Just released:

The 2025 KPMG US CEO Outlook – learn what’s shaping CEO decision making

Get the report
Just released:

The 2025 KPMG US CEO Outlook – learn what’s shaping CEO decision making

Get the report

Compliance with the DOJ data rule

Key requirements and best practices for organizations

Service
Cyber Security & Technology Risk
Use cyber security to protect your future.

The Department of Justice (DOJ) has introduced a new rule that restricts the bulk transfer of sensitive personal data to countries of concern. This rule has significant implications for organizations, where the management of personal information is critical. To help organizations navigate these changes, we have developed detailed insights and practical guidance on how to comply with the new regulations.

Key compliance requirements

There are several key compliance requirements that organizations must adhere to:

  • Reporting and Recordkeeping Requirements:
    • Provide information under oath upon request, submit annual reports, and document rejected prohibited transactions.
    • Maintain accurate records of transactions subject to the Data Security and Privacy Lifecycle Management (DSP) for at least ten years, with an annual certification of compliance by a senior official.
  • Transaction Review & Compliance:
    • Conduct annual, independent audits of the Data Compliance Program covering the previous 12 months, and report findings within 60 days, retaining reports for ten years.
    • Develop a written policy that describes the data compliance program and that is annually certified by an officer, executive, or other employee responsible for compliance.
  • Risk Management:
    • Establish risk-based procedures to verify and log data flows in restricted transactions, including data types and volumes, transaction party identities, and data end-use and transfer methods.
    • Implement risk-based procedures to verify vendor identities, including periodic screening against the Covered Persons List to ensure current and prospective vendors are not covered persons.

Potential benefits of proactive compliance

Proactive compliance with the DOJ rule on bulk transfer of personal information offers several potential benefits:

  • Reducing risks and fines: By adhering to the rule, organizations can reduce the risks of data breaches, unauthorized access, and regulatory fines.
  • Supporting regulatory compliance: Compliance with the rule ensures that organizations meet regulatory requirements, avoiding potential legal issues.
  • Enhancing data retrieval: Improved data management practices can lead to more efficient data retrieval processes.
  • Improving efficiency: Streamlining data management can enhance overall business efficiency.
  • Deepening business process integration: Aligning data management practices with corporate infrastructure can deepen business process integration.
  • Improving accurate data identification: Proactive compliance helps in accurately identifying and managing sensitive data.e they meet the necessary compliance standards.

Why act now?

The white paper emphasizes the importance of taking proactive steps in your compliance journey. By acting now, you can:

  • Reduce risks: Minimize the likelihood of data breaches and unauthorized access.
  • Support regulatory compliance: Ensure that your organization is in line with the latest regulations.
  • Enhance data management: Streamline your data management processes for better efficiency and accuracy.

Dive into our thinking:

Department of Justice rule for bulk transfer of personal information

To gain a deeper understanding of the DOJ Data Rule and its implications, we encourage you to download the white paper. It provides detailed guidance on how to comply with the rule and offers practical steps to enhance your data management practices. Download the white paper now and take the first step towards proactive compliance and a more secure future for your organization.

Download PDF

Explore more

Insights on cyber security

KPMG professionals are passionate and objective about cyber security. We’re always thinking, sharing and debating. Because when it comes to cyber security, we’re in it together. 

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's . Privacy Statement

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline