EU Digital Sovereignty: Why You Need a European ESP (Not Just for GDPR)
Digital sovereignty went from policy talking point to procurement requirement in 2024-2025. For email infrastructure specifically, the reasons go beyond GDPR.
"Digital sovereignty" sounds like a buzzword until you read a recent procurement RFP from a European bank, hospital, or government agency. In 2024-2025 the term became a concrete checklist: EU-incorporated supplier, EU-resident data, EU-located staff handling support, EU-jurisdictional contracts, no extraterritorial law enforcement access. For email infrastructure specifically the reasons go beyond GDPR — they include the US CLOUD Act, the Schrems litigation cycle, and a quiet but persistent push for technological independence in critical sectors.
This article explains why digital sovereignty matters for email infrastructure, what the practical procurement criteria look like in 2025, and how European-resident ESPs map against them. The audience: procurement, security and architecture teams evaluating providers.
What Changed in 2024-2025
Three forces collided:
- The EU-US Data Privacy Framework replaced Privacy Shield in 2023, but its long-term durability is uncertain — Schrems III is widely expected to test it within 24-36 months.
- The US CLOUD Act (2018) allows US authorities to compel data from US providers regardless of where the data is stored. EU customers using US providers are subject to this in principle.
- Geopolitical events accelerated EU public-sector preference for European suppliers, even where GDPR alone did not require it.
The practical consequence: European customers in regulated industries increasingly require not "GDPR compliance" but "no US extraterritorial reach".
Why Email Specifically
Transactional email touches several sensitive data categories:
- Identity verification flows (KYC tokens, AML data).
- Account security (password resets, MFA codes).
- Financial transactions (receipts, invoices).
- Health data (appointment reminders, results).
- Customer communications (anything in the body).
Even with TLS in transit and at rest, the metadata (sender, recipient, timestamp) plus message body is processed by the ESP. A US ESP processing this for EU customers is subject to the CLOUD Act and to FISA 702 in principle.
The Procurement Checklist
In 2024-2025 RFPs for email infrastructure in EU public sector, healthcare and finance increasingly include:
- Supplier incorporated in the EU (not subsidiary of US/UK/CH parent).
- Data processing in EU data centres (specific countries listed).
- Support staff resident in the EU.
- Contract governed by EU member state law.
- No legal mechanism for non-EU government data access.
- Sub-processor list, all EU.
- Annual security audit by EU-based auditor.
- SOC 2 or ISO 27001 from EU certifier where available.
Failing any one of these is increasingly a deal-breaker.
The Big-Tech ESP Problem
SendGrid (Twilio), Mailgun (US), Postmark (US-based parent ActiveCampaign), Resend (US) all have US incorporation. Even where they offer "EU region" data processing, the supplier itself is subject to US law. Many EU procurement teams now consider this incompatible with the strictest interpretation of sovereignty.
The big EU-incorporated alternatives:
- Mailjet (France, owned by Sinch which is Swedish — qualifies).
- Brevo (France).
- Target SMTP (Italy).
- Aruba (Italy).
- several smaller national players (e.g. Sendcloud DE, MailerLite LT).
The "EU Region" Half-Solution
Some US-incorporated providers offer "EU region" or "data residency in EU". This satisfies GDPR transfer mechanism requirements. It does not satisfy CLOUD Act concerns — the parent company is still US-jurisdictional and can be compelled to produce data.
For "data residency" customers this is enough. For "no extraterritorial reach" customers it is not. Know which conversation you are in.
What EU-Native Providers Offer
Real EU-only providers add:
- EU-jurisdictional contracts.
- EU-resident incident response.
- EU-resident support during EU working hours.
- EU-incorporated legal entity for DPA purposes.
- No parent-company mechanism for non-EU government access.
For sectors where this matters (banking, healthcare, public sector, defense-adjacent), EU-native is the only viable choice.
The Cost Picture
EU-native providers tend to be:
- Smaller in scale than US giants → less bulk-pricing leverage.
- More likely to offer Italian/French/Spanish/German support natively.
- Sometimes priced lower (Target SMTP, Mailjet) or comparable (Brevo).
- Sometimes priced higher in niche national players.
The cost gap is usually within 20% either direction. The pricing premium for non-sovereignty is small relative to the procurement reduction in friction.
The Counter-Argument
"US providers have stronger compliance certifications (SOC 2 Type II, HIPAA, FedRAMP) and bigger engineering teams."
True for SOC 2/HIPAA. Less true for FedRAMP, which is irrelevant to EU procurement. The certifications matter where contracts require them. Many EU public sector contracts now require ISO 27001 from an EU-resident certifier instead.
"The big providers have better deliverability."
Marginal. Independent seedlist tests show US and EU providers within a few percentage points at the same volume tier. The dominant factors are authentication, list hygiene and sending pattern, not provider continent.
Sector-by-Sector
Public sector
EU-native is increasingly mandatory. Common at national-government and large municipal levels.
Healthcare
EU-native increasingly required for transactional patient comms (appointment reminders, test results).
Financial services
EU-native for retail banking customer comms. Less strict for back-office.
SaaS B2B
Mixed. EU-native increasingly demanded by enterprise customers in regulated industries. Less critical for SMB SaaS.
Consumer e-commerce
GDPR compliance generally sufficient. Sovereignty rarely demanded.
The DORA Effect
The EU Digital Operational Resilience Act (DORA), effective January 2025, requires financial entities to assess the operational resilience of third-party ICT providers — including email. DORA Article 28 requires risk assessment of concentration risk and extraterritorial exposure. For financial-services customers this turned "sovereignty" from a preference into a regulatory expectation.
How Target SMTP Addresses This
Target SMTP is Italian-incorporated, operates data centres in Italy and Germany, has Italian and German staff handling support and incident response, has DPA template aligned with EU SCCs (though SCCs are unnecessary for our intra-EU operations), and has no US/UK parent or jurisdictional exposure.
The Send-Time Firewall is unrelated to sovereignty per se, but it surfaces an operational pattern that European customers often find useful: explicit, auditable, policy-as-code at the SMTP boundary, with all evaluation happening within EU infrastructure.
The Practical Recommendation
- Identify which sovereignty conversation you are in: GDPR transfer compliance, or no-extraterritorial-reach.
- If the former, US providers with EU region are usually fine.
- If the latter, EU-native providers are required.
- Document the choice in your DPIA.
- Plan procurement timeline 2-3 months ahead if migrating from US to EU provider.
Closing
EU digital sovereignty went from soft policy to hard procurement requirement in two years. For email infrastructure the question is no longer "is our ESP GDPR-compliant?" but "is our ESP outside the reach of non-EU government compulsion?". For most consumer-facing businesses the answer does not yet matter. For regulated industries it does and increasingly will. Target SMTP is one of the EU-native answers; there are others. The important thing is to know which conversation your customers are demanding you join.