The TELL Act requires companies storing user data in China to clearly disclose the data's location and any potential access by the Chinese government or state-owned entities.
Rick Allen
Representative
GA-12
The TELL Act mandates that websites and mobile apps collecting user data and storing it in China must clearly disclose this storage location and whether the Chinese government or state-owned entities can access that information. Companies are prohibited from knowingly providing false disclosures regarding data storage or access. Violations of this Act will be enforced by the Federal Trade Commission (FTC) as unfair or deceptive business practices.
The newly introduced Telling Everyone the Location of data Leaving the US Act—the TELL Act—is focused squarely on what happens to your personal data once it leaves the country and lands in the People’s Republic of China (PRC). Simply put, if a website or mobile app collects your information and stores it in China, the company running that service must now clearly and conspicuously tell you two things: first, that your data is physically located in the PRC, and second, whether the Chinese Communist Party (CCP) or any Chinese State-owned company has the ability to look at or access that information (Sec. 2).
This isn't just about general privacy policies; it's about specific geographic and political risk disclosure. Think about that fitness app you use or that fun social media site—if they keep their servers in China, they have a new legal obligation to inform you upfront. The bill makes it explicitly illegal for these companies to knowingly give out false information about where the data is stored or who can access it. For consumers, this is a win for transparency, offering a clear heads-up about potential data security issues tied to geopolitics. For a company, however, this requirement to disclose access by the CCP is where things get tricky, as proving a negative or definitively knowing the internal access policies of a foreign government is a huge, potentially impossible, lift.
The job of making sure companies follow these new rules falls to the Federal Trade Commission (FTC). The TELL Act gives the FTC full authority to enforce these disclosure requirements, treating any violation exactly like an “unfair or deceptive business practice” under the existing FTC Act (Sec. 3). This is important because it means the FTC doesn't need to create a whole new set of rules or penalties; they just slot this violation into their existing framework. If a company lies or fails to disclose, they face the same fines and legal action as if they misled consumers about the quality of a product or service. This approach is efficient, but it also means the FTC will be tasked with investigating complex international data flows and the internal access rights of a foreign government—a significant administrative challenge.
The biggest impact will be felt by tech companies—especially those with large user bases or those that rely on Chinese infrastructure for storage or service delivery. They now face new compliance costs and legal risks. If a company can’t definitively confirm that the CCP cannot access the data, they might have to disclose that access is possible, even if they don't want to. This could lead some companies to simply stop storing US user data in China entirely to avoid the risk, potentially disrupting their business models. For everyday users, the benefit is clear: you get a much clearer picture of where your data is going. If you’re a small business owner relying on a cloud service that suddenly has to disclose potential CCP access, you might have to spend time and money migrating your data to a different provider just to stay compliant with your own security protocols. In short, the TELL Act provides much-needed transparency but creates a significant, potentially ambiguous, compliance burden for the tech industry.