Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If your business uses overseas software tools, cloud hosting or external support teams, there’s a good chance personal data is being accessed from outside the UK. That’s an “international transfer” under UK GDPR, and it triggers a legal requirement many small businesses miss: carrying out a transfer risk assessment (TRA).
Don’t stress – with a clear process and the right documents, a TRA is manageable, even for small teams. In this guide, we’ll explain what a TRA is, when you need one, and a step-by-step way to complete it so you’re protected from day one.
What Is A Transfer Risk Assessment?
A transfer risk assessment (TRA) is a structured assessment to decide whether people’s personal data will be protected to a UK-acceptable standard when it’s sent to, or accessed from, a country outside the UK. It’s part of your accountability obligations under the UK GDPR and the Data Protection Act 2018.
In practice, a TRA helps you answer two key questions:
- Are the laws and practices in the destination country (including government access to data) broadly equivalent to the protections people have in the UK?
- If not, can you add extra safeguards (technical, contractual or organisational) to reduce the risk to an acceptable level?
In the UK, the Information Commissioner’s Office (ICO) provides a TRA tool as a pragmatic alternative to the EU’s “transfer impact assessment” (TIA) approach following the Schrems II ruling. You can use the ICO TRA tool, or follow a comparable, risk-based process that covers the same ground. Either way, you should document your reasoning and decisions.
When Do You Need A Transfer Risk Assessment?
You need a TRA whenever you make an international transfer of personal data, unless a UK adequacy decision covers the destination. Typical triggers for small businesses include:
- Using a SaaS platform hosted outside the UK (or supported by teams based overseas).
- Storing customer data in a cloud region outside the UK/EEA.
- Engaging customer support, development, or analytics teams in another country who access your systems.
- Sharing data to group companies or affiliates outside the UK.
You usually do not need a TRA if the data only moves within the UK, or to countries covered by a UK adequacy regulation (for example, the EEA and certain other jurisdictions). However, even when a vendor says they’re “UK hosted,” check whether overseas support staff can remotely access your environment - that still counts as a transfer.
Separately from a TRA, UK law requires you to have an appropriate legal mechanism for the transfer. Common options are:
- International Data Transfer Agreement (IDTA) or the UK Addendum to the EU Standard Contractual Clauses (SCCs).
- A UK adequacy regulation for the destination country (no extra clauses needed).
- Limited “derogations” for specific situations (for example, an explicit consent for a one-off transfer). These are narrow and not suitable for routine transfers.
In many real-world setups, you’ll use the IDTA or the UK Addendum with a vendor and then complete a TRA to confirm the overall risk is acceptable.
How To Complete A Transfer Risk Assessment (Step-By-Step)
Here’s a practical, small-business-friendly process that aligns with the ICO’s risk-based approach.
1) Map The Transfer
Start by mapping what you’re transferring, to whom, and where the data goes. Capture:
- The data categories (e.g. names, emails, order histories, payment tokens, HR records).
- The data subjects (e.g. customers, prospects, employees, contractors).
- The purposes of the transfer (e.g. hosting, analytics, customer support, payroll).
- The recipients and their roles (processor or controller), plus any sub-processors.
- Countries involved, including where data is stored and from where it’s accessed.
- The frequency and volume of the transfer, and whether it is ongoing or one-off.
This information should match your Records of Processing Activities and your contracts with vendors. If you don’t have them in place yet, make sure your Data Processing Agreement with each processor correctly describes the processing and transfer scope.
2) Identify The Transfer Mechanism
Decide which mechanism you’ll use to make the transfer lawful:
- UK adequacy decision (if the destination country is approved).
- IDTA or UK Addendum to EU SCCs (most common for routine transfers).
- Derogation under Article 49 (rare – for exceptional cases only).
If you’re adopting the IDTA/UK Addendum, confirm the latest version is signed and that the appendices correctly reflect the processing. Many vendors will offer their standard clauses; you can still negotiate data protection schedules to clarify security measures and sub-processor transparency.
3) Understand The Destination Risk
Assess the destination country’s legal and practical environment, focusing on:
- Whether local laws allow disproportionate government access to data.
- The availability of redress mechanisms and independent oversight for data subjects.
- Rule-of-law indicators and the vendor’s track record (e.g. transparency reports).
This doesn’t require you to become a comparative law expert. For most small businesses, a reasoned, documented analysis using reputable sources, vendor questionnaires and the ICO’s TRA tool will be sufficient.
