
Next Move: Practical insights on regulatory and policy developments in tech
Next Move discusses the latest regulatory and technology policy developments and how risk leaders can react. Read the latest issue on bulk data transfers.
US restrictions on bulk transfers of sensitive data to foreign “countries of concern” will soon take effect. Beginning April 8, 2025, multinationals around the world will have to comply with a Department of Justice (DOJ) rule that prohibits certain transactions outright and permits others only if they meet security requirements or fall below specified bulk data thresholds.
The DOJ rule aims to eliminate “front door” access by foreign rivals to bulk sensitive personal data on US persons, as well as certain US government-related data. It complements existing defenses against illegal data-gathering schemes by preventing bad actors from accessing the same data through legitimate business transactions.
The rule differs from most data-protection regulations, meaning it will require new compliance strategies. Its low thresholds, unique definitions and strict compliance requirements may push US multinationals to adopt holistic data inventories like those already used in Europe and China. Affected companies need to understand their exposure, including knowing where their sensitive data is located, where it’s going and who has access to it.
For many organizations, this new rule means adding three initiatives to their 2025 agendas: holistic data inventories, global business-process change management and implementing new security requirements.
The DOJ rule implements a Biden-era executive order, EO 14117, the first directive of its kind to address risks stemming from the commercial sale or transfer of sensitive US data to certain foreign entities and their affiliates. Taken together, the EO and its implementing rule seek to strengthen privacy protections and protect national security by setting strict limits and oversight mechanisms on the collection, processing and cross-border transfer of bulk sensitive data. The data in question includes sensitive personal information about US individuals — health, financial, geolocation, biometric and genomic data — as well as government-related data.
The goal is to counter the economic espionage efforts of “countries of concern” — China, Russia, Iran, North Korea, Cuba and Venezuela.
Affected entities and transactions. The DOJ rule applies to entities that are based in or controlled by a country of concern, or that are controlled by a person who’s a resident, employee or contractor of such a country. It also applies to individuals who are a resident, employee or contractor of such a country.
Given the vastness of trade relations between the US and China, businesses would do well to consider their Chinese/Hong Kong owned or based suppliers, as well as suppliers employing Chinese/Hong Kong personnel for certain business processes subject to the rule. The DOJ conducted extensive analysis of the US population to identify those most vulnerable to foreign espionage efforts. At the top of the list are those associated with “covered data transactions” (defined in §202.210) that are also accessible by “covered persons” (defined in §202.211).
For affected entities, the rule prohibits certain data transfers outright and permits others only if they meet certain security requirements.
Bulk personal data and thresholds. The term “bulk US sensitive personal data” means a collection of sensitive personal data relating to US persons, in any format, regardless of whether it’s anonymized, de-identified or encrypted, where the data exceeds certain thresholds at any point in the preceding 12 months.
Data type |
Threshold |
Human genomic data | 100 US persons |
Human epigenomic, proteomic and transcriptomic data | 1,000 US persons |
Biometric identifiers | 1,000 US persons |
Precise geolocation data | 1,000 US devices |
Personal health and personal financial data | 10,000 US persons |
Covered personal identifiers | 100,000 US persons |
Exempted transactions. The rule exempts certain transactions (described in Subpart E) considered lower risk, allowing multinational corporations to maintain operations within countries of concern provided they implement stringent security controls to limit access to sensitive data. Exempt transactions include:
Compliance deadlines. Covered entities need to be aware of two key dates.
Note, however, that the Trump administration has imposed a blanket freeze on all pending regulations ― including this one ― to allow it time to review and potentially reconsider them. While this creates some uncertainty for the DOJ rule, the rule’s objectives align generally with the Trump administration’s posture toward China. Moreover, the fact that new administration hasn’t rescinded the underlying EO, like so many other Biden-era directives, is an indication of that alignment.
