Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
How To Do A Transfer Impact Assessment: A Practical Step-By-Step Process
- Step 1: Map The Transfer (What, Who, Where, Why)
- Step 2: Confirm Your Transfer Mechanism
- Step 3: Assess The Destination Country Risk (In Real-World Terms)
- Step 4: Check The Supplier’s Practical Safeguards
- Step 5: Decide Whether You Need “Supplementary Measures”
- Step 6: Document The Outcome (And Keep It Updated)
- What Should A Transfer Impact Assessment Include? (A Simple Checklist)
- Key Takeaways
If your business uses cloud tools, overseas contractors, or customer support teams based outside the UK, there’s a good chance you’re already making an “international transfer” of personal data.
Under UK data protection law, you can’t just send personal data overseas and hope for the best. You need to make sure the data will still be protected to a UK-standard level once it leaves the UK.
That’s where a transfer impact assessment (often shortened to TIA) can help. Done properly, a TIA helps you identify the real-world risks of an international data transfer and document how you’ll manage them.
In this guide, we’ll break down what a transfer impact assessment is, when you may need one, and how to do it in a practical way as a small business (without turning it into a never-ending compliance project).
What Is A Transfer Impact Assessment (TIA)?
A transfer impact assessment is a documented assessment you may carry out when you’re transferring personal data from the UK to another country (or making it accessible from another country), particularly where that destination country may not provide the same level of protection as UK law expects.
In plain terms, a TIA helps you answer:
- What personal data are we transferring?
- Where is it going and who can access it?
- What could realistically go wrong once the data is overseas?
- Do our safeguards (contracts + technical measures) actually work in practice?
You’ll often hear TIAs referred to as a data transfer impact assessment. People use both phrases, and they generally mean the same thing in day-to-day business conversations: an assessment of the risks and protections relating to an overseas transfer.
Is A TIA The Same As A DPIA?
Not quite. A Data Protection Impact Assessment (DPIA) focuses on high-risk processing activities generally (for example, large-scale profiling or using new tech that may significantly impact individuals).
A transfer impact assessment is specifically focused on the international transfer element: the laws, practices, and risks in the destination country, and whether your contractual and technical safeguards will hold up.
Sometimes you may need both. For example, if you’re rolling out a new HR system that involves sensitive employee data hosted outside the UK, you might do:
- a DPIA for the overall processing risks; and
- a TIA for the international transfer risks.
When Do UK Small Businesses Need A Transfer Impact Assessment?
You’ll typically want to consider a transfer impact assessment when:
- You transfer UK personal data to a country that isn’t recognised by the UK as providing “adequate” protection; and
- You rely on a transfer safeguard like the UK’s International Data Transfer Agreement (IDTA) or the UK Addendum to the EU Standard Contractual Clauses; and
- There’s a chance the destination country’s laws or practices could undermine those safeguards in practice.
In practice, this catches a lot of everyday small business activity, such as:
- Using a non-UK cloud provider where data is hosted outside the UK (or where support teams outside the UK can access data).
- Hiring overseas contractors (developers, virtual assistants, marketers) who can access customer or employee data.
- Using overseas customer support services that handle customer enquiries and have access to order histories.
- Sharing customer lists with an overseas service provider for email marketing, CRM management, analytics, or fulfilment.
What Counts As An “International Transfer”?
This is where many businesses get caught out. An international transfer isn’t just “we emailed a spreadsheet overseas”. It can also be:
- Remote access to UK personal data from outside the UK (for example, an overseas support team logging into your systems).
- Data being stored in data centres outside the UK.
- Sub-processors (your supplier’s suppliers) being located outside the UK and having access.
If you’re collecting personal data through your website, the international element often sits in the background through tools you use (hosting, analytics, customer support chat, email marketing, cloud storage).
That’s why your Privacy Policy and your behind-the-scenes contracts need to match what you’re actually doing with data.
What Are The UK Rules For International Data Transfers (And Where TIAs Fit In)?
In the UK, international transfers are mainly governed by the UK GDPR and the Data Protection Act 2018.
At a high level, there are a few “routes” that can make an international transfer lawful.
1) Adequacy Regulations (The Simplest Route)
The UK government can decide that a particular country provides an “adequate” level of data protection. If you’re transferring personal data to an “adequate” country, you generally don’t need additional transfer safeguards like IDTAs (though you still need to comply with UK GDPR generally).
