Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsEnterprise Services

Analyzing the draft standard contractual clauses

Once finalized, US entities can use the new Standard Contractual Clauses to legally transfer data out of the EEA when combined with appropriate supplementary measures.

By David M. Stauss
data-enews
December 1, 2020

As discussed in our prior post, on November 12, 2020, the European Commission published a draft implementing decision on standard contractual clauses (SCCs) for the transfer of personal data to third countries and draft standard contractual clauses. Once finalized, the SCCs will replace the existing SCCs for data transfers out of the EEA.

As explained in the implementing decision, the SCCs “needed to be updated in light of new requirements in” GDPR. The SCCs also needed to be updated to consider “important developments . . . in the digital economy, with the widespread use of new and more complex processing operations often involving multiple data importers and exporters, long and complex processing chains as well as evolving business relationships.” The draft SCCs are also heavily influenced by the CJEU’s Schrems II decision.

The implementing decision and draft SCCs are open for public feedback until December 10, 2020. The European Commission presented the draft SCCs to the European Data Protection Board (EDPB) at the EDPB’s 42nd plenary session and requested a joint opinion from the EDPB and the European Data Protection Supervisor. For reference, the EDPB’s recommendations on draft supplementary measures was discussed in this article..

Once finalized, there will be a one-year implementation period in which entities can continue to rely on the existing SCCs for contracts entered into prior to the new SCCs going in effect, provided that the contract remains unchanged. However, the parties to the contract still must institute supplementary measures to allow for appropriate safeguards in light of the Schrems II judgment.

A discussion of some of the relevant takeaways from the draft SCCs follows:

Module Format

The draft SCCs follow a four-module format: (1) controller to controller transfer; (2) controller to processor transfer; (3) processor to processor transfer; and (4) processor to controller transfer. The parties to the contract will need to modify the SCCs to reflect their relationship. For example, there are four different options for Section II, Clause 1 (Data Protection Safeguards) based on which of the four modules applies.

Relationship with Article 28

Paragraph 9 of the implementing decision explains that the draft SCCs “should also allow [the parties] to fulfil the requirements of Article 28(3) and (4) of” GDPR. Because the existing SCCs were issued prior to GDPR, it is customary for parties to enter into a separate data processing agreement (DPA) to address the Article 28 requirements. By integrating the Article 28 requirements into the draft SCCs, the European Commission has obviated the need to separately address them in a DPA. (The European Commission also issued a draft implementing decision and standard contractual clauses for processors and controllers in the EEA that complies with Article 28.)

However, this does not mean that the parties will not otherwise want or need to enter into a DPA. For example, to the extent applicable, DPAs will still be needed to address the parties’ obligations for data not subject to GDPR. In the United States, this will include data subject to the California Consumer Privacy Act and, as of January 2023, the California Privacy Rights Act (CPRA). In particular, sections 1798.100(d), 1798.140(j), and 1798.140(ag) of the CPRA will significantly expand the contractual requirements when transferring data to another entity.

Parties also will likely want to augment the draft SCCs’ liability provisions. Section II, Clause 7 (modules two and three) provides that “[e]ach party shall be liable to the other Party/ies for any material or non-material damages it causes the other Party/ies by any breach of these Clauses.” It is foreseeable that entities will want to reach further agreement on items such as the amount of cybersecurity insurance and contractual obligations for processors to defend and indemnify controllers for the costs of providing notice to data subjects and for defending and indemnifying controllers for losses and fines caused by a processor’s data breach.

Additionally, although the draft SCCs address a number of topics dealing with Schrems II (see below discussion), the EDPB’s recommendations suggest the use of additional contractual measures. (See our prior article for a discussion of those contractual measures.)

