Protecting Personal Information Challenges : Interviews with CPOs Challenges from Each Stakeholder Definitions on Cross-border PI Transfers Two Different Approaches A Case of Adequacy A Case of Accountability Taxonomy of Personal Data Transfer Across Borders Four Types of Personal Data Flow Accountability disciplines Data Transfer by Data Controllers vs. Individuals