Many businesses won’t be able to rely on adequacy for all suppliers, so you often end up needing the next option.
2) Appropriate Safeguards (Where TIAs Usually Come In)
If the destination country isn’t “adequate”, you can use appropriate safeguards. The most common in small business settings are:
- International Data Transfer Agreement (IDTA) (the UK’s standalone contract for transfers); or
- UK Addendum to the EU Standard Contractual Clauses (often used where suppliers already use EU SCCs).
But here’s the key point: using an IDTA (or Addendum) isn’t always enough on its own.
You also need to consider whether the destination country’s laws or practices could undermine the protections in those contracts. That’s the practical purpose of a transfer impact assessment.
3) Limited Exceptions
There are narrow exceptions (sometimes called “derogations”), such as explicit consent in specific circumstances. These can be risky to rely on as a routine solution for business operations.
Most growing businesses should treat exceptions as a last resort, and instead build compliant, repeatable transfer processes.
How To Do A Transfer Impact Assessment: A Practical Step-By-Step Process
A transfer impact assessment doesn’t need to be a 40-page legal thesis. But it does need to be thoughtful, specific to your transfer, and documented.
Here’s a practical step-by-step process you can apply as a small business.
Step 1: Map The Transfer (What, Who, Where, Why)
Start with the basics. Write down:
- Exporter: your business entity in the UK (the data exporter).
- Importer: the overseas recipient (supplier, contractor, affiliate) (the data importer).
- Countries involved: including where data is hosted and where it can be accessed from.
- Type of data: customer contact details, order history, employee data, special category data (if any).
- Purpose: why the transfer is happening (hosting, customer support, payroll, marketing, analytics, etc.).
- Frequency and volume: one-off, ongoing, large-scale, occasional.
This is also a good time to review whether you have the right contracts in place with the supplier. If a supplier is processing personal data on your behalf, you’ll generally need a compliant data processing agreement (often built into a master services agreement, SaaS terms, or supplier contract).
Step 2: Confirm Your Transfer Mechanism
Next, document the lawful mechanism you’re relying on to transfer data internationally, such as:
- IDTA;
- UK Addendum to EU SCCs;
- another approved safeguard; or
- an exception (if genuinely applicable and not routine).
If you’re not sure which contract you’ve got (or whether it’s been properly incorporated into your supplier agreement), it’s worth checking now. This is a common compliance gap for small businesses because suppliers often provide “standard terms” that don’t neatly line up with UK requirements without extra steps.
Step 3: Assess The Destination Country Risk (In Real-World Terms)
This is where your transfer impact assessment becomes meaningful.
You’re looking at whether the destination country’s laws and practices could impact:
- confidentiality of personal data;
- ability for individuals to exercise their rights;
- risk of disproportionate government access; and
- practical enforceability of your contractual protections.
You don’t need to become an expert on foreign surveillance law, but you should:
- use reputable sources (including official guidance where available);
- focus on what’s relevant to your type of transfer; and
- document your reasoning in plain English.
If you’re using multiple suppliers in the same country, you can often develop a repeatable approach - but still tailor the assessment to the specific service and data involved.
Step 4: Check The Supplier’s Practical Safeguards
Contracts matter, but practical protections matter just as much. Your TIA should consider the supplier’s real-world safeguards, such as:
- Encryption (in transit and at rest) and who controls the keys;
- Access controls (least privilege access, MFA, logging);
- Data minimisation (are you sending only what’s needed?);
- Retention and deletion practices;
- Incident response processes; and
- Sub-processor management and transparency.
If the supplier can’t give you any meaningful information about their security measures, that’s a red flag. As the UK business exporting the data, you’re still accountable for the transfer compliance.
Step 5: Decide Whether You Need “Supplementary Measures”
If your assessment indicates that the destination country environment could undermine your transfer safeguard, you may need extra protections (often called “supplementary measures”).
These could include:
- Technical measures: strong encryption, tokenisation/pseudonymisation, minimising access.
- Contractual measures: enhanced audit rights, notification obligations, transparency about government access requests.
- Organisational measures: policies, training, and internal approval processes for transfers.
For example, if you allow staff or contractors to access systems that contain customer personal data, an acceptable use policy can form part of your organisational safeguards (alongside proper role-based permissions).