The European Commission certainly anticipates parties supplementing the SCCs with other agreements. Section I, Clause 1 provides that the SCCs do “not prevent the Parties from including the standard contractual clauses laid down in this [sic] Clauses in a wider contract, and to add other clauses or additional safeguards provided that they do not contradict, directly or indirectly, the standard contractual clauses or prejudice the fundamental rights or freedoms of data subjects.” Further, Clause 4 (Hierarchy) provides that the SCCs will prevail over any other agreement with a conflicting provision.

Schrems II Provisions

Unsurprisingly, the drafts SCCs contain a number of provisions directed at addressing the issues identified in Schrems II.

Transfer Impact Assessments

The SCCs reinforce the Schrems II court’s requirement and subsequent EDPB guidance that parties need to engage in transfer impact assessments. Section II, Clause 2 requires the parties to warrant that they have “no reason to believe that the laws in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses.”

Further, the parties are required to document and make available to the competent supervisory authority an assessment addressing:

(i) the specific circumstances of the transfer, including the content and duration of the contract; the scale and regularity of transfers; the length of the processing chain, the number of actors involved and the transmission channels used; the type of recipient; the purpose of processing; the nature of the personal data transferred; any relevant practical experience with prior instances, or the absence of requests for disclosure from public authorities received by the data importer for the type of data transferred;

(ii) the laws of the third country of destination relevant in light of the circumstances of the transfer, including those requiring to disclose data to public authorities or authorising access by such authorities, as well as the applicable limitations and safeguards;

(iii) any safeguards in addition to those under these Clauses, including the technical and organisational measures applied during transmission and to the processing of the personal data in the country of destination.

The draft SCCs reinforce that the data importer has a significant role in this process and must warrant that “it has made best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with the data exporter in ensuring compliance with these Clauses.”

This requirement echoes steps 3 and 4 of the EDPB’s supplementary measures recommendations. However, as IAPP Chief Knowledge Officer Omer Tene recently pointed out, the European Commission and EDPB’s approaches may differ in important respects.

For US entities, a primary focus of the transfer impact assessment will be the applicability of FISA 702 – a central focus of the Schrems II decision.

Government Access Requests

Section II, Clause 3 identifies the obligations of the data importer if it receives a government access request. Those obligations include notifying the data importer, if legally possible, and providing relevant information regarding the request; reviewing the legality of the request and objecting to it if there are lawful grounds to do so; and providing the minimum amount of information permissible when responding to a request.

Section I, Clause 2 provides data subjects with third party beneficiary rights to enforce those requirements. Further, Section II, Clause 7 provides that (depending on the specific module) one or both of the parties “shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer causes the data subject for any breach of the third party beneficiary rights under these Clauses.”

In a November 19, 2020 blog post, Microsoft announced that it would immediately implement comparable assurances.

Supplementary Measures

Notwithstanding the above, the draft SCCs do not identify specific supplementary measures that entities should implement. The EDPB’s recommendations will need to be consulted for such guidance. However, the draft SCCs provide a logical place for documenting the technical supplementary measures in Annex II.

Other Provisions

Finally, the draft SCCs contain provisions on the use of sub-processors for the controller to processor or processor to processor modules; data subject rights; redress; indemnification; supervision; non-compliance with the clauses and termination; governing law; and choice of forum.

KEYWORDS: cyber security data security European Commission

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David stauss

David Stauss is a partner at Husch Blackwell LLP and co-leader of the firm’s privacy and data security practice group. David regularly assists clients in preparing for and responding to data security incidents, including managing multi-state breach notifications. He also regularly counsels clients on complying with existing and emerging privacy and information security laws, including the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act of 2018 (CCPA) and state information security statutes. To stay up to date on these issues, subscribe to Husch Blackwell’s privacy blog. Stauss can be reached at david.stauss@huschblackwell.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    Analyzing the EDPB’s draft recommendations on supplementary measures

    See More
  • technology-data freepik

    European Commission adopts new standard contractual clauses

    See More
  • SEC0719-Privacy-Feat-slide1_900px

    CJEU invalidates EU-U.S. Privacy Shield; Upholds standard contractual clauses

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing