On April 8, the Department of Justice’s (“DOJ’s”) final rule on Preventing Access to US Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons (the “Rule”) formally took effect. Issued pursuant to President Biden’s 2022 Executive Order (“E.O.”) on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern (EO 14117), the Rule imposes broad restrictions on the access of US sensitive personal data and government-related data to certain covered countries of concern and covered persons, as well as a suite of new compliance and reporting requirements across industries. The Rule also creates a new Data Security Program (“DSP”) within the DOJ’s National Security Division (“NSD”) to oversee implementation, including through issuance of licenses and advisory opinions.
On Friday, April 11, the NSD issued much anticipated guidance on the Rule’s implementation, including (i) an overarching implementation and enforcement policy for the program (“Enforcement Policy”) through the next 90 days; (ii) a 21-page Compliance Guidance; and (iii) a 45-page guide to frequent answers and questions (“FAQs”). Moreover, the NSD previewed that additional guidance would be forthcoming in the coming weeks regarding an initial Covered Persons List that identifies and designates persons subject to the control and direction of foreign adversaries.
We have previously written about the Rule in a Jan. 23, 2025, client alert (“DOJ Finalizes Rule Regarding Sensitive Data Transfers”), and recently did a brief April 10 webinar (“What You Need to Know About the DOJ’s Sensitive Data Access Rule”) providing an overview of the Rule and key provisions, as well as compliance strategies given the current priorities of the Trump Administration.
The following post provides a high-level summary of these new guidance documents, along with our top takeaways so far.
Key Takeaways:
- Regulating data transfers will remain a bipartisan priority—and may even accelerate under the Trump Administration. As it revisits other Biden-era rules, the NSD’s recent guidance emphasizes its “continued prioritization of the Data Security Program,” and traces a throughline from Trump’s recent Presidential proclamations to his 2017 National Security Strategy, which described the People’s Republic of China’s (“PRC’s”) willingness to weaponize US person data.
- Compliance started “yesterday.” Despite calls from industry, the NSD has declined to delay enforcement of the new Rule, urging companies to immediately “know your data.” While the NSD has indicated that it will not “prioritize civil enforcement actions” over the next 90 days for those US persons engaging “in good faith efforts to comply with or come into compliance with the Data Security Program,” it will nonetheless focus on “egregious, willful violations.” At the end of this 90-day period, the NSD moreover expects that individuals and entities should be “in full compliance,” though certain affirmative obligations, including auditing requirements for restricted transactions and reporting obligations for restricted or rejected prohibited transactions, do not come into effect until October 2025.
- Licenses aren’t a near-term option—and will be presumptively denied. While the Rule envisions that the NSD may issue specific licenses permitting certain data transfers, the NSD has proactively discouraged companies from seeking specific licenses, or formal advisory opinions over the next 90 days—emphasizing that they will not be reviewed or adjudicated. Going one step further, the NSD says in the Compliance Guide that it will apply a presumption of denial standard to all specific license applications—which the Rule notably did not indicate. Nonetheless, the NSD has encouraged the public more broadly to contact the NSD with “informal queries” to develop and refine future guidance—a testament to the fact that the NSD appreciates the Rule’s complexity.
- Compliance processes will vary, and there’s no safe harbor. The NSD’s Compliance Guide emphasizes that “the failure to adopt and maintain adequate data compliance policies and procedures is potentially a violation...and may be an aggravating factor in any enforcement action.” That said, the NSD has emphasized that whether a compliance program satisfies the DSP requirements is likely to be a highly fact-dependent, holistic inquiry that considers “the US persons’ size and sophistication, products and services, customers and counterparties, and geographic locations.” While the Compliance Guide provides baseline suggestions for what a strong compliance regime might include, it’s explicit in stating that adherence to those standards does not provide companies with safe harbor.
- Companies should exercise caution when assessing who qualifies as a covered person under the Rule. Under the Rule, transactions including data brokerage with countries of concern and covered persons are prohibited, absent an exemption or valid license. While the NSD intends to publish a copy of the designated “covered persons list” in the near future, the division has communicated that it is not going to be an exhaustive list upon which companies can entirely rely—requiring ongoing due diligence. Companies do not have a formal obligation to determine control of the counterparties with which they do business—as opposed to direct and indirect ownership in the aggregate at 50% or more—but the NSD nonetheless has cautioned that US persons should exercise caution where covered entities may exercise “significant control.” Moreover, as the FAQs explain in detail, the Rule treats ownership percentages in the aggregate across multiple covered persons.