Enforcement and penalties. The DOJ has broad powers to enforce the rule (described in Subpart M), including through audits as well as civil and criminal enforcement. It can impose civil penalties for violations up to the greater of $368,136 or twice the value of the unlawful transaction. In cases of willful violations, criminal penalties can be severe, including a fine of up to $1 million, imprisonment for up to 20 years, or both.
Sectors most impacted. We evaluated the types of businesses with operations that typically match the footprint outlined in the decision-tree above and ― given the unique importance of the Chinese market ― identified the top 10 outbound US-to-China and China-to-US sectors likely to experience significant compliance challenges.
US-based companies doing business in China |
China-based companies doing business in the US |
Technology, media and telecommunications: Cloud computing and AI | Technology, media and telecommunications: Hardware |
Industrial products: Semiconductors | Technology, media and telecommunications: Social media |
Health industries: Pharmaceuticals and life sciences | Technology, media and telecommunications: Cloud computing and AI |
Financial services: Payment processors | Health industries: Pharmaceuticals and life sciences |
Industrial products: Automotive | Consumer markets: Retail and e-commerce |
Technology, media and telecommunications: Consumer platforms | Industrial products: Automotive |
Consumer markets: Retail and e-commerce | Industrial products: Semiconductors |
Technology, media and telecommunications: Cybersecurity | Financial services: Payment processors |
Not-for-profit: Education and research institutions | Industrial products: Smart home and IoT devices |
Industrial products: Logistics and supply chain | Consumer markets: Entertainment and gaming |
The rule isn’t your typical data-protection regulation by any measure, so coming into compliance will require new thinking. The DOJ is a law enforcement authority, not a data privacy regulator, with a broader mandate and more resources. The rule contains several unique definitions and lower thresholds, and it addresses hard-to-find data transactions involving a small array of very different target countries.
Compliance can be a heavy lift for some organizations. A typical compliance journey can look like the following:
Readiness assessment (ASAP) |
Remediation (April – October 2025) |
Ongoing (2026+) |
|
Objective | Determine the size of the problem | Address requirements for prohibited and restricted transactions | Maintain compliance through greenfield processes |
Deliverables & outcomes | EO 14117 readiness assessment | Prohibited transactions: business-process change Restricted transactions: compliance measures |
EO 14117 data inventory capability Enhanced third-party risk-management due diligence EO 14117 reporting capabilities Annual CISA audits |
Key activities |
Identify and prioritize impacted business processes Identify systems and vendors within high-impact processes Classify and quantify data transactions relative to EO thresholds Classify transactions into "likely prohibited" and "likely restricted" Estimate remediation activities by business process and system Communicate draft remediation plan to stakeholders Review CISA mandated security and data controls |
Conduct risk assessment as required by CISA Develop and present a consolidated funding request Establish project management office and cross-functional task force Establish change-management plan Prohibited transactions workstream: coordinate LOB data localization and business-process change Restricted transactions workstream: establish initial CISA audits and reports; coordinate LOB security remediation Data inventory workstream: establish requirements for ongoing capability |
Synchronize EO 14117 data-inventory requirements with existing GDPR and PIPL requirements and capabilities and make necessary tool changes or enhancements Provide requirements to the TPRM process and coordinate their implementation Assign reporting and audit responsibilities and include EO 14117 in the 2026 audit plan |
How can companies fulfill their compliance obligations without over-allocating resources and “boiling the ocean?” We recommend taking these steps.
Next Move discusses the latest regulatory and technology policy developments and how risk leaders can react. Read the latest issue on bulk data transfers.
Facing a wave of regulations globally, the tech sector's largely ad hoc approach to compliance is no longer viable. Learn how companies can adapt.
Protect your organization from data risks with these five key steps. Stay ahead of the threat landscape and safeguard your business with expert strategies.
Technology risk is a term describing the many vulnerabilities associated with an organization’s information technology (IT), operational technology (OT) and communications technology (CT). A central problem of such risks is that they are so all-encompassing they go unnoticed. Hiding in plain sight, their sheer scale,...