Clock Is Ticking For Companies To Comply With Complex Data Transfer Rule
By: bitcoin ethereum news|2025/05/08 04:30:01
0
Share
The National Security Division of the Department of Justice has given companies 90 days to avoid civil penalties under the new Data Security Program entitled “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons” ( “DSP”). By July 8, 2025, companies operating in the international arena must make “good faith efforts” to restrict access to personal and government-related data by foreign adversaries. Although the DSP may apply to any business, regardless of size or industry, if the business makes certain sensitive data available to third parties, businesses in the financial services, life sciences, and information technology sectors are most likely to feel the impact of the DSP due to the nature of the data they handle. Data brokers who collect and sell data, as well as companies that engage in cross-border transactions are also expected to feel the effect of the DSP because of the nature of their transactions. The DSP represents a rare point of agreement between the Biden Administration, which enacted the legislation, and the Trump Administration, which finalized the DSP on January 8, 2025. The DSP has been in effect since April 8, 2025, and the DOJ does not intend to delay criminal enforcement for willful violations, which can bring up to 20 years in prison. Remarks from President Trump’s former defense attorney and current Deputy Attorney General Todd Blanche have indicated that the DOJ will embrace the DSP as a necessity for combating an “increasingly urgent” threat to national security, targeting access by certain “countries of concern” and individuals connected to these countries. The 90-day pause may appear at first blush to signal leniency, but do not be fooled – plenty of caveats exist, including the possibility of civil enforcement for companies not working to restrict access to data by foreign adversaries during the 90 days. The DOJ has established itself as a key regulator of data transfers, and it expects U.S. companies to determine in the coming days whether their data practices, third-party relationships, or ownership structures allow foreign governments and individuals of concern to access Americans’ sensitive personal data or government-related data. The DSP extends beyond existing privacy and security law restrictions. To help companies get up to speed, the DOJ issued further guidance to provide clarification on key provisions and examples of its expectations during the enforcement hiatus, including working on a written data compliance program. The DOJ is giving companies 90 days to “get it right” to protect sensitive data, and if not, its enforcement hammer will come down on companies demonstrating anything less than “full compliance.” The Who, What, Where of the Data Security Program The finalized DSP closely aligns with the Biden Administration’s proposed rule. It goes beyond traditional privacy laws to execute President Biden’s order to combat the “unusual and extraordinary threat” by foreign governments using sensitive U.S. data for purposes of “espionage, influence, kinetic, or cyber operations.” In general, the DSP prohibits “U.S. persons” from “knowingly engag[ing] in a covered data transaction” that provides a “country of concern” or “covered person” with access to “covered data.” Each of these terms contain complexities and carve-outs requiring careful consideration, including that “U.S. persons” includes foreign citizens located in the United States, as well as U.S. entities. The final Rule’s knowledge standard is not a strict liability standard and instead the Rule explains that “knowingly engage” should be interpreted to mean that an individual or entity “had actual knowledge of, or reasonably should have known about, the circumstances, or result” of providing access to covered data by prohibited persons and governments. For example, if a company engaged in data brokerage (a “covered transaction”) and is deceived by a country of concern to provide its government with access to protected data, the company would not be liable because it did not have “actual knowledge of, nor would they have reasonably known of, the circumstances.” The DOJ warns that despite the knowledge requirement under the DSP, companies are expected to have compliance systems in place that prevent restricted conduct by their customers, even if companies do not necessarily have “actual knowledge” of their customers’ every activity. The term “access” to covered data is left “intentionally broad” to include the ability to obtain or otherwise view or receive data, including through information systems, cloud-computing platforms, and security systems or software, meaning that companies’ third-party relationships may put them at risk. The DSP even applies to activity conducted between the U.S. and non-covered countries if certain links exist to a country of concern. “Covered data” includes six categories of “bulk sensitive personal data.” The term “bulk” refers to the volume of sensitive data that triggers application of the DSP, and the triggering threshold amounts vary based on the type of the data. The categories of data and their thresholds are as follows: (1) covered personal identifiers (data collected or maintained on more than 100,000 U.S. persons); (2) precise geolocation data (data collected or maintained on more than 1,000 U.S. devices); (3) biometric identifiers (data collected or maintained on more than 1,000 U.S. persons); (4) human genomic (data collected or maintained on more than 100 U.S. persons) and other ˋomic data (epigenomic, proteomic, and transcriptomic data collected or maintained on more than 1,000 U.S. persons); (5) personal health data (data collected or maintained on more than 10,000 U.S. persons); and (6) personal financial data (data collected or maintained on more than 10,000 U.S. persons). Data meeting the specified thresholds is covered under the DSP regardless of whether the data is anonymized, pseudonymized, de-identified, or encrypted. U.S. government-related data is also covered, with any amount of data triggering DSP rules. The DSP restricts access to covered data by “countries of concern” (China, including Hong Kong and Macau; Russia; Iran; North Korea; Cuba; and Venezuela) identified for their perceived long-term pattern or serious instances of conduct significantly adverse to the United States. Additionally, the DSP also encompasses access by “covered persons,” meaning: (1) foreign entities headquartered in or organized under the laws of a country of concern; (2) foreign entities 50% or more owned by a country of concern or covered person; (3) foreign individuals primarily resident in a country of concern; and (4) foreign individuals who are employees or contractors of a covered person entity or a country-of-concern government. The DOJ can designate, at any time, a “covered person.” Big Consequences for Regulated Transactions If a company handles data covered by the DSP and employs or otherwise has relationships with countries of concern or covered individuals, the DSP will restrict, or completely prohibit, certain categories of transactions. The DSP restricts transactions that involve a vendor agreement, employment agreement, or investment agreement with a country of concern or covered person. Restricted transactions are subject to strict “Security Requirements” established by the Cybersecurity and Infrastructure Security Agency and essentially mandate companies to “fully and effectively prevent access to covered data” through data minimization and masking, encryption, and privacy-enhancing technologies. The final Rule includes a few examples of restricted transactions, including a U.S. wealth-management services company that collects bulk personal financial data on U.S. clients and decides to appoint an individual from a country of concern that resides in the country of concern to the company’s board. Because the company allows board members access to bulk personal financial data in connection with data security and cybersecurity responsibilities that the board handles, the appointment of the director is a restricted employment agreement. In contrast, a U.S. institution that conducts medical research at its own laboratory in a country of concern and sends a U.S. citizen-employee to assist with the research does not engage in a covered transaction because no data is being accessed by a covered person or government. Prohibited transactions include data brokerage transactions with a country of concern or covered person, or any foreign person unless certain contractual requirements are in place. Data brokerage is defined as the selling, licensing or other sharing of covered data. The DSP also prohibits any data transaction involving access to human `omic data (human genomic, epigenomic, proteomic, and transcriptomic data) or to human biospecimens from which `omic data could be derived. Additionally, transactions with the purpose of evading or avoiding or causing a violation, or U.S persons knowingly directing a prohibited or restricted transaction are prohibited under the DSP. Some examples of prohibited transactions include a U.S. organization that maintains a database of bulk U.S. sensitive personal data and offers annual memberships (including to covered persons) for a fee so that members receive a license to access the data, or a U.S. company that owns a mobile app containing tracking pixels knowingly installed into the app and those pixels transfer bulk U.S. sensitive data of U.S. users to a covered person-owned social media app for targeted advertising. Additionally, a U.S tech company that operates an autonomous driving platform that collects the precise geolocation data of its cars operating in the U.S. and then sells this data to its parent company headquartered in a country of concern to help develop other technological advances is prohibited under the DSP. The DSP threatens penalties up to the amounts provided for under the International Emergency Economic Powers Act(IEEPA). As for civil penalties, the IEEPA’s amounts are subject to adjustment pursuant to the Federal Civil Penalties Inflation Adjustment Act of 1990, so the DSP today provides for maximum civil penalties of $377,700 (based on a statutory amount of $250,000 established in 2007 that is subject to inflation adjustments) or an amount that is twice the amount of the transaction at issue, whichever is greater. For criminal liability for willful conduct, violators of the DSP may face imprisonment of up to 20 years and a $1,000,000 fine. The Final Rule took into consideration that DOJ’s approach to criminal violations should be consistent with criminal penalties under the IEEPA. Reading Between the Lines of the Exemptions and Exclusions Exemptions and exclusions to the DSP’s prohibitions exist, but the general categories of exempt transactions in the Rule actually are limited by the details. Personal communications, informational materials, and travel information, are classified by the IEEPA as exempt transactions, but the U.S. Department of the Treasury Office of Foreign Assets Control (“OFAC”) is known to interpret these exemptions narrowly. The DOJ is expected to follow in OFAC’s footsteps. The DSP also includes broad categories of “financial services” and “corporate group transactions,” but restrictions limit the exemptions. Financial services are limited to transactions “ordinarily incident to and part of the provision of financial services,” such as banking, capital-markets, or financial-insurance services, or the transfer of personal financial data or covered personal identifiers incidental to the purchase and sale of goods and services. Similarly, “corporate group transactions” are limited to data transactions that are “[b]etween a U.S. person and its subsidiary or affiliate located in (or otherwise subject to the ownership, direction, jurisdiction, or control of) a country of concern” and “[o]rdinarily incident to and part of administrative or ancillary business operations.” Similarly, telecommunications services are exempted but limited to data transactions “ordinarily incident to and part of the provision of telecommunication services.” The DSP warns that a U.S. telecommunications service provider that collects precise geolocation data on its U.S. subscribers that then sells the data to a covered person for the purpose of targeted advertising is not exempt from the DSP since the sale is “not ordinarily incident to and part of the provision of telecommunications services.” DOJ’s Great Expectations for DSP Regulated Companies The DSP imposes a number of requirements on companies that engage in restricted and prohibited transactions, including recordkeeping, reporting, audit, and due diligence requirements, as well as implementation of a formal compliance program tailored to the entity’s risk profile. The latest Compliance Guidance clarifies that companies engaged in restricted transactions must implement a written “Data Compliance Program” that meets several minimum requirements to comply with the DSP. Failure to maintain such a program may constitute a DSP violation in itself. In general, the DOJ will look for a risk-based compliance program that includes procedures for verifying data flows involved in restricted transactions, such that a company may want to complete ongoing risk assessments to determine coverage of the DSP against the company’s current data holdings and vendor, employee, or investment agreements, as well as examine the company’s current security measures, offered products and services, and geographic locations of its third party relationships. The Guidance further explains that a company’s Data Compliance Program is expected to include policies and procedures that will “identify, escalate, and report activity,” including for bringing newly acquired entities into compliance with the Program. Throughout finalization of the DSP, the DOJ declined to allow for contractual language or consent to share data to eliminate the requirement of a formalized Data Compliance Program. DOJ Gives the Gift of (Limited) Time The DOJ has given companies an extra 90 days, until July 8, 2025, to avoid civil enforcement in recognition that individuals and companies “may need to take steps to determine whether the DSP’s prohibitions and restrictions apply” and “to implement changes.” The 90-day enforcement hiatus, however, is limited since the DOJ still plans to pursue criminal enforcement and civil enforcement is paused “so long as the person is engaging in good faith efforts to comply” during that time. Accordingly, the DOJ has made clear that now is the time to come into compliance with the DSP, and starting July 8, enforcement is coming. The Implementation and Enforcement Policy provides instructive examples of “good-faith efforts” the Department expects of companies during the “pause.” Such efforts, some of which may be costly and time consuming, include transferring products and services to new vendors, conducting internal review of access to covered data, adjusting employees’ work locations and their roles or responsibilities to prevent their access to covered data, evaluating investments from and renegotiating investment agreements with countries of concern or covered persons, as well as implementing the strict Security Requirements. The July 8 date is fast approaching, and promptly implementing good faith efforts to comply with the DSP will be critical to avoid the serious penalties and reputational harm DSP violations can bring. To read more from Robert Anello , please visit www.maglaw.com . Emily Smit , an associate at the firm, assisted in the preparation of this blog. Source: https://www.forbes.com/sites/insider/2025/05/07/clock-is-ticking-for-companies-to-comply-with-complex-data-transfer-rule/
You may also like