- The NSD is taking a totality-of-the-circumstances approach to assessing violations, to include active participation by senior company management. The NSD appears to recognize that full compliance with the Rule may take time, and it states that it will consider all relevant facts and circumstances in the event of a violation, including the relative sophistication of the individuals or entities at issue. The NSD’s guidance repeatedly emphasizes that senior management—to include C-suite and Board-level officials—must be involved in establishing robust compliance programs. It seems likely that, at least initially, robust and good-faith efforts by company leadership to comply with the new program could help stave off early enforcement actions.
- Meanwhile, other “data security” compliance obligations may still apply. Consistent with its explanation in the Rule, the NSD’s FAQs clarify how the Rule intersects with other regulatory requirements under the Committee on Foreign Investment in the United States (“CFIUS”), the Department of Commerce’s Information and Communications Technology and Services (“ICTS”) authorities, and the Protecting Americans’ Data from Foreign Adversaries Act of 2024 (“PADFAA”). In the case of Commerce’s ICTS authorities under E.O. 13873, the NSD clarified that it regards the Rule as creating a “floor,” while still permitting Commerce to take more stringent actions against a specific vendor, transaction, or class of ICTS beyond those requirements by the Rule. In the case of CFIUS, the NSD states that the security requirements regulating US persons’ engagements in a restricted transaction apply “until and unless” CFIUS takes actions to address data security risks through a migration agreement. At that point, the security requirements created by the Rule would no longer apply.
- The NSD doesn’t have much additional clarification on the application of critical exemptions. While reinforcing that certain transactions otherwise prohibited or restricted may qualify for an exemption, the NSD does not otherwise provide much additional insight into how those exemptions function. For example, the FAQs include just one question about the corporate group transaction—likely the most relevant to broad swaths of industry—to clarify that it doesn’t apply to routine research or development activities. The NSD provides no further examples wherein the corporate group transaction would apply, though it reaffirms that the administrative and ancillary business activities listed in the exemption are not exhaustive.
Summary of Key Documents
Enforcement Policy
The NSD’s Enforcement Policy indicates that while the implementation of the DSP is intended to take immediate effect, the agency will not prioritize enforcement where a person (e.g., individual or company) has engaged in “good-faith efforts” to comply, or come into compliance, with the program for the first 90 days from the program’s implementation (April 8, 2025 through July 8, 2025). Voluntary cooperation to NSD inquiries will also be “favorably considered” in considering civil enforcement. However, during this time, enforcement actions may still be brought within the first 90 days of the program’s implementation for “egregious, willful violations.”
Indications of “good-faith efforts” may include:
- conducting internal reviews of access to data, internal datasets, and datatypes to determine DSP applicability;
- conducting a review of vendors and vendor agreements or negotiating contracts;
- negotiating contractual onward transfer provisions with foreign persons who are the counterparties to data brokerage transactions;
- adjusting employee work locations, roles, or responsibilities;
- evaluating investments and investment agreements from countries of concern or covered persons; or
- implementing the Cybersecurity and Infrastructure (“CISA”) Security Requirements for Restricted Transactions.
Finally, as reiterated in the Enforcement Policy and pursuant to the Rule, persons are not required to immediately comply with the DSP’s affirmative obligations related to due diligence and audit requirements for restricted transactions, reporting requirements for certain restricted transactions, or reporting requirements on rejected prohibited transactions until October 6, 2025 (as indicated in 28 C.F.R. Part 202, Subpart J, 28 C.F.R. § 202.1103, and 28 C.F.R. § 202.1104). According to the Rule, the additional six-month extension is to provide sufficient time to phase in additional compliance requirements associated with an assessment of data transactions, updates of internal policies to comply with reporting requirements, and making necessary data security changes without disrupting commercial activity.
Pursuant to the International Emergency Economic Powers Act (“IEEPA”), the DOJ is authorized to bring civil enforcement actions and criminal prosecutions for knowing or willful violations of the program’s requirements. Civil penalties may be up to the greater of $368,136 or twice the value of each violative transaction, whereas criminal (“willful”) violations of the IEEPA are punishable by imprisonment of up to 20 years and a $1,000,000 fine.
Corporate Group Transactions Exemptions: In general, data transactions are exempt from the rule to the extent they are (1) between a US person and its subsidiary or affiliate located in (or otherwise subject to the ownership, direction, jurisdiction, or control of) a country of concern; and (2) ordinarily incident to and part of administrative or ancillary business operations (such as sharing employees’ covered personal identifiers for human-resources purposes); payroll transactions (such as the payment of salaries and pensions to overseas employees or contractors); and paying business taxes or fees. The FAQs highlight that research and development conducted by US companies with corporate affiliates in countries of concern is not exempt under § 202.506.