Documentation Documentation

Jurisdiction

Why Norway was selected for privacy.fish and how jurisdiction affects logging, disclosure, and legal exposure.

20 min read

Introduction

Privacy.Fish compared jurisdictions by one narrow question: what would the state force us to log as an email provider?

Every required log becomes data we must collect, protect, retain, secure, and potentially disclose. Norway was the best jurisdiction we found for the Privacy.Fish model because its mandatory retained data is narrow, explicit, and predictable: account, source IP:port, and timestamp for 12 months.

Norway is also clear about what this duty is not supposed to include. Under the Norwegian IP-retention duty, destination information must not be retained. This is the important difference: Norway requires a narrow access-identification log, not broad mail transaction logging.

Sources:

EU

The EU does not currently have one single EU-wide data-retention law that tells every email provider exactly what to log.

The old EU Data Retention Directive required providers to retain traffic and location data for services including internet access, internet email, and internet telephony. In 2014, the Court of Justice of the European Union declared that directive invalid because it interfered too seriously with the rights to privacy and data protection.

Since then, the legal situation in the EU has been fragmented. Each member state has its own national retention rules, court decisions, national-security exceptions, and telecommunications laws. Some countries have no general retention rules currently in force, some have targeted retention, and some still impose broad or complex metadata-retention obligations.

For Privacy.Fish, this means the EU itself is not enough of an answer. Each country has to be checked separately.

Why Norway is better:

  • Norway gives one narrow and explicit rule we can design around.
  • EU countries vary heavily.
  • Some EU countries have broader retention duties than Norway.
  • Some EU countries have less blanket retention, but more legal uncertainty.
  • The EU situation is unstable enough that “hosted in the EU” is not precise privacy information.

Sources:

Norway

Norway is the winner for Privacy.Fish.

Norwegian law requires providers to retain information needed to identify which subscriber used a public IP address at a given time. Where needed, this includes the port number. In the Privacy.Fish model, this becomes one narrow access log: account, source IP:port, and timestamp.

The retention period is 12 months.

The Norwegian rule also says that destination information shall not be retained. That matters because it means the law is about identifying account access from an IP address and time, not about keeping a general history of who you wrote to, which server your mail was delivered to, or what destinations you contacted.

Why Norway is better:

  • Required retained data is narrow.
  • The retention period is explicit.
  • Destination logging is explicitly excluded under this duty.
  • The rule is understandable enough to design around.
  • It does not require routine sender, recipient, mailbox-event, message-ID, delivery-status, or destination-server logging for this model.

Sources:

Switzerland

Switzerland is worse than Norway for the Privacy.Fish model.

Switzerland has a strong privacy reputation, but its surveillance and metadata-retention framework can bring much broader email metadata into scope than Norway. Swiss law has long required certain telecommunications metadata to be retained for six months. Swiss official material describes retained metadata in general as information about who communicated with whom, when, for how long, where, and by what technical means.

For email-related services, Swiss surveillance rules can include metadata such as sender and recipient addresses, protocol, mailbox events, delivery status, and sending or receiving mail-server information, depending on provider classification and the concrete obligation.

Switzerland is also more legally complex. Some pure email or over-the-top communication services may have more limited duties than traditional telecommunications providers. But that complexity is itself a downside compared with Norway’s narrow and explicit rule.

Why Norway is better:

  • Norway requires account, source IP:port, and timestamp.
  • Switzerland can require broader email metadata.
  • Norway explicitly excludes destination information under the IP-retention duty.
  • Switzerland’s rules create more classification and compliance uncertainty.
  • Switzerland is harder to explain honestly as a simple data-minimizing jurisdiction for this service model.

Sources:

Germany

Germany is worse than Norway for the Privacy.Fish model.

Germany’s main problem is not only data retention. The bigger problem is lawful-interception infrastructure.

German regulator BNetzA says operators of email systems are exempt from the TKÜV readiness obligation only as long as no more than 100,000 users are connected to the system. Above that threshold, email operators must maintain technical and organizational readiness for lawful interception.

