How to Comply with the Bulk Data Rule for Restricted Transactions

01 Jul , 2026

To register for the upcoming live webinar, please check back later.

This follow?on CLE builds on National Security & Data Privacy: Complying with the Bulk Data Rule and the New Data Security Program and focuses on the most practical compliance question attorneys face under Executive Order 14117 and the DOJ’s Data Security Program (28 C.F.R. Part 202): how organizations can lawfully engage in restricted transactions.

While some data transfers are prohibited outright, many common business activities—including vendor arrangements, employment relationships, cloud services, and internal data access—are classified as restricted transactions and permitted only if specific security safeguards are implemented.

With DOJ enforcement now fully active and grace periods expired, lawyers must be prepared to advise not only on risk identification, but on how compliance is achieved and demonstrated.

This program provides a practical roadmap for identifying restricted transactions, understanding required security controls, and advising clients on defensible compliance strategies, drawing on regulatory text, DOJ and CISA guidance, and real?world examples.

Topics Covered:

  • Overview of the Bulk Data Rule as it applies to restricted transactions
  • Sensitive data categories and bulk thresholds
  • Distinguishing prohibited vs. restricted transactions
  • Required security controls under the Data Security Program
  • The role of CISA security standards and guidance Practical compliance and documentation considerations

Learning Objectives:

  • After completing this program, participants will be able to:
  • Identify when a transaction qualifies as “restricted” under the Bulk Data Rule
  • Explain the security controls required for lawful restricted transactions
  • Evaluate common business arrangements for compliance risk
  • Advise clients on documenting and defending compliance in an enforcement environment

Intended Audience - This program is designed for attorneys practicing in privacy, cybersecurity, national security, technology, corporate, employment, and regulatory compliance, as well as in?house counsel overseeing data governance and risk.

To register for the upcoming live webinar, please check back later.

More Webcasts

Cybersecurity Compli...

This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...

Beyond the Prompt: H...

ChatGPT is rapidly entering law firm workflows, including drafting, summarizing, brainstorming, lega...

Brand Rent and 4 Oth...

Trademark doctrine was built for a marketplace that no longer exists, leaving practitioners to litig...

Introduction to Deri...

This program provides attorneys with a foundational understanding of derivatives and their role in m...

Class Actions...

Class action litigation continues to evolve rapidly in response to an innovative plaintiffs’ b...

AI Agents in Your Fi...

AI agents and generative AI tools are rapidly entering law firm workflows, including legal research,...

Identifying and Miti...

This program provides attorneys with a practical examination of how legal, regulatory, and liability...

Rethinking Harm in C...

This program introduces psychosocial evaluations as a valuable tool in civil litigation, particularl...

Dealing with Difficu...

Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...

Effective Advocacy i...

Philip A. Greenberg, Esq., who has been a litigator in the State and Federal Courts for 52 years, ha...