Dutch AP fines Yango €100 million over Russia transfers — why boards should revisit GDPR transfer governance

Scott Dooley
4 min read · May 14, 2026

On 8 May 2026, the Dutch Autoriteit Persoonsgegevens fined MLU B.V. €100 million after finding that the European version of the Yango taxi app transferred personal data from Norway and Finland to Russia without adequate GDPR protection. That headline matters well beyond ride-hailing. For boards, the point is simple: if personal data can be accessed from a high-risk jurisdiction, the problem is not solved by a contract, a group chart, or a vendor assurance slide. It is a governance issue.

The AP says Yango stored a large volume of customer and driver data on servers in Russia, including driving licence scans, home addresses, contact details, account numbers, precise locations, trip data, images, chat content and social security numbers. The case was investigated with the Norwegian and Finnish authorities because the affected people were in those countries while MLU, the entity behind the app in Europe, is based in the Netherlands.

What the AP found

According to the AP notice, MLU failed to ensure that personal data transferred to Russia was protected to a standard equivalent to Europe. AP chair Aleid Wolfsen said the absence of an independent Russian data protection authority increased the risk that the Russian state could gain access to the data. The regulator tied the failings to real-world safety risk and a substantive compliance failure.

That point is worth dwelling on. This was not a narrow dispute about paperwork wording. It was about the destination environment. Under Article 44 and Article 46 GDPR, organisations can move personal data outside the EEA only where the transfer mechanism and the facts on the ground preserve an essentially equivalent level of protection. If local law gives security services broad access, the transfer assessment changes.

Why this is a board-level warning

The clearest signal comes from an earlier Norwegian supervisory letter in the same Yango matter. In August 2023, Datatilsynet said transfers connected to the app were contrary to GDPR Chapter V and pointed to Russian rules requiring 24/7 remote access for state security bodies to taxi-service databases from 1 September 2023. Datatilsynet expressly cited Article 44, Article 46 and the Schrems II standard on third-country access to personal data.

That is why this fine belongs on a board agenda. Many businesses still treat international transfers as a legal annex handled once during procurement. In practice, the risk often sits elsewhere: support engineers in another jurisdiction, a parent company with back-end access, a shared analytics environment, or a vendor that quietly routes data to an affiliate. If the real access path is not mapped, the transfer assessment is fantasy.

Measured Collective’s earlier piece on transfer guidance makes the same point from a UK angle: the question is not whether a transfer clause exists, but whether the organisation has tested how data actually moves and who can reach it.

What organisations should check now

  • Map actual access, not merely the formal hosting location. Ask where support, development, analytics and fraud teams can view or pull personal data.
  • Review vendor and group-company onward transfers. A UK or EU contract does not help much if the recipient can still expose the data elsewhere in the chain.
  • Re-run transfer risk assessments where the destination country creates surveillance or enforcement risk. Document why your safeguards still work, or stop the flow.
  • Escalate sensitive combinations to leadership. Location data, travel history, identity documents and employee records should not move to high-risk jurisdictions without legal sign-off and operational controls.

Why the lesson goes beyond taxi apps

Most companies are not running a taxi platform in Finland or Norway. That misses the point. The same legal question appears when HR systems are supported from overseas, when SaaS vendors use offshore engineering teams, or when group companies pool customer records for analytics. Once regulators conclude that the destination regime can cut through your safeguards, the compliance story changes fast. The legal risk can then turn into customer-notice risk, employment risk, procurement risk and, as our piece on cross-border lawsuits shows, litigation risk as well.

MLU may challenge the fine. Even so, the AP’s message is already clear on 8 May 2026: if your organisation transfers personal data into an environment where state access risk cannot be credibly controlled, regulators will not treat standard clauses as a magic shield. They will ask what the board knew, what the organisation checked, and why the transfer was allowed to continue.

If your team needs a practical grounding before reviewing transfer governance, the GDPR Essentials course covers GDPR principles, lawful bases, data subject rights and the accountability habits that stop this sort of problem becoming a headline.

Sources

Author

  • Scott Dooley is a seasoned entrepreneur and data protection expert with over 15 years of experience in the tech industry. As the founder of Measured Collective and Kahunam, Scott has dedicated his career to helping businesses navigate the complex landscape of data privacy and GDPR compliance.

    With a background in marketing and web development, Scott brings a unique perspective to data protection issues, understanding both the technical and business implications of privacy regulations. His expertise spans from cookie compliance to implementing privacy-by-design principles in software development.

    Scott is passionate about demystifying GDPR and making data protection accessible to businesses of all sizes. Through his blog, he shares practical insights, best practices, and the latest developments in data privacy law, helping readers stay informed and compliant in an ever-changing regulatory environment.

    View all posts