A transfer of non-public data calls for that the transferor PIC as well as transferee (if a PIC, or if it turns into a PIC on account of the transfer) continue to keep specified documents and also the transferee is also required to make inquiries over the source of the personal data transferred Until the transfer was built in reliance on an excepti