CONNECT

Tidal Point Software, January 5 2026

Sovereign Technology: Implementation Challenges

In an earlier post, we talked about what Sovereign Technology means, and factors that matter: technology, national security, and the economy.

In this post, we’ll explore some of the challenges around implementing sovereign tech capabilities. It's not straightforward and here are some key challenges:

The Modern Tech Stack

The reality is that achieving tech sovereignty isn’t as simple as ticking the “local datacenter” box in your Microsoft 365 settings. Modern digital systems are layered. Cloud services depend on hyperscalers, like Microsoft, Google and Amazon. As an aside, this dependence on hyperscalers is also a concentration risk, when one goes down (and they do), whole segments of government or businesses do too. But I digress.

In the security world, there is a concept of a “Software Bill of Materials” or SBOM. Like what you’d expect on the tag of a new mattress, or on the side of a soup can, software providers are beginning to list out all the dependent or repackaged software included in the product you’ve bought. It sounds easy and simple—but of course, it isn’t. Most of the software you use has dozens, if not hundreds of dependent software packages. Beyond the challenge enumerating the list, each entry carries security, sovereign tech, and supply chain considerations.

Making matters more complex, in the SaaS and Internet application world, software is not only executed but it updates regularly and connects to peer applications, such as an identity management provider when you log into a service, continuously.

At Tidal Point, we’re a Canadian company and have customers that want to retain their data and operations within Canadian law. Fair enough. If you are conscious and purposeful about the technology stack you build, world class capability is just a few clicks away. But even then, there are snags. For example, we leverage a capability provided by a Canadian LLM provider to improve search results (“re-rank”). Even though most of the application stack is either in Canada or using Canadian tech, the actual systems that expose the re-rank features are based outside of Canada for technical reasons. Domestic and sovereign solution all the way through, except some of it is hosted abroad. This begs the question: Is this now a non-sovereign capability?

Technology configuration is always going to be complex and nuanced, so we have to ask – does it matter if it is hosted abroad? The answer is “yeah, probably”.

International Considerations

Why would it matter if your digital applications use foreign suppliers and capacity? There are lots of reasons, and they include:

I think most people would agree the above factors matter quite a bit nationally. This in turn answers the question we posed, “does it matter if technology is hosted abroad?”. It does, and for reasons that span a few dimensions. The follow-on question is what to do about it, because (spoiler alert) the answer is not “just build everything in house”.

Building Capacity, the Right Way

If you can do it all and be it all domestically, this discussion becomes pretty short.  For most countries, it isn’t in the cards. But this doesn’t mean throwing in the towel, it should mean pushing harder and creating conditions that are ripe for new businesses to thrive and innovate. This is job one.

It is also helpful to consider creating national advantage through establishing a confident, stable and trust-enabled business environment. Businesses follow what is dependable, trusted, and meets their other basic needs. Privacy and Security don’t have to be a chore, they can be a competitive advantage, even at a national scale.

Next is to fill in the gaps:

Finally, where you can’t innovate, where do you partner? Many nations worldwide do align very closely on their values and intent around security and privacy. For example, in Canada we have PIPEDA, which governs a significant portion of organizations in the country regarding data privacy. As a (positive) consequence, under the EU’s General Data Protection Regulation (GDPR), the European Commission has designated Canada (among others) as providing “adequate protection” for personal data — meaning EU organizations can transfer personal data there without needing special safeguards.

A Pragmatic Path Forward

Sovereignty isn’t a checkbox — it’s understanding where your data lives, how it moves, and which jurisdictions it passes through. Even if two organizations in the same country exchange data, it may route internationally before arriving — sometimes to locations governed by laws with very different interpretations of privacy and access.

A realistic path forward blends domestic innovation with strategic partnerships, encouraging foreign providers to operate as locally as possible while creating conditions for homegrown capabilities to thrive. The goal isn’t perfection — it’s clarity, intention, and strengthening national resilience.

Sovereign technology is ultimately about making informed choices in a complex ecosystem and building capacity where it matters most.

Written by

Tidal Point Software

Older Sovereign Technology: Crisis or Opportunity