Germany also has technical rules for handover points and full recording of lawful intercepts under TR TKÜV. BNetzA describes TR TKÜV as the technical directive that defines requirements for full records of telecommunications intercepts, provision of information, and configuration of handover points to authorized organizations.

Germany also has specific requirements for electronic authority interfaces. BNetzA says obligated providers with 100,000 or more contractual partners must maintain both an ETSI-based interface and an email-based transmission method for certain information procedures, while smaller obligated providers must keep the email-based procedure available.

Why Norway is better:

  • Norway requires one narrow access log.
  • Germany can require large email providers to become interception-ready.
  • Germany has handover/interface requirements that Privacy.Fish does not want to design around.
  • Germany’s retention rules have repeatedly been politically and legally contested.
  • Norway is simpler: account, source IP:port, timestamp.

Sources:

Netherlands

The Netherlands is not a simple “worse than Norway” case. It is more complicated.

The old Dutch blanket data-retention law was suspended by the District Court of The Hague in 2015 after the CJEU invalidated the EU Data Retention Directive. As a result, Dutch telecom and internet providers were no longer required under that law to retain general telephone and internet traffic data for fixed periods. The old Dutch regime had required telecom data retention for at least 6 months, and commentary describes the old requirement as including 12 months for telephony data and 6 months for internet access and email-related data.

That means the Netherlands may look attractive if the only question is blanket metadata retention. But the absence of the old blanket-retention law does not mean “no surveillance obligations.” Dutch public telecommunications providers can still be subject to lawful-interception and disclosure obligations. NBIP describes lawful interception and lawful disclosure as obligations for ISPs, VoIP providers, and other public telecommunications services, where authorized agencies can demand traffic interception or customer-identifying data.

This is the key difference from Norway for Privacy.Fish: the Netherlands may currently have less simple blanket retention, but the legal model is less clean to explain. Norway gives us a narrow, explicit, public rule: account, source IP:port, and timestamp for 12 months. The Netherlands requires a deeper classification question: whether the service is treated as a public electronic communications service, what interception or disclosure obligations apply, and what operational readiness is expected.

Why Norway is better:

  • Norway gives a narrow, explicit retention duty we can design around.
  • The Netherlands does not currently have the same old blanket retention law, but lawful-interception and disclosure obligations still exist.
  • The Dutch answer depends more on provider classification and operational interpretation.
  • Norway is easier to explain honestly to users: one required access log, not a broader or unclear mail-metadata regime.

Sources:

Sweden

Sweden is worse or less clean than Norway for the Privacy.Fish model.

Swedish retention rules are broader and more category-dependent. The Nordic comparison describes Swedish retention around data needed to trace and identify source and destination, date, time, duration, type of communication, user equipment, and location for covered services.

For internet access, Sweden retains data such as subscriber or user data, assigned IP address, login and logout times, and equipment data. Retention periods vary by category. Data related to internet access is stored for 10 months, while data related to telephony or message processing through a mobile termination point is generally stored for 6 months. Certain location data is stored for a shorter period.

This is less suitable for Privacy.Fish because the retained categories are broader and more dependent on service classification than Norway’s account, source IP:port, timestamp model.

Why Norway is better:

  • Norway’s retained fields are narrower.
  • Sweden’s rules include broader categories.
  • Sweden’s retention periods vary by communication type.
  • Norway explicitly excludes destination information under the IP-retention duty.
  • Norway is easier to explain as a privacy-first jurisdiction.

Sources:

Denmark

Denmark is legally heavier and more complex than Norway.

Denmark historically imposed broad data retention. After legal changes and CJEU pressure, Denmark moved toward a more complicated model involving targeted retention, regional retention, and general or undifferentiated retention in certain national-security contexts.

The Nordic comparison describes targeted retention aimed at convicted persons, communication equipment, persons, geographical areas, and concrete assessments. Denmark also has rules around general retention for national security and internet access. Retention periods can be around one year depending on the activated rule.

