← Back to blog
Primer

1 April 2026 · 9 min read

Cross-border data compliance: a primer on the doctrine of essential equivalence

The international transfer of personal data sits at the intersection of three distinct legal regimes: the data protection law of the exporting jurisdiction, the data protection law of the importing jurisdiction, and the public surveillance framework of the destination state. The literature on cross-border data governance, particularly following the Court of Justice of the European Union's decisions in Schrems I (C-362/14) and Schrems II (C-311/18), has converged on a single organising principle: personal data, once exported, must continue to enjoy a level of protection essentially equivalent to that guaranteed in the originating jurisdiction.

This principle now structures how 137 sovereign jurisdictions assess one another's protective frameworks. It is also the principle around which most institutional compliance work is organised.

The architecture of cross-border data law

Most contemporary data protection statutes — the European Union General Data Protection Regulation (GDPR), Singapore's Personal Data Protection Act (PDPA), Brazil's Lei Geral de Proteção de Dados (LGPD), the People's Republic of China's Personal Information Protection Law (PIPL), and others — share a common structural pattern. Each restricts the export of personal data to jurisdictions that do not provide protection comparable to the home regime, and then enumerates derogations: a recognised adequacy decision, an approved contractual instrument, internal corporate rules vetted by a supervisory authority, or, on a strictly construed basis, the data subject's specific consent.

The lineage of this architecture traces to Article 25 of the now-superseded Data Protection Directive 95/46/EC, and earlier still to Convention 108 of the Council of Europe (1981). What has changed is not the conceptual framework but its enforcement intensity, its global diffusion — what Anu Bradford has termed the "Brussels Effect" — and the consequences of failure.

The doctrine of essential equivalence

In Schrems I, the Court invalidated the European Commission's Safe Harbour adequacy decision concerning the United States. In Schrems II, decided 16 July 2020, the Court invalidated its successor, the EU-US Privacy Shield. Both decisions turned on the same finding: that surveillance authorities in the United States, operating principally under Section 702 of the Foreign Intelligence Surveillance Act and Executive Order 12333, possessed access to transferred personal data in a manner not "essentially equivalent" to the protections required by Article 47 of the Charter of Fundamental Rights of the European Union.

The practical effect of Schrems II is that the legal mechanism authorising a transfer — most often Standard Contractual Clauses adopted under Article 46(2)(c) of the GDPR — is necessary but not sufficient. The exporting controller must additionally assess, on a case-by-case basis, whether the law of the destination jurisdiction undermines the contractual safeguards in operation. Where it does, supplementary technical, organisational, or contractual measures must be applied; where the supplementation cannot be made adequate, the transfer must be suspended.

The European Data Protection Board's Recommendations 01/2020 on Measures Supplementing Transfer Tools set out the canonical methodology. The exercise has come to be known as a Transfer Impact Assessment, and a documented Transfer Impact Assessment is now expected of any controller whose transfers are not covered by an in-force adequacy decision.

Three regimes operating in parallel

Three structural features of the contemporary landscape complicate this architecture in ways that summary treatments rarely capture.

The proliferation of data protection law has produced overlapping rather than harmonised regimes. An institution operating in eight jurisdictions does not face one composite obligation but eight distinct ones, each with its own definitions, lawful bases, transfer mechanisms, retention rules, and supervisory authorities. China's PIPL requires a separate security assessment for transfers of "important data" or for transfers exceeding statutory volume thresholds. India's Digital Personal Data Protection Act 2023 anticipates localisation rules to be specified by future executive notification. Indonesia's Personal Data Protection Law (Law No. 27/2022) borrows GDPR concepts but applies them through an entirely separate enforcement apparatus.

Extraterritorial public-law claims now intersect with private-law data protection in load-bearing ways. The United States CLOUD Act 2018, recently complemented by the Department of Justice's Data Security Programme of October 2025, asserts jurisdiction over data held by United States providers regardless of physical location. Provisions of the European Union Digital Operational Resilience Act and the German Bundesdatenschutzgesetz contemplate corresponding restrictions on data accessibility from foreign jurisdictions. The structural friction between these regimes does not have a stable equilibrium.

Regulatory enforcement has matured. European data protection authorities collectively imposed approximately 2.3 billion euros in fines during 2025, a 38 per cent year-on-year increase, with cross-border violations a meaningful share of the total. The Irish Data Protection Commission's TikTok decision (September 2025) addressed transfers to the People's Republic of China; the European Data Protection Supervisor's standing direction concerning transfers to India produced operational consequences for several pan-European institutions.

Why compliance has become operationally non-trivial

The conceptual framework of cross-border compliance is not new. What is new is the operational burden of implementing it at the scale of contemporary information technology.

A medium-sized enterprise may operate a hundred or more software-as-a-service relationships, each potentially generating cross-border flows. Each of those vendors may employ sub-processors in further jurisdictions, producing transitive transfers that the enterprise neither initiated nor directly controls. Sub-processor lists change. Standard Contractual Clauses age out. Adequacy decisions are vacated. Surveillance laws are amended. Transfer Impact Assessments require update.

The cumulative effect is that compliance is no longer a state but a process — a continuous reconciliation between an institution's actual data flows and the legal instruments authorising them. This shift, from is the paperwork in order to are the data flows consistent with the paperwork, is the substantive change in cross-border compliance practice over the last five years. The compliance failures most commonly observed in supervisory enforcement are not the spectacular ones reported in the legal press. They are the mundane ones: an integration added in 2023 that began routing data through a sub-processor in a non-adequate jurisdiction; an SCC executed but never updated to the 2021 templates; a Transfer Impact Assessment completed but not refreshed when surveillance reform was enacted in the destination state.

Practical implications for institutions

For data protection officers, general counsel, and chief technology officers, three implications follow.

The first is that data flow visibility is foundational. An institution cannot demonstrate compliance with a regime it has not fully mapped, and the mapping cannot be a one-time exercise; it must be maintained as part of normal change management.

The second is that the locus of risk has shifted from contractual to operational. Holding the right paper is necessary; demonstrating that the paper governs an actual, continuing data flow is what supervisory authorities now expect.

The third is that compliance and architecture are co-determined. Decisions about cloud provider, software stack, vendor selection, and product design carry compliance consequences that should be evaluated at the point of decision, not retrospectively.

The doctrinal foundations of cross-border data law are mature. The institutional practice of operating within them, at scale and across jurisdictions, is not.

Map your cross-border data flows with sovre.

Request access →