sources: laws-lois.justice.gc.ca (PIPEDA) · priv.gc.ca

Asia-Pacific

Australia — Privacy Act 1988

Sources: legislation.gov.au (Privacy Act) · oaic.gov.au

New Zealand — Privacy Act 2020

Sources: legislation.govt.nz (Privacy Act 2020) · privacy.org.nz

Japan — APPI (Act on the Protection of Personal Information)

Sources: ppc.go.jp/en/legal (English) · elaws.e-gov.go.jp (Japanese authoritative)

South Korea — PIPA (Personal Information Protection Act)

Sources: pipc.go.kr/eng · PIPA English (KLRI)

Singapore — PDPA (Personal Data Protection Act)

Sources: sso.agc.gov.sg (PDPA) · pdpc.gov.sg

Thailand — PDPA (Personal Data Protection Act B.E. 2562)

Sources: etda.or.th (PDPA resources) · pdpc.or.th

Vietnam — Decree 13/2023 on Personal Data Protection

Sources: thuvienphapluat.vn (Decree 13/2023)

Africa

South Africa — POPIA (Protection of Personal Information Act 4 of 2013)

Sources: gov.za (POPIA) · inforegulator.org.za

Kenya — Data Protection Act 2019

Sources: kenyalaw.org (DPA 2019) · odpc.go.ke

Nigeria — NDPA (Nigeria Data Protection Act 2023)

Sources: ndpc.gov.ng · NDPA Act text (PLAC)

Latin America

Argentina — Law 25.326 (Personal Data Protection Act, 2000)

Sources: infoleg.gob.ar (Law 25.326) · argentina.gob.ar/aaip

Chile — Law 19.628 + Law 21.719/2024

Sources: bcn.cl (Law 19.628) · bcn.cl (Law 21.719/2024)

Middle East

Turkey — KVKK (Kişisel Verilerin Korunması Kanunu, Law No. 6698, 2016)

Sources: mevzuat.gov.tr (KVKK) · kvkk.gov.tr

Israel — Privacy Protection Law 1981 + 2024 Amendment 13

Sources: gov.il (Privacy Protection Authority)

Saudi Arabia — PDPL (Personal Data Protection Law, Royal Decree M/19, 2021)

Sources: sdaia.gov.sa · boe.gov.sa (PDPL)

UAE — Federal Decree-Law No. 45 of 2021

Sources: u.ae (Data protection overview) · uaelegislation.gov.ae

Other notable regimes (briefly)

The pattern is now clear: most major economies have a comprehensive data-protection law, and the global trend is toward GDPR-influenced rights-based regimes with mandatory breach notification, cross-border transfer controls, and dedicated supervisory authorities. The substantive differences are in (i) cross-border transfer mechanisms — some jurisdictions are restrictive, others permissive-by-default; (ii) data localisation — some jurisdictions impose hard residency rules; (iii) extraterritorial reach — most modern regimes apply to processors outside the jurisdiction offering services to local data subjects.

For your specific situation, the only authoritative source is qualified counsel in your jurisdiction. This guide gives you the structural language and the citations to start the conversation.

GDPR Article 48, in plain language

"Any judgment of a court or tribunal and any decision of an administrative authority of a third country requiring a controller or processor to transfer or disclose personal data may only be recognised or enforceable in any manner if based on an international agreement, such as a mutual legal assistance treaty, in force between the requesting third country and the Union or a Member State, without prejudice to other grounds for transfer pursuant to this Chapter." — Regulation (EU) 2016/679, Art. 48

In plain English:

Article 48 does not make the US CLOUD Act or UK IPA invisible. It says: these laws do not, by themselves, create a lawful basis for a GDPR controller to release data. The proper channel is the MLAT.

What this means for individuals

If you are the data controller — the person who decides what to do with data — and you are in an EU Member State, Article 48 gives you a concrete, textual basis to:

  1. Decline to respond to a direct extraterritorial request without legal assistance channels.
  2. Require the requesting authority to route through the MLAT.
  3. Document your position factually, without escalation.

None of this requires confrontation. It requires understanding the framework and having the records to show you operated within it.

The practical steps

1. Know your dependencies

Use the jurisdiction registry specification (on foundation-protocols-spec) — a JSON file where you list every provider you send data to, their incorporation country, and what extraterritorial laws apply. The schema and tools are distributed with IAS. For most individuals, populating this file takes 30 minutes and clarifies more about your posture than hours of reading articles would.

