Privacy and Security: Handling Cross-Border Data Transfers After Schrems II

Moving personal data across borders raises real risks and real questions. Schrems II changed the rules: Privacy Shield was struck down and controllers must check whether transfers by standard contractual clauses (SCCs) actually protect data in the destination country. That means SCCs alone often aren’t enough without extra measures.

Why Schrems II matters and what to watch

Schrems II forced organizations to look beyond paperwork. Regulators now expect a Transfer Impact Assessment (TIA) that checks law and practice in the receiving country. Ask: can local authorities access my data? Are there bulk surveillance laws? If yes, you need stronger safeguards or an alternate route such as an adequacy decision.

Don’t assume cloud providers, processors, or SCCs automatically fix the problem. The law looks at the full picture: where servers are, how data is encrypted, who holds the keys, and what local law permits. Small firms and big companies face the same questions, but the answers and steps can be simple.

Practical steps you can take today

Start with a clear inventory. Know what personal data you send abroad, why, and who receives it. That inventory makes TIAs manageable and shows regulators you’ve thought it through.

Run a Transfer Impact Assessment. Keep it short and focused: identify the transfer, assess the destination’s legal risks, list safeguards you already have, and decide if you need supplementary measures. Document the conclusions and keep them updated when services or countries change.

Use technical safeguards. Encrypt data in transit and at rest. Prefer solutions where your organization controls encryption keys. Pseudonymize or tokenize personal identifiers when possible—this reduces exposure if a transfer gets challenged.

Layer contractual and organizational measures. SCCs remain useful, but add written commitments from processors about access controls, logging, and incident response. Limit who can access transferred data and keep role-based permissions strict.

Consider data minimization and localization. Move only what you must. If a local copy is avoidable, keep processing in the origin region or use an adequately judged provider. When localization is required, ensure secure local handling and clear retention limits.

Make monitoring and audits routine. Check vendor compliance, test encryption, and review access logs. If a vendor faces legal pressure in its country, your documented safeguards and audits help show you acted responsibly.

Finally, keep records and update policies. Regulators expect evidence: TIAs, vendor checks, encryption practices, and governance notes all matter. Small teams can use simple templates; large teams should automate inventory and monitoring.

Privacy and security don’t need to be complicated. Focus on concrete actions—inventory, assessment, encryption, contracts, and monitoring—and you’ll handle cross-border transfers in a way that meets GDPR expectations and keeps data safer.

Olly Steele 24 May 2025

Cross-Border Data Transfers: Standard Contractual Clauses, Schrems II, and TIA Strategies

Data flows smoothly until it runs into a legal storm, as seen in the aftermath of Schrems II. This article explores how businesses handle cross-border data transfers after the ruling, focusing on standard contractual clauses and transfer impact assessments. Get practical tips, recent facts, and a clear breakdown of compliance challenges. Unpack what the latest updates mean for your privacy strategy. Stay ahead with actionable steps to handle GDPR requirements in the global data landscape.

View more