Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services to personal information stored and processed in the IT systems of global American companies. One of these processes is essentially technological, the second is legal, and the third is of a business nature. All three processes are designed to constrict access by American government agencies to personal information held by those companies, in their effort to preserve national security and enforce the law.