This is a bad fit for Privacy.Fish because the answer is not a simple field list. The Danish regime depends on targeting, geography, crime categories, national-security assessments, and implementing decisions.

Why Norway is better:

  • Norway has a narrow, general rule Privacy.Fish can design around.
  • Denmark’s regime is more complex.
  • Denmark can involve targeted, regional, and national-security retention models.
  • Norway gives users a clearer answer about what we are forced to retain.

Sources:

Finland

Finland may be lighter for some small providers, but it is less clean than Norway.

Finland’s retention rules under FECA apply to selected provider categories. The Ministry of the Interior decides which companies are subject to the retention obligation. That means Finland may not cover every small provider in practice, but the rule is less predictable and more administrative than Norway’s narrow statutory rule.

If a provider is covered, the retained categories can be broader than Norway’s access log. The Nordic comparison describes categories such as subscriber name and address, subscription identifiers, transaction-identifying data, message type, recipient, time and duration, and internet-access user or device identifiers.

Retention periods vary by service category: 12 months for mobile and text-message data, 6 months for internet telephony, and 9 months for internet access.

Why Norway is better:

  • Finland may not cover every provider, but the coverage question is less predictable.
  • If covered, Finland’s retained categories are broader.
  • Finland uses different retention periods by service type.
  • Norway gives one clearer rule for this model.

Sources:

Iceland

Iceland is worse than Norway for the Privacy.Fish model.

Iceland has a shorter retention period than Norway, but the scope appears broader. Icelandic telecommunications companies must retain a minimum record of users’ electronic-communications traffic for 6 months.

The Nordic comparison says providers must be able to identify which customer used a telephone number, IP address, or username, and provide information on connections, dates, who was connected, and amount of data transferred.

That is broader than Norway’s model. Norway requires account, source IP:port, and timestamp; Iceland appears to require broader connection records.

Why Norway is better:

  • Iceland’s retention period is shorter, but the scope appears broader.
  • Iceland can include information about connections and counterparties.
  • Norway’s duty is narrower.
  • Norway explicitly excludes destination information under the IP-retention duty.

Sources:

United Kingdom

The United Kingdom is worse than Norway for the Privacy.Fish model.

The UK can require data retention by notice. A data-retention notice under the Investigatory Powers Act 2016 may require retention of relevant communications data for up to 12 months.

The categories can be much broader than Norway’s narrow access log. UK material describes relevant communications data as data that may identify or assist in identifying senders, recipients, sources, destinations, IP addresses, ports, times, durations, communication type, method, pattern, system data, and location-type information.

The UK also has secrecy and notice-based powers. That is a bad fit for a transparent privacy-first email provider, because the obligation may not be a simple public rule users can understand.

Why Norway is better:

  • Norway’s duty is public, narrow, and explicit.
  • The UK can impose broader retention duties by notice.
  • The UK system can involve secrecy.
  • UK categories can include source and destination information.
  • Norway is easier to describe honestly to users.

Sources:

United States

The United States is not a good fit, even though it does not have a simple Norway-style blanket email-provider retention rule.

The US Stored Communications Act allows government entities to compel disclosure of stored content and non-content records with legal process. It also allows preservation requests requiring a provider to preserve records and other evidence already in its possession for 90 days, renewable for another 90 days.

This means the US may look lighter if the only question is “is there a standing universal access-log rule?” But for Privacy.Fish, the broader compelled-disclosure, preservation, gag-order, and surveillance environment makes it less attractive.

The US model is less about one public mandatory log and more about a broad legal process framework that can compel disclosure or preservation of what the provider has.

Why Norway is better:

  • Norway’s rule is narrow and explicit.
  • The US has broad compelled-disclosure and preservation powers.
  • The US legal environment is less predictable for a privacy-first email provider.
  • Norway is a better fit for a transparent public promise about what is routinely retained.

Sources:

Canada

Canada is not as predictable as Norway.

Canada does not currently have the same simple, standing, Norway-style email-provider access-log rule in the sources reviewed here. However, Canadian lawful-access law has been moving toward stronger provider obligations.

