A transfer of non-public data requires the transferor PIC and the transferee (if a PIC, or if it gets a PIC on account of the transfer) hold specified documents as well as the transferee is usually necessary to make inquiries within the supply of the private data transferred unless the transfer was built in reliance on an exception shown earlier me… Read More