At that point, whether you are in contempt or not depends on the answer to the question "did you know that the cops were entering to look for evidence before you threw the keys?" Whether the judge holds you in contempt or not is a function of the free choice of the judge and is not related to the answer to the first question (though whether or not the judge should hold you in contempt is a function of what the judge believes about what you believed).
If we're trying for a metaphor that would be a similar situation pre-digitization, the cloud servers containing business documents could be considered head office, and the office being raided would be the branch office. The branch office would continually be communicating with head office for their operations, and that communication would be shut down during the raid.
This isn't a great metaphor because the "head office" has become sort of stateless and ephemeral with digitization, but that's part of the interesting question the OP was posing, how does law enforcement collect evidence when that evidence is hosted on cloud servers in nebulous datacenters?
“””
United States v. Bridges, 344 F.3d 1010 (9th Cir. 2003)
There was probable cause to search the defendant’s office based on the information in the application that documented his efforts to provide illegal tax advice to various clients, including undercover agents. The search warrant in this case, however, was overly broad. It listed, among the items to be seized, “All records . . . documents . . . computer hardware and software . . .” Though this list was detailed, it was too expansive. There was simply no boundary to what could be seized. In addition, the warrant did not specify the crimes that were the subject of the search (nor did the warrant incorporate the application) so there was no limitation in that manner. Though the application was detailed, the warrant was not. All evidence should have been suppressed. (No discussion of Leon).
“””
https://casetext.com/analysis/search-and-seizure-particulari...
There's already "a law for seizing the IT system of a company", it's called discovery or a subpoena.
What if the safe was never in your house at all, but it was in a foreign country across an ocean? And when the cops showed up, you simply threw the keys across the ocean too?
If the cops know of something particular in the safe, then maybe the judge could find you in contempt for not producing that thing when ordered by the court, but otherwise, I don't see how they have any legal leg to stand on.
[0]https://arstechnica.com/tech-policy/2020/02/man-who-refused-...
If the judge receives a call from the ministry of justice, they will care a great deal about the distinction.
And if a corporate entity finds a way to openly defy a national government, it tends to happen that those governments find a way to change the law (they're the ones making it, right? :P) for that defiance to become punishable by other parts of those governments which can sanction the corporation, prevent their operations within the country or even throw people in jail.
One is, what does the law say? Did they violate it? Is it illegal for a foreign subsidiary to temporarily shut off access to a branch office? How would we like this to work? Policy arguments about law enforcement vs. due process and government overreach.
The other is, politics. If the local government is captured by a cartel of taxi medallion holders who don't like Uber, the government is going to find a way to screw Uber, regardless of whether Uber is complying with existing law. But then it's politics and Uber is a multi-billion dollar corporation, so they have the option to capture the government themselves.
Of course, that leaves the meta argument. Maybe deciding what should happen based on the second method is worse than the first, so how do we prevent that from being what happens?
Did you miss all the screaming of US corporations in relation to EU Acts like DMA? Those changes are exactly what happens when you start to think that law and people behind it are separate.