Bill C-22 proposes powers allowing regulations for retention of metadata, including transmission data, for reasonable periods not exceeding one year. The Canadian government describes this as metadata retention and says it would not include content, web-browsing history, or social media activity.

For Privacy.Fish, this is less attractive than Norway because the Canadian regime is active, politically contested, and moving toward broader metadata powers.

Why Norway is better:

  • Norway already has a narrow, known rule.
  • Canada’s regime is politically active and evolving.
  • Proposed Canadian metadata-retention powers could become broader than Norway’s access-log model.
  • Privacy.Fish benefits from a jurisdiction where the required retained data is already clear.

Sources:

Australia

Australia is much worse than Norway.

Australia has one of the clearest bad-fit regimes for Privacy.Fish. Telecommunications providers must retain a prescribed metadata dataset for at least 2 years.

The retained dataset can include subscriber/account/service/device information, source identifiers such as email address, IP address, and port number, destination identifiers such as recipient email address, IP address, and phone identifiers, time and duration, communication type, service used, and location information for equipment.

Australian guidance also says that if a provider offers an email service, the provider has data-retention obligations unless the email service is only for a person’s immediate circle.

Why Norway is better:

  • Norway requires one narrow access log for 12 months.
  • Australia requires much broader metadata for at least 2 years.
  • Australia includes destination identifiers.
  • Norway explicitly excludes destination information under the Norwegian IP-retention duty.
  • Australia is the opposite of what Privacy.Fish wants to build.

Sources:

New Zealand

New Zealand is not better than Norway for this model.

New Zealand does not appear to have a simple blanket email-provider retention duty like Australia’s in the sources reviewed here. However, New Zealand’s TICSA framework imposes interception-capability and network-security obligations on telecommunications network operators and service providers.

TICSA is about interception capability and network security. For Privacy.Fish, the issue is not only routine logging. It is whether the legal environment expects providers to design infrastructure around interception capability.

Why Norway is better:

  • Norway requires a narrow retained access log.
  • New Zealand has interception-capability obligations.
  • Interception-readiness obligations are a worse fit for Privacy.Fish’s security philosophy.
  • Norway is easier to explain as a data-minimizing jurisdiction.

Sources:

France

France is worse than Norway.

France has broader traffic and location data retention mechanisms, especially in national-security contexts. French electronic-communications law and legal analysis describe obligations for electronic communications operators to retain connection or traffic data, often for one year, in order to respond to law-enforcement or national-security needs.

French law also has extensive national-security and lawful-access machinery around electronic communications. Even if content is not the ordinary target of metadata retention, the metadata categories and legal context are broader than Norway’s narrow access-identification log.

Why Norway is better:

  • Norway’s retained data is narrower.
  • Norway’s rule is more explicit and easier to design around.
  • France’s national-security retention model is broader.
  • France is less suitable for a minimal email provider trying to retain only one narrow access log.

Sources:

Belgium

Belgium is worse or at least much more complex than Norway.

Belgium has a revised targeted and differentiated metadata-retention regime. BIPT describes Article 107/5 of the 2005 Electronic Communications Act as amended by the Act of 20 July 2022 on the collection and retention of identification data and metadata in the electronic communications sector and the provision of such data to authorities.

Belgian data-retention law has been repeatedly litigated and revised. That creates more legal complexity than Norway’s narrow rule.

The Belgian system is not a simple “one access log” model. It is a broader metadata-retention and evidence-provision framework with multiple moving parts and repeated court challenges.

Why Norway is better:

  • Norway has one narrow access-log duty.
  • Belgium has broader metadata-retention machinery.
  • Belgium has repeated legal uncertainty around retention rules.
  • Norway is easier to document clearly for users.

Sources:

Ireland

Ireland is legally complex and historically broader than Norway.

Ireland’s Communications (Retention of Data) Act 2011 included internet access, internet email, and internet telephony categories. The retained data included data necessary to trace and identify the source of a communication, such as user IDs, and other fields related to internet access, internet email, and internet telephony.