2. Minimise the data flow

The simplest mitigation is sending less data. If an AI API accepts "a prompt to summarise a document," you often don't need to send the document — you can send a derived question. If a service lets you pass identifiers instead of names, use identifiers. If you can run a model locally for the sensitive part and call the API for the generic part, do that.

Data that never left your control cannot be produced by anyone.

3. Prefer matching-jurisdiction providers where practical

A German individual processing German collaborator data who uses a German-incorporated cloud provider is in a simpler compliance posture than one using a US-incorporated provider. This is not a moral judgement about providers — it's a statement about how many legal frameworks the data flow passes through. Fewer crossings = fewer interaction questions.

For AI services: at the time of writing, the major frontier AI APIs are US-incorporated. Mitigations (DPAs with zero-retention clauses, no-training commitments, data minimisation) are the practical path. Document them. Store the DPA. Re-check its terms annually, per EDPB Recommendations 01/2020.

4. Have an incident plan

The compliance action protocol specification (on foundation-protocols-spec) specifies timer cadences grounded directly in statutory text:

Install the deadline tracker. You don't need an incident to use it — run it in test mode once to see the flow. When an incident actually happens, you start the tracker and have a timestamped record of everything that followed.

5. Keep the records

If questions ever arise about your compliance — from a regulator, a client, an auditor, a court — the evidence that matters is timestamped records showing what you knew, when, and what you did about it.

GDPR Art. 83(2)(c) and (f) explicitly tell supervisory authorities to consider mitigating factors when calibrating administrative fines. A complete record trail from awareness → progressive warnings → dispatched notification is exactly the kind of evidence those factors contemplate.

6. If you are asked

If you ever receive a direct extraterritorial request — through a provider, directly to you, or by any other channel — you do not have to answer that day. You have options:

The goal is to use the legal framework that exists, calmly.

What this guide will not do for you

It will not tell you which country's laws are better, or worse. Those questions have answers, but they're political and context-dependent, not technical.

It will not make legal risk zero. Legal risk isn't zero for anyone; the goal is to understand it and respond proportionately.

It will not replace counsel. When the stakes become real — contracts with significant liability, regulatory enforcement, disputes — get counsel involved early. The records you kept will make that lawyer's job much easier.

Starter kit

Everything you need to follow this guide is Apache-2.0 and sits in the IAS repository. All items below ship in IAS v1.1:

ComponentWhat it doesStatus
schemas/dependency-jurisdiction-v1.0.jsonJSON Schema for your populated jurisdiction file
schemas/compliance-record-v1.0.jsonJSON Schema for incident + periodic-compliance records
templates/dependency-jurisdiction.example.jsonPopulated example file to adapt (generic providers)
templates/confidentiality-denylist.example.jsonTemplate for Gate 7.5.1 denylist
templates/incident-response-playbook.mdFill-in-the-blanks GDPR Art. 33(3) template
tools/jurisdiction-audit/audit.pyProduce human-readable + JSON report from your config✓ MVP
tools/compliance-deadline-tracker/track.pyProgressive pre-deadline warnings from awareness timestamp✓ MVP
tools/check-versions.shGate 6.1 — verify dependency versions exist before bump
tools/check-confidentiality.shGate 7.5.1 — pre-deploy/pre-push confidentiality scan

MVP notes: the audit + deadline-tracker are functional first cuts. Planned enhancements (PagerDuty adapter, daemon mode, snapshot-diff for the audit) are tracked as TODOs in each tool's README.

None of these require Matrix, a bot, AGPL code, or any particular infrastructure. A JSON file, Python, and a cron job are enough.

Clone and start:
git clone https://codeberg.org/openearth/ias.git
cd ias/docs
cat individual-protection.md   # this guide

Further reading

Authoritative sources for the frameworks referenced above:

For anything beyond understanding, talk to a lawyer qualified in your jurisdiction.

Glossary — acronyms & deep-dive links

Every term used above, with a one-line plain-English meaning and an authoritative source you can read directly. Not a substitute for legal advice — these links are the source texts lawyers cite.