4) Evaluate The Vendor And Their Safeguards
Look at the recipient’s security and privacy controls. Practical points include:
- Encryption in transit and at rest, and whether only you hold the keys (where feasible).
- Pseudonymisation or minimisation before transfer (only send what’s necessary).
- Access controls (MFA, role-based access, logging, SIEM monitoring).
- Sub-processor due diligence and approval processes.
- Incident response times and breach notification commitments.
Contractually, ensure you have strong security and audit obligations in your Data Processing Agreement (for processors) or Data Sharing Agreement (for controller-to-controller sharing), and that your IDTA/UK Addendum is correctly completed.
5) Decide On Supplementary Measures
If the baseline risk is not low enough, add extra measures, such as:
- Technical: End-to-end encryption with customer-managed keys, tokenisation, data minimisation, and tight retention periods.
- Contractual: Clear limits on government access challenges, transparency obligations, notice and pushback clauses, and strict onward transfer controls.
- Organisational: Staff training, access approvals, regular audits, and breach drills.
The right combination depends on the type of data, business needs and the destination risk. For example, encrypting identifiers and sending only pseudonymised analytics to a US vendor may drastically reduce risk compared to transferring full customer profiles.
6) Record Your Conclusions And Review Cycle
Document the TRA outcome, including the mechanism used (IDTA/UK Addendum/adequacy), your risk reasoning, and any additional safeguards you adopted. Set a review date or trigger, such as:
- Changes to the destination’s legal environment or adequacy status.
- Vendor changes (sub-processors, hosting regions, product modules).
- Changes to the data categories or processing purposes.
Make sure your privacy notices reflect the transfer in plain English, and that your website’s Privacy Policy clearly explains overseas disclosures and the safeguards you rely on.
What Documents And Contracts Should You Put In Place?
Your TRA works alongside the right legal documents. At a minimum, consider:
- Data Processing Agreement (for controller–processor relationships) setting out security, sub-processor approvals, assistance with data subject rights and audit rights.
- Data Sharing Agreement (for controller–controller sharing) defining purposes, roles, and responsibilities.
- IDTA or UK Addendum to SCCs, accurately completed and signed, with Annexes/Appendices matching the processing description.
- Privacy Policy aligned with UK GDPR transparency requirements, including international transfers and your lawful bases.
- Internal policies and training (access control, acceptable use, incident response) – a packaged approach like a Data Protection Pack can help you build consistent foundations.
Depending on your operations, also think about cookie and analytics tools. If your analytics uses international infrastructure, compliant consent flows matter – review your Cookie Banners and cookie policy so the collection and any transfers are transparent and lawful.
Practical Examples For Small Businesses
Example 1: UK Retailer Using US-Based Email Marketing
You’re a UK e‑commerce brand using a US email marketing platform. UK customer emails and purchase data are synced to the platform and occasionally accessed by US support staff.
What to do:
- Map the transfer (customers’ names, emails, product categories, engagement metrics).
- Execute the UK Addendum to SCCs (or IDTA) with the vendor and complete the annexes.
- Run a TRA using the ICO tool. Identify government access risk and vendor safeguards.
- Adopt supplementary measures: reduce attributes synced, enable MFA, encrypt exports, and limit retention.
- Update your website Privacy Policy with overseas transfers.
Example 2: SaaS Startup With Developers In India
Your UK SaaS stores data in the UK, but your development team in India can access production logs and databases for support.
What to do:
- Recognise this as a transfer (remote access from outside the UK).
- Put in place the IDTA between your UK company and the Indian affiliate/contractor.
- Complete a TRA and restrict developer access to anonymised logs where possible.
- Use technical controls: separate staging/production, least‑privilege roles, time‑bound access approvals.
- Ensure contracts and internal policies are covered within a robust Data Protection Pack.
Example 3: HR Platform With Global Support
You adopt a European HR platform for payroll and leave management. Data is hosted in the EEA (adequate), but out‑of‑hours support may be provided from non‑adequate locations.
What to do:
- Clarify whether overseas support access occurs and to what extent (read‑only, metadata only, full records?).
- If so, require the vendor to flow down the UK Addendum to SCCs for those support locations.
- Carry out a TRA for those access scenarios and record supplementary measures (for instance, masked fields, just‑in‑time access with audit trails).