Step 6: Document The Outcome (And Keep It Updated)
To be useful, your transfer impact assessment should clearly record:
- the transfer details;
- the safeguard used (IDTA/Addendum);
- the risks you identified;
- the measures you’ve implemented; and
- your conclusion (proceed / proceed with conditions / don’t proceed).
TIAs aren’t a “set and forget” exercise. You should review them when something changes, such as:
- you start transferring more data or more sensitive data;
- you change suppliers or add sub-processors;
- your supplier changes hosting regions;
- there’s a significant legal change in the destination country; or
- you become aware of new security risks.
If you’re building a privacy programme from scratch, it can also help to take a more holistic approach with a GDPR package, so you’re not handling TIAs in isolation from the rest of your UK GDPR obligations.
Common Transfer Impact Assessment Mistakes (And How To Avoid Them)
TIAs often go wrong in predictable ways - especially for small businesses that are juggling compliance alongside actually running the business.
Mistake 1: Assuming “Our Supplier Has Standard Terms, So We’re Covered”
Standard supplier terms may include some data clauses, but that doesn’t automatically mean you have a valid UK transfer safeguard (or that it’s been properly incorporated into your contract).
Fix: confirm what transfer mechanism is being used (IDTA vs UK Addendum) and whether it applies to your specific relationship and data flows.
Mistake 2: Treating The TIA Like A Box-Ticking Exercise
A generic, copy-and-paste assessment that doesn’t match your actual transfer won’t help you if there’s a complaint, a breach, or an ICO enquiry.
Fix: tailor the assessment to the actual data, access model, and supplier setup. Keep it clear and practical rather than overly long.
Mistake 3: Forgetting About Sub-Processors
Even if your direct supplier is reputable, they may use sub-processors (for hosting, support, analytics, backups) in other countries.
Fix: check sub-processor lists and contract terms. If data is being shared between organisations, a data sharing agreement may also be appropriate (depending on the relationship and roles).
Mistake 4: Overlooking Remote Access
Many businesses focus only on where data is “hosted”, and miss that overseas staff can still access UK data.
Fix: include access locations in your mapping step, not just server regions.
Mistake 5: Not Aligning Your TIA With Your Wider GDPR Documentation
Your TIA is one piece of your compliance story. If it says one thing but your privacy notices, internal policies, or supplier contracts say another, it creates risk.
Fix: treat TIAs as part of your overall privacy governance, not a standalone document.
What Should A Transfer Impact Assessment Include? (A Simple Checklist)
If you want something you can use immediately, here’s a simple checklist of what most UK small businesses should aim to include in a transfer impact assessment:
- Parties: exporter and importer details.
- Transfer description: what data, whose data, purpose, frequency, and how it’s transferred.
- Data sensitivity: whether special category data is involved and what harm could occur if misused.
- Transfer mechanism: IDTA / UK Addendum / other safeguard.
- Destination country factors: risks arising from laws and practices relevant to your transfer.
- Supplier controls: security measures, access restrictions, encryption, incident handling.
- Supplementary measures: what extra safeguards you’re using (if needed).
- Decision: proceed, proceed with additional controls, or don’t proceed.
- Review schedule: when and how you’ll review the TIA.
And remember: the best TIA is one you can actually maintain. A short, accurate, regularly reviewed assessment is usually better than a long document that nobody updates.
Key Takeaways
- A transfer impact assessment is a practical way to assess and document whether an overseas data transfer keeps personal data protected to a UK-standard level.
- Many small businesses consider TIAs because everyday tools (cloud services, outsourced support, overseas contractors) can involve international transfers or overseas access.
- Using an IDTA or UK Addendum is often necessary for non-adequate destinations, but you also need to consider whether destination country laws could undermine those protections.
- A good transfer impact assessment maps the transfer, checks the destination country risk, reviews supplier safeguards, and records any supplementary measures you’ll use.
- Common mistakes include ignoring sub-processors, overlooking remote access, relying on generic templates, and failing to keep the assessment updated.
- TIAs work best when they’re part of your wider GDPR compliance framework, alongside clear contracts, policies, and privacy documentation.
If you’d like help getting your transfer impact assessment right (or putting the right contracts and GDPR documents in place), you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


