Regulations

Transfer Impact Assessment (TIA): Step-by-Step Template 2026

·10 min read

Since the Schrems II ruling invalidated the EU-US Privacy Shield, every organization transferring personal data outside the EU/EEA using Standard Contractual Clauses (SCCs) must conduct a Transfer Impact Assessment (TIA). This guide provides a practical, step-by-step template you can follow immediately.

What Is a Transfer Impact Assessment?

A TIA evaluates whether the legal framework of the destination country provides "essentially equivalent" protection to EU law. It's required by the EDPB's post-Schrems II recommendations (Recommendations 01/2020) and is a condition for valid SCCs.

Without a documented TIA, your SCCs are not valid, and the transfer is unlawful.

When You Need a TIA

  • Using SCCs (Standard Contractual Clauses) for data transfers
  • Relying on Binding Corporate Rules (BCRs)
  • Using Article 49 derogations for non-occasional transfers
  • Transferring to a country without an EU adequacy decision

When you don't need a TIA: Transfers to countries with an EU adequacy decision (UK, Japan, South Korea, Canada for PIPEDA-covered entities, Israel, Switzerland, etc.) or transfers to US companies certified under the EU-US Data Privacy Framework.

6-Step TIA Template

Step 1: Map the Transfer

Document the specifics of your data transfer:

ElementDocument
Data exporterYour organization name, role (controller/processor)
Data importerRecipient name, country, role
Categories of dataWhat personal data is transferred
Categories of data subjectsCustomers, employees, prospects, etc.
Purpose of transferWhy the data is sent
Transfer mechanismSCCs, BCRs, or derogation
Onward transfersDoes the importer transfer data further?

Step 2: Identify the Transfer Mechanism

Confirm which GDPR Article 46 mechanism you're using:

  • New SCCs (June 2021): The European Commission's standard contractual clauses. Make sure you're using the current version — old SCCs expired in December 2022.
  • BCRs: For intra-group transfers within multinational organizations. Require DPA approval.
  • Codes of Conduct / Certifications: Sector-specific approved mechanisms.

Step 3: Assess Third-Country Laws

This is the core of the TIA. Evaluate whether the destination country's laws undermine the protections in your SCCs:

  • Government surveillance laws: Can authorities compel the importer to disclose data? Under what conditions?
  • Access without judicial oversight: Can intelligence agencies access data without a court order?
  • Bulk collection: Does the country engage in mass/indiscriminate surveillance?
  • Effective remedies: Can EU data subjects challenge government access in that country's courts?
  • Independent oversight: Is there an independent authority supervising government surveillance?

For US transfers: assess FISA 702, Executive Order 12333, and the protections introduced by Executive Order 14086 (which underpins the EU-US DPF).

Step 4: Evaluate Whether Protections Are Essentially Equivalent

Compare the third-country framework against EU standards. Consider:

  • Is government access limited to what is necessary and proportionate?
  • Are there clear, precise, and accessible rules governing access?
  • Is independent oversight effective and functioning?
  • Are effective legal remedies available to EU data subjects?

If protections are not equivalent: You must identify supplementary measures (Step 5) or suspend the transfer.

Step 5: Implement Supplementary Measures

If the legal assessment reveals gaps, consider these supplementary measures:

TypeMeasureEffectiveness
TechnicalEnd-to-end encryption (where importer has no key)Strong
TechnicalPseudonymization before transferStrong
TechnicalSplit processing (no single party has full data)Strong
ContractualTransparency reporting obligationsModerate
ContractualImporter commits to challenge government requestsModerate
ContractualWarrant canary clausesLimited
OrganizationalStrict access controls and audit rightsModerate
OrganizationalInternal policies to resist unlawful requestsLimited

Important: If the importer needs to access data in the clear (e.g., a SaaS provider processing data), encryption alone won't prevent government access. You may need additional contractual and organizational measures — or consider EU-based alternatives.

Step 6: Document, Review, and Monitor

  • Document your entire assessment in writing
  • Include the analysis, conclusions, and supplementary measures
  • Set a review date (at least annually)
  • Monitor legislative changes in the destination country
  • Be prepared to suspend transfers if circumstances change
  • Keep the TIA available for your supervisory authority

Quick Reference: Common Transfer Destinations

CountryTIA Required?Key Consideration
US (DPF-certified)NoAdequacy decision covers
US (non-DPF)YesFISA 702, EO 14086 remedies
UKNoAdequacy (review due 2025)
IndiaYesNew DPDPA; government access breadth
ChinaYesBroad government access; localization requirements
AustraliaYesEncryption access laws (TOLA Act)
BrazilYesLGPD provides moderate protection
JapanNoAdequacy decision

Next Steps

Start by identifying all your cross-border data transfers. PrivacyChecker detects third-party services loading on your website that transfer data internationally — including analytics, CDNs, fonts, and embedded content. Run a free scan to map your data flows.

Check your website now — free

Run a complete privacy audit in under 60 seconds. Get your score, find issues, and learn how to fix them.

Start Free Audit