Breaking the stranglehold: Responses to data sovereignty risk