Ireland’s Data Protection Commission issued a decision fining TikTok €530 million and ordering corrective measures following an inquiry into transfers of EEA user data to China and related transparency obligations. The DPC stated that the decision found infringements linked to GDPR transfer requirements and transparency duties, and required TikTok to bring processing into compliance within a defined period.
The decision is a landmark because it illustrates how transfer compliance is assessed in practice. It is not enough to rely on a transfer mechanism in theory; organisations must demonstrate that the transferred data is protected to a level essentially equivalent to that guaranteed within the EU, including against third-country access risks. The DPC decision also highlights the importance of accurate and complete transparency information: data subjects must be clearly informed about transfers, destinations, and safeguards.
Reuters’ reporting on the fine emphasised the DPC’s concerns about whether TikTok adequately safeguarded personal data from potential access under Chinese laws, and it noted that the decision included a requirement to suspend transfers unless compliance was achieved within six months.
Beyond TikTok, the case is a signal to any organisation operating global processing infrastructure. Regulators continue to test whether transfer governance is real, documented, and consistently applied — particularly for large-scale consumer platforms. The operational burden is significant: organisations must maintain accurate records of where data resides, how it can be accessed, and what controls exist to prevent unauthorised access or onward transfer.
Acompli perspective: The TikTok case reinforces an uncomfortable truth: transfer compliance fails most often because organisations do not maintain an accurate operational picture of their data estate. If you cannot evidence where data is stored, who can access it, and what happens under exceptional access scenarios, you are exposed — even if your contracts look correct. Transfer Impact Assessments, vendor access controls, and encryption architectures need to be treated as living controls, not “one-time paperwork”.
