The Sovereignty That Wasn't

The Sovereignty That Wasn't

European healthcare organizations chose Zivver—a Dutch email security provider—precisely because it kept patient data under EU jurisdiction. When Zivver was acquired by Kiteworks, a US company, that data transferred to American legal authority without those organizations' consent.

The sovereignty they thought they'd purchased turned out to be a vendor promise, not an enforceable architecture.


The Pattern: Jurisdiction as Property

Organizations treat sovereignty as a feature they can buy: select the right vendor, sign the right contract, check the compliance box. The vendor operates under favorable jurisdiction, so the data stays sovereign.

But jurisdiction isn't a feature. It's a property of the legal entity that controls the system. When that entity changes ownership, jurisdiction follows—regardless of what the contract said, regardless of what the customers chose.

This is sovereignty as promise versus sovereignty as architecture. Promises can be transferred. Architecture can't.

The Mechanism: Acquisition Chain Transfer

Here's how the transfer works:

  1. Organization selects EU vendor for data sovereignty
  2. Vendor operates under EU jurisdiction, stores data in EU
  3. Vendor gets acquired by non-EU company
  4. Acquiring company inherits all vendor contracts and assets
  5. Data is now subject to acquiring company's jurisdiction
  6. Customers receive notification (often after the fact)

The legal structure is sound. The acquiring company now controls the infrastructure. Their jurisdiction applies. The customers who thought they'd architected for sovereignty discover they'd bought a promise that was never theirs to enforce.

The Local Frame: Coherent but Incomplete

From a coherenceism perspective, this is a case of nested coherence failure. The local decision—choose an EU vendor—was coherent within its frame. Healthcare organizations assessed jurisdiction, selected a compliant provider, checked their legal obligations.

But that frame was nested within a larger system: the global M&A market. Zivver could be acquired. Jurisdiction could transfer. The larger frame operated by different rules—rules the local decision didn't account for.

The local optimization (vendor selection) was sound. The nested relationship (vendor-to-market) was invisible. When the larger system moved, the local system discovered its coherence was incomplete. This is friction between scales: the local system operates on different rules than the containing system. When those rules clash, the larger system wins.

Historical Echoes: Jurisdiction Transfer Through Ownership

This pattern isn't new. Jurisdiction has always followed ownership through acquisition chains.

Colonial Trading Companies The British East India Company operated under a royal charter granting monopoly rights in Asia. When territorial control expanded, charter amendments transferred sovereign powers—taxation, military, justice—to a commercial entity. Subjects who thought they answered to the Crown discovered they answered to a company. Sovereignty transferred through legal restructuring, not conquest.

Defense Contractors Across Borders 1990s: European defense contractors built critical military systems. 2000s: US firms acquired those contractors. Suddenly, European military infrastructure was maintained by entities subject to US export controls and jurisdiction. The systems didn't move. The legal entity controlling them did.

Critical Infrastructure Acquisitions Ports. Power grids. Telecommunications. Nations require operators be domestic entities. Operators get acquired by foreign firms through subsidiary structures. The infrastructure remains in-country. The controlling entity doesn't. Jurisdiction transfers through corporate ownership, not physical relocation.

Cloud Service Provider Consolidation Small regional cloud providers promise local data residency. Hyperscalers acquire them. Data stays in the same data center. But the entity operating that data center is now subject to different jurisdiction. Customers discover their architectural choice was vendor-dependent.

The Architectural Question

How do you architect for enforceable sovereignty in nested systems?

The pattern suggests sovereignty requires more than vendor selection. It requires structural guarantees that can't be transferred through acquisition:

Data Residency ≠ Data Sovereignty Storing data in-jurisdiction doesn't ensure jurisdiction over that data. The entity controlling the storage determines jurisdiction, not the location of the storage.

Contract Terms ≠ Structural Guarantees A contract promising EU jurisdiction is only as durable as the contracting entity. If that entity can be acquired, the contract transfers. If you want sovereignty, you need architecture that survives ownership change.

What Enforceable Sovereignty Requires:

  1. Structural Ownership Limits — Entities handling sovereign data must be structured to prevent acquisition that would change jurisdiction (e.g., ownership caps, golden shares, charter restrictions that block cross-border acquisition).
  2. Jurisdictional Triggers — Contracts that automatically terminate if ownership changes jurisdiction, with data return or destruction requirements. Make acquisition less attractive by making sovereignty non-transferrable.
  3. Technical Architecture — Encryption where the customer holds keys, not the vendor. If data is cryptographically inaccessible to the operator, jurisdiction over the operator doesn't grant access to the data.
  4. Regulatory Infrastructure — Laws that treat jurisdiction transfer through acquisition as triggering re-consent requirements. If customers must actively opt-in to the new jurisdiction, acquisition becomes operationally complex.
  5. Nested Frame Awareness — Decision-makers must consider not just "who controls this now" but "who could control this later" and "under what conditions does control transfer."

The lesson: sovereignty requires architecture that accounts for nested frames, not just the current frame.

Recognizing the Pattern

You're seeing sovereignty-as-promise rather than sovereignty-as-architecture when:

  • Compliance depends on vendor selection, not cryptographic controls
  • Contracts promise jurisdiction but don't prevent ownership change
  • No mechanisms exist to detect or respond to jurisdiction transfer

The Zivver case won't be the last. As long as sovereignty is treated as a vendor feature rather than a structural requirement, acquisition chains will transfer jurisdiction.

Building enforceable sovereignty in nested systems is hard. None of these approaches are simple. Each creates costs. But the alternative is treating sovereignty as a promise—and discovering, mid-acquisition, that promises transfer with ownership.


Promises transfer. Architecture doesn't.