Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsEnterprise Services

European Commission and EDPB provide update on efforts to address cross-border transfers after Schrems II

Keypoint: Representatives of the European Commission and EDPB advised that further guidance on cross-borders data transfers are forthcoming.

By David M. Stauss
SEC0219-data-Feat-slide1_900px
September 11, 2020

Last week, Didier Reynders, European Commissioner for Justice, and Dr. Andrea Jelinek, Chair of the European Data Protection Board (EDPB), appeared at a hearing conducted by the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, and updated committee members on their work since the Schrems II decision.

In his remarks, Mr. Reynders identified three main areas on which the Commission is focusing.

First, the Commission is working with data protection authorities and the EDPB “to build a common understanding of the judgment and to avoid a fragmented approach from one member state to another.”

Second, the Commission is working to modernize the Standard Contractual Clauses, which process started before the Schrems II decision. The revised SCCs will reflect guidance from the Schrems II decision, which “should help companies in their compliance efforts.” Mr. Reynders stated that finalizing work on the SCCs is a “top priority” and that they “intend to launch the adoption process for the new clauses in the coming months and [he hopes] finalize it by the end of this year.”

Third, the Commission is working on negotiating a new framework with the United States. However, he cautioned “there will be no quick fix.”

Mr. Reynders concluded his remarks by stating that “the protection must travel with the data around the world.”

Much later in the hearing, and in response to committee member questions, Mr. Reynders outlined what “modernization” of the SCCs would entail. First, the SCCs need to be updated in light of new requirements of GDPR such as the controller/processor relationship in Article 28 and GDPR’s transparency obligations. The SCCs also need to address data transfers that are not currently covered, including transfers from an EU processor to a non-EU subprocessor. Third, the SCCs need to better reflect the processing activities in the modern digital economy where there are multiple data importers and exporters.

In her remarks, Dr. Jelinek stated that the EDPB is “currently preparing additional support to provide controls and processes with recommendations to assist [organizations] in identifying and implementing appropriate supplementary measures.”

Dr. Jelinek also stated that it was “important to point out” that the Schrems IIruling applied to data transfers to all third countries, not just the United States. Further, the derogations for transfers identified in Article 49 “must be treated as what they are – derogations” and “can only be the exception, not the rule.”

She further stated that, in the coming weeks and months, the EDPB would review existing documents and guidance in light of the Schrems II judgment. The EDPB also will prepare recommendations to controllers to identify appropriate supplementary measures of the “legal, technical and organizational nature.” She was careful to point out, however, that there cannot be a “one-size-fits-all” or “quick fix” solution” and that each organization will need to evaluate its own unique situation.

The day after the hearing, the EDPB announced that it has created a taskforce to “prepare recommendations to assist controllers and processors with their duty to identify and implement appropriate supplementary measures to ensure adequate protection when transferring data to third countries.”

In the end, although Mr. Reynders and Dr. Jelinek did not provide insight into the nature of the forthcoming guidance and changes, they did confirm that companies should expect to see developments in the coming months.

The hearing also included comments from Max Schrems as well as committee members. Mr. Schrems and the committee members raised numerous concerns regarding the status of these issues and were passionate that the European legal structure must ensure for the rights of European citizens at home and abroad.

KEYWORDS: data collection data security European security GDPR security compliance

Share This Story

David stauss

David Stauss is a partner at Husch Blackwell LLP and co-leader of the firm’s privacy and data security practice group. David regularly assists clients in preparing for and responding to data security incidents, including managing multi-state breach notifications. He also regularly counsels clients on complying with existing and emerging privacy and information security laws, including the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act of 2018 (CCPA) and state information security statutes. To stay up to date on these issues, subscribe to Husch Blackwell’s privacy blog. Stauss can be reached at david.stauss@huschblackwell.com.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing