Skip to main content
← All controls
Articles 44-50 / ISO/IEC 27701:2019 - 7.2.8 / A.18.2.1 GDPR (Regulation EU 2016/679)

Cross-border transfers via SCCs / adequacy

Demonstrate that all cross-border personal data transfers are protected by valid legal mechanisms (adequacy decisions or properly executed SCCs) and that supplementary measures are implemented where transfer risks exist.

Description

What this control does

This control ensures that personal data transferred outside the European Economic Area (EEA) or other jurisdictions with strict data protection laws is protected through legally recognized mechanisms. Organizations must rely on European Commission adequacy decisions (recognizing equivalent protection in destination countries) or implement Standard Contractual Clauses (SCCs) — legally binding contracts between data exporters and importers. When adequacy does not exist, SCCs impose specific obligations on recipients and grant enforceable rights to data subjects, ensuring GDPR-level protection persists across borders.

Control objective

What auditing this proves

Demonstrate that all cross-border personal data transfers are protected by valid legal mechanisms (adequacy decisions or properly executed SCCs) and that supplementary measures are implemented where transfer risks exist.

Associated risks

Risks this control addresses

  • Unauthorized access to personal data by foreign governments lacking adequate legal protections or due process safeguards
  • Legal liability and regulatory fines (up to 4% of global revenue under GDPR Article 44) for unlawful cross-border data transfers
  • Data subjects unable to enforce rights or obtain remedies when their data is transferred to jurisdictions without enforceable protections
  • Transfer of data to processors or sub-processors in non-adequate countries without contractual safeguards, creating accountability gaps
  • Invalidation of transfer mechanisms (as occurred with Privacy Shield in Schrems II) without detection or remediation, continuing unlawful transfers
  • Inadequate supplementary measures (encryption, access controls) failing to mitigate risks identified in transfer impact assessments
  • Reputational damage and loss of customer trust when cross-border data mishandling becomes public

Testing procedure

How an auditor verifies this control

  1. Obtain and review the data transfer inventory documenting all cross-border personal data flows, including source, destination country, data categories, recipients, and legal transfer mechanism claimed
  2. Verify that each destination country is either covered by a current European Commission adequacy decision or has SCCs or other appropriate safeguards in place
  3. Select a sample of 10-15 cross-border transfers and retrieve the executed SCC documents, verifying signatures, effective dates, correct SCC module selection (C2C, C2P, P2P, P2C), and inclusion of mandatory annexes
  4. Review transfer impact assessments (TIAs) for transfers to countries without adequacy, confirming documentation of local laws, government access risks, and supplementary measures implemented
  5. Examine evidence of supplementary technical and organizational measures applied to high-risk transfers, such as encryption in transit and at rest, access logging, data minimization, and contractual audit rights
  6. Validate that data processing agreements with third-party vendors explicitly address sub-processor locations and require prior notification or consent for new cross-border transfers
  7. Interview privacy or legal personnel to confirm monitoring processes for adequacy decision changes, SCC updates (e.g., transition from old to new SCCs), and geopolitical developments affecting transfer legality
  8. Test a sample data subject access request (DSAR) response to confirm transparent disclosure of cross-border transfer details, recipient countries, and safeguards as required by GDPR Article 13/14
Evidence required Collect the complete data transfer inventory with legal basis mappings, executed SCC agreements with annexes and signatures, transfer impact assessment reports documenting risk analysis and supplementary measures, data processing agreements with sub-processor clauses, internal policies governing cross-border transfer approval workflows, records of SCC implementation reviews or legal opinion memos, and sample DSAR responses disclosing transfer information to data subjects.
Pass criteria All identified cross-border personal data transfers are documented, protected by current adequacy decisions or properly executed SCCs with required annexes, supported by transfer impact assessments where applicable, and supplemented with technical/organizational measures proportionate to identified risks.

Where this control is tested

Audit programs including this control