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.

Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.

OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.

The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.

From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.

The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.

Cursor "Shell" Kimi Controversy Reversed: From Copyright Infringement Allegations to Authorized Collaboration, China's Open Source Model Once Again Becomes a Global AI Foundation
Cursor was accused of being based on Kimi K2.5, which sparked controversy, and was later confirmed to be compliant through Fireworks AI due diligence.

The Real Reason Tokens Don't Sell: 90% of Crypto Projects Overlook Investor Relations
Provide an Investor Relations Best Practices Guide for Crypto Projects.

Is the income of pump.fun real, earning a million dollars a day despite the market downturn?
If it can really earn this much, what is the reason for the low price of $PUMP?

The real reason why tokens are not selling: 90% of crypto projects neglect investor relations
Investor Relations Practice Guide for Cryptocurrency Projects.

Who is the true winner of the "Tokenization" narrative?
Virtually everyone benefits, but the reason for the benefit, the timing, and the underlying logic are completely different.

Moss: The Era of AI-Traded by Anyone | Project Introduction
AI Trading Agent is rapidly growing its infrastructure.

Chip Smuggling Case Exposes Regulatory Loophole | Rewire News Evening Update
AI chips have become a strategic asset more sensitive than missiles

How a Structured AI Crypto Trading Bot Won at the WEEX Hackathon
Ritmex demonstrates how disciplined risk control and structured signals can make an AI crypto trading bot more stable and reliable on WEEX, highlighting the importance of combining execution discipline with scalable AI trading systems.

Old Indicator Fails, Three Major New Signals Emerge: BTC True Bottom May Still Be Below $60K
When the grocery shopping auntie on the subway, or Tony the hairdresser, start asking you about BTC, crypto, and cryptocurrency investments, selling immediately will be the only best option.

Meeting OpenClaw Founder at a Hackathon: What Else Can Lobsters Do?
Imperial College London MetaGame: AI Agent × Web3 Landing Three Major Directions.

Huang Renxun's Latest Podcast Transcript: NVIDIA's Future, Embodied Intelligence and Agent Development, Soaring Demand for Inferencing, and AI's PR Crisis
The future of competition is not only about whose model is bigger, whose computing power is stronger, but also about who understands the industry better, who can more deeply integrate AI into real processes, and who can organize these capabilities into a set of executable, scalable systems
How a Structured AI Crypto Trading Bot Won at the WEEX Hackathon
Crypto_Trade shows how structured inputs and controlled adaptability can build a more stable and reliable AI crypto trading bot within the WEEX AI Trading Hackathon, highlighting a practical path toward scalable AI trading systems.
Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.
Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.
OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.
The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.
From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.
The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.