Common Pitfalls And How To Avoid Them
International transfers can trip up even diligent teams. Watch out for these common issues.
- Assuming “UK data centre” means no transfer: Remote support from overseas still counts as a transfer. Confirm support locations and access patterns in vendor due diligence.
- Missing or incomplete annexes: The IDTA/UK Addendum requires specific descriptions of data categories, purposes and recipients. Incomplete annexes weaken your position.
- Over‑collecting data: Minimise what you transfer. This both reduces risk and simplifies your TRA.
- Ignoring retention: Define how long data is kept and implement deletion schedules. Your TRA should align with your data retention policy.
- One‑and‑done mindset: Revisit your TRA when vendors add features, change sub‑processors, or when laws shift.
- Unclear roles: If both parties decide purposes, you may be independent controllers, not controller–processor. Use the right document (for instance, a Data Sharing Agreement rather than a DPA) and reflect this in your TRA.
- Forgetting incident readiness: If something goes wrong overseas, you still need to investigate and notify promptly. Prepare a Data Breach Response Plan and line up vendor cooperation obligations in your contracts.
If you’re using AI tools in your workflow, consider how your prompts and outputs are handled and whether vendors use overseas processing or human review. A short internal policy plus vendor checks – like those in our guidance on ChatGPT GDPR steps – can slot neatly alongside your TRA and transfer clauses.
How A TRA Fits With Your Broader UK GDPR Compliance
A TRA is one piece of the puzzle. To stay compliant and credible with customers, fit it into your wider data protection programme:
- Transparency: Keep your privacy notices accurate and easy to understand, including overseas transfers and safeguards.
- Records: Maintain processing records, transfer logs, and signed copies of your IDTA/UK Addendum.
- Data subject rights: Ensure vendors assist you with access, deletion and portability requests within deadlines. Templates for subject access responses should match your vendor contracts and internal workflows.
- Security by design: Apply minimisation and encryption before exports; review access controls regularly.
- Governance: Assign responsibility (even in a small team), train staff and set review cycles for vendors and TRAs.
If you’re short on time, it can help to schedule a brief Data Protection Consultation to triage what needs attention now versus what can be tightened over time.
Frequently Asked Questions About Transfer Risk Assessments
Do We Still Need A TRA If We’re Using The UK–US Data Bridge?
The UK–US data bridge (the UK extension to the EU–US Data Privacy Framework) can simplify transfers to certified US organisations. However, the bridge does not cover every vendor or scenario (for example, some sub‑processors may not be certified). You should still map the transfer, confirm certification, and assess residual risks. Where the bridge does not apply, use the IDTA/UK Addendum and complete a TRA.
Is The ICO TRA Tool Mandatory?
No – but you need a risk‑based assessment that reaches a reasoned conclusion. The ICO tool is a helpful, recognised way to structure your analysis, especially for small and medium businesses.
Do We Need A DPIA As Well?
Sometimes. If the processing is likely to result in a high risk to individuals (for example, large‑scale monitoring or special category data), you may need a Data Protection Impact Assessment in addition to the TRA. Where a DPIA is required, include your international transfer analysis within it for a joined‑up approach.
How Often Should We Review Our TRA?
Set a review at least annually for routine, low‑risk transfers, and sooner if anything material changes: new data types, vendor sub‑processors, or a shift in the destination country’s legal landscape. Also review after any relevant incident.
Key Takeaways
- A transfer risk assessment is required whenever personal data is sent to, or accessed from, outside the UK unless a UK adequacy regulation applies.
- Use a clear, documented process: map the transfer, pick the legal mechanism (IDTA/UK Addendum/adequacy), assess destination risks, evaluate vendor safeguards, and add supplementary measures if needed.
- Back up your TRA with the right contracts: a solid Data Processing Agreement or Data Sharing Agreement, plus the IDTA or UK Addendum completed properly.
- Minimise what you transfer, encrypt where feasible, set sensible data retention periods, and keep your Privacy Policy transparent about overseas disclosures.
- Revisit TRAs when vendors, data flows or destination laws change. Bake reviews into your governance and incident response (a written Data Breach Response Plan is a smart move).
- If this feels overwhelming, a short, focused session – for example a Data Protection Consultation – can help you prioritise and implement the essentials quickly.
If you’d like help preparing a transfer risk assessment, putting the IDTA/UK Addendum in place, or tightening your data protection contracts and policies, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no‑obligations chat.