The Irish framework used a one-year retention period for internet-related data and a two-year period for telephone data. The body of email messages was not the target; the obligation concerned traffic-related information. But this is still broader than Norway’s narrow account, source IP:port, timestamp model.

Ireland’s framework has also been heavily affected by EU case law and later amendments. That makes it less clean for Privacy.Fish than Norway.

Why Norway is better:

  • Norway’s required retained data is narrower and clearer.
  • Ireland’s framework historically covered internet email metadata.
  • Ireland’s framework is more complex and legally contested.
  • Norway gives a simple public answer about what Privacy.Fish must retain.

Sources:

Luxembourg

Luxembourg is unclear and not a stronger choice than Norway.

Luxembourg has been working on traffic and location data-retention legislation after EU case-law developments. Government sources describe a draft law regulating the retention and use of traffic and location data for national security, serious crime, and serious threats to public security.

That makes Luxembourg difficult to use as a clean privacy jurisdiction for the Privacy.Fish model. The relevant framework is not as straightforward as Norway’s narrow access-retention duty.

Why Norway is better:

  • Norway has a known and narrow rule.
  • Luxembourg’s retention framework is less clear for the Privacy.Fish model.
  • Luxembourg’s draft-law environment is harder to explain publicly.
  • Privacy.Fish needs a jurisdiction where the required retained data can be described precisely.

Sources:

Austria

Austria is interesting, but not as straightforward as Norway.

Austria’s implementation of the old EU Data Retention Directive was struck down by the Austrian Constitutional Court in 2014 after the CJEU invalidated the directive. The court criticized the mass interference with fundamental rights and the conditions around storage, deletion, and access.

This makes Austria potentially attractive if only looking for absence of blanket data retention. However, Austria still has lawful-interception and data-provision frameworks under telecommunications and criminal-procedure law. Lawful interception is not the same thing as routine data retention, but it matters for a privacy-first email provider because it affects operational obligations.

For Privacy.Fish, Norway is still easier to defend because Norway’s mandatory retained data is explicit, narrow, and known. Austria may be interesting, but the exact current provider-specific email obligations require deeper local-law review.

Why Norway is better:

  • Austria’s old blanket retention law was struck down, but that does not automatically mean “no relevant obligations.”
  • Austria still has lawful-interception and data-provision frameworks.
  • Norway gives a clear public answer: account, source IP:port, timestamp for 12 months.
  • Norway is easier to document precisely.

Sources:

Comparison Table

Jurisdiction Required logging / retention fit Main issue compared with Norway
Norway Account, source IP:port, timestamp for 12 months Best fit
EU No single EU-wide rule after the Data Retention Directive was invalidated Every country must be checked individually
Switzerland Broader email metadata can be in scope Sender, recipient, protocol, mailbox-event, and server metadata
Germany Interception readiness for large email systems TKÜV duties above 100,000 users
Netherlands No old blanket-retention law, but interception and disclosure duties remain Less clear than Norway
Sweden Broader categories and variable periods Source, destination, equipment, timing, and category-dependent retention
Denmark Targeted, regional, and national-security retention model More complex than Norway
Finland Selected providers; broader fields if covered Less predictable and broader when applicable
Iceland 6 months, but broader connection records Can include connection counterparties and transferred data
United Kingdom Retention notices can require broad communications data Secret notices and broader categories
United States No simple blanket rule, but broad compelled disclosure and preservation Less predictable legal exposure
Canada No simple current Norway-style rule, but lawful-access expansion proposed Metadata retention up to one year proposed
Australia Broad prescribed metadata dataset for at least 2 years Much broader and longer than Norway
New Zealand No simple blanket rule found, but interception-capability duties Interception design obligations
France Broader national-security traffic/location retention Broader and less suitable
Belgium Targeted/differentiated metadata retention Complex and repeatedly litigated
Ireland Historically broader internet/email retention framework More complex and legally contested
Luxembourg Draft/unclear traffic-location retention framework Less clear than Norway
Austria Old blanket retention struck down, but interception frameworks remain Interesting, but less clear than Norway