Laws & frameworks

TermMeaningSource
GDPR General Data Protection Regulation — the EU's comprehensive data-protection law. Applies to anyone processing personal data of EU residents. Regulation (EU) 2016/679
NIS2 Network and Information Security Directive 2 — EU cybersecurity law with supply-chain security obligations and hard incident-reporting deadlines. Directive (EU) 2022/2555
US CLOUD Act Clarifying Lawful Overseas Use of Data Act (US, 2018) — allows US authorities to compel US-incorporated providers to produce data, regardless of where data physically sits. 18 U.S.C. §2713
UK IPA UK Investigatory Powers Act 2016 — UK surveillance law including Technical Capability Notices that can compel providers to assist with data access. IPA 2016, c.25
EUDR EU Deforestation Regulation (2023/1115) — places due-diligence obligations on operators placing commodities like cocoa, coffee, palm oil on the EU market. Regulation (EU) 2023/1115
MLAT(s) Mutual Legal Assistance Treaty — bilateral or multilateral agreements between countries that provide the lawful channel for cross-border data access. US DOJ MLAT overview · Wikipedia: Mutual legal assistance treaty
SCCs Standard Contractual Clauses — EU Commission-approved template clauses controllers can use to lawfully transfer personal data to third countries. Commission Decision (EU) 2021/914

Institutions & supervisory authorities

TermMeaningSource
EDPB European Data Protection Board — the EU-wide body harmonising GDPR interpretation across national DPAs. Issues Guidelines and Recommendations. edpb.europa.eu
ENISA European Union Agency for Cybersecurity — produces NIS2 guidance, supply-chain security recommendations, and threat-landscape reports. enisa.europa.eu
CJEU Court of Justice of the European Union — the highest court interpreting EU law, including landmark data-protection decisions (Schrems I, Schrems II). curia.europa.eu
DPA(s) Data Protection Authority (plural: DPAs) — national supervisory authorities enforcing GDPR. Examples: BfDI (DE), CNIL (FR), IMY (SE), DPC (IE), ICO (UK). EDPB list of national DPAs
BfDI Bundesbeauftragte für den Datenschutz und die Informationsfreiheit — German federal DPA. bfdi.bund.de
CNIL Commission nationale de l'informatique et des libertés — French DPA. One of the most active enforcers. cnil.fr
IMY Integritetsskyddsmyndigheten — Swedish Authority for Privacy Protection. imy.se
DPC Data Protection Commission (Ireland) — lead supervisory authority for most Big Tech companies with EU HQs in Ireland. dataprotection.ie
ICO Information Commissioner's Office — UK DPA under UK GDPR and the Data Protection Act 2018. ico.org.uk

Instruments & concepts

TermMeaningSource
DPA (contractual) Data Processing Agreement — a contract between a controller and a processor setting out how personal data will be handled. Required by GDPR Art. 28. Distinct from "DPA" meaning Data Protection Authority (see above). GDPR Art. 28
DPO Data Protection Officer — internal role required for many controllers/processors. Independent contact point for data subjects + supervisory authority. GDPR Arts. 37–39
DPIA Data Protection Impact Assessment — structured assessment required before high-risk processing. GDPR Art. 35 · EDPB DPIA guidelines
RoPA Record of Processing Activities — living inventory of all processing a controller performs, with purposes, categories, retention periods. GDPR Art. 30
TIA Transfer Impact Assessment — case-by-case assessment whether a third-country transfer provides GDPR-equivalent protection. Required since Schrems II. EDPB Recommendations 01/2020
EEA European Economic Area — EU27 + Iceland, Liechtenstein, Norway. GDPR applies uniformly across the EEA. "Third country" = outside the EEA. EFTA EEA page
CSIRT Computer Security Incident Response Team — national authorities that receive NIS2 Art. 23 incident notifications. EU CSIRTs Network
Art. 33(1) GDPR requirement: personal-data breach notification to the supervisory authority "without undue delay and, where feasible, not later than 72 hours after having become aware." GDPR Art. 33
Art. 34 GDPR requirement: when a breach is likely to result in high risk to data subjects, notify the subjects themselves (not just the authority). GDPR Art. 34
Art. 48 GDPR: foreign court/administrative orders are only recognisable if based on an international agreement (e.g., MLAT). Core protection against extraterritorial access. GDPR Art. 48
Art. 83(2)(c), (f) Mitigating factors the supervisory authority must consider when calibrating administrative fines — includes measures taken and degree of responsibility. GDPR Art. 83
NIS2 Art. 23 Incident-reporting cadence: 24h early warning, 72h notification with details, 1-month final report, measured from awareness of a significant incident. NIS2 Art. 23

Key court cases

CaseMeaningSource
Schrems I (C-362/14, 2015) CJEU invalidated the EU-US Safe Harbour framework for cross-border data transfers. curia.europa.eu C-362/14
Schrems II (C-311/18, 2020) CJEU invalidated the EU-US Privacy Shield and set the obligation on controllers to conduct case-by-case Transfer Impact Assessments. curia.europa.eu C-311/18