Sort of. But also not really.
For instance, a company can implement technologies that make it resistant to the bribery but not the court order. Consider:
A company receives a court order. In order to extract the data, two employees must both authenticate themselves to the system (ideally by biometric + password), enter the court document number, the user ID or IDs to which it specifically applies, and the public key + certificate under which the data will be encrypted. One of these users must be a manager or higher in the technical side of the business, and the other must be a company lawyer.
Annually, the system produces, and the company provides to [its board of directors / its customers / its shareholders / the public at large] a list of
- court orders complied with (court document number included)
- names, or if a gag order applies, at least number of affected accounts in each case
- certificates under which the data was encrypted
- staff members who attested to the correctness of the demand, in each case
If a staff member receives a bribe or extortion threat, they are going to have to cook up a fake court order, find a co-conspirator in the organization, and know that when the report comes out, the encryption certificate section will show that they extracted information on behalf of "firstname.lastname@example.org"