A transfer of private data demands the transferor PIC and the transferee (if a PIC, or if it gets to be a PIC on account of the transfer) hold specified documents plus the transferee is additionally required to make inquiries over the source of the non-public data transferred unless the transfer was manufactured in reliance on an exception outlined