Data Protection & Privacy 2026

Last Updated March 10, 2026

Mexico

Law and Practice

Authors



Nader Hayaux & Goebel is a leading full-service Mexican law firm with 22 partners and more than 40 associates. Its Data Privacy & Cybersecurity practice is led by one partner and supported by two associates, advising Mexican and foreign companies, both regulated and non-regulated, on compliance with Mexican data protection regulations and financial secrecy requirements. Based in Mexico City and supported by the firm’s London office, the team stands out for its extensive experience in international and cross-border data privacy and cybersecurity matters, including the implementation in Mexico of foreign regulations such as the GDPR. The practice provides comprehensive advice on privacy compliance, risk prevention and management, data breach response, biometric data processing and training programmes. Recent work includes advising a global videogame company on GDPR implementation, assisting international insurance companies with privacy notices and integrated compliance strategies, supporting a major e-commerce company on biometric data compliance, and conducting data privacy and financial secrecy audits for an insurance broker of a large automotive group.

In Mexico, personal data protection is governed by a layered framework that applies nationwide to the private sector and, through a parallel regime, to the public sector. At its apex, the Political Constitution of the United Mexican States (Constitución Política de los Estados Unidos Mexicanos) recognises privacy and the protection of personal data as rights.

For the private sector, the main instrument is the Federal Law for the Protection of Personal Data Held by Private Parties (Ley Federal de Protección de Datos Personales en Posesión de los Particulares, or LFPDPPP). It governs the processing of personal data by private entities across Mexico and operates as a national baseline irrespective of the state in which an organisation is established or conducts its operations.

The LFPDPPP is supplemented by its Regulation (Reglamento), which develops and operationalises the statute and provides practical detail that the law sets out only at a high level. In addition, the private-sector regime is applied alongside secondary instruments issued by the competent authority – such as guidelines, criteria and recommendations – which shape interpretation and enforcement practice (together with the LFPDPPP and its Regulation, the “Private DPRs”).

Processing by the public sector is governed by a separate statutory regime, the General Law for the Protection of Personal Data Held by Obligated Parties (Ley General de Protección de Datos Personales en Posesión de Sujetos Obligados), complemented by state-level legislation (together, the “Public DPRs”).

Mexican private-sector rules do not expressly claim extraterritorial reach. Cross-border scenarios are addressed instead through transfer and accountability mechanisms. Where a data controller transfers personal data to a third-party recipient that will act as an independent controller, the transferring controller must ensure that the recipient assumes and complies with obligations it is subject to under the Private DPRs.

Finally, the DPRs regulate personal data only (ie, information relating to an identifiable individual). Non-personal data will generally fall outside their scope, although the boundary is not clear-cut; certain processing may still be treated as personal data. Against that backdrop, as organisations adopt automated tools and AI-enabled processing, the Private DPRs remain the central reference point for lawful processing and accountability, while other legal regimes may impose parallel obligations.

Principles and Requirements for Processing

The Private DPRs are built around a set of principles that must be observed cumulatively, as listed below. In practice, processing will be considered compliant only where these principles are embedded in the design and day-to-day operation of processing activities.

  • Lawfulness: Processing must be grounded in a valid legal basis and carried out in accordance with the applicable framework.
  • Purpose: Data may only be collected and used for specific and legitimate purposes.
  • Loyalty: Processing must be carried out in a manner consistent with the individual’s reasonable expectations.
  • Consent: Processing requires the individual’s consent, subject to recognised exceptions.
  • Quality: Controllers should take reasonable steps to ensure data is accurate, complete and kept up to date.
  • Proportionality: Only data that is adequate, relevant, and necessary for the stated purposes should be processed.
  • Information:The individual must be informed about the details of the data processing.
  • Accountability: Controllers must implement and be able to demonstrate compliance through governance measures, confidentiality duties, appropriate security controls, and effective oversight of processors and recipients.

Data Subject Rights and Remedies

Data subjects have a core set of rights that enable individuals to control and challenge the processing of their personal data (“ARCO Rights”), as listed below. In practice, data controllers should treat these rights as operational requirements, supported by clear request channels and internal procedures.

  • Access: The right to confirm whether a controller processes the individual’s data and, if so, to obtain access and information about the relevant processing.
  • Rectification:The right to require correction or completion of personal data.
  • Cancellation: The right to request deletion of personal data.
  • Opposition: The right to object to processing in certain circumstances.
  • Revocation of consent: The right to withdraw consent where it is the basis for processing.
  • Limitation of use or disclosure: The right to request limits on certain uses or disclosures of personal data.
  • Complaint and redress: Where the individual is not satisfied with the controller’s response (or receives no response), the framework provides a route to seek review through the competent authority, which may issue binding determinations and trigger further oversight actions.

Main Compliance “To-Dos” for Companies

Though specific requirements for organisations vary depending on their business, operations and capabilities, the following workstreams are typically the core building blocks for adequate compliance:

  • Provide privacy notice: Deliver a fully compliant privacy notice that includes, among other things, the purposes of data processing, the transfers to be carried out, the types of data to be collected, and the rights of the data subjects.
  • Obtain consent: Collect and process personal data only after obtaining the data subject’s consent (the type of consent will depend on the type of data to be processed).
  • Data quality: Ensure that the personal data collected is accurate, relevant, and up to date for its intended purposes.
  • Data security: Implement appropriate technical, physical and administrative measures to protect personal data from unauthorised access, loss or damage.
  • Guarantee ARCO Rights: Allow data subjects to exercise their ARCO Rights and provide mechanisms and procedures that comply with the Private DPRs for their handling.
  • Retention period: Store personal data only for the duration necessary to fulfil the purposes stated in the privacy notice.
  • Internal procedures: Establish internal policies, procedures and training to ensure compliance with the Private DPRs, including appointing a Data Protection Officer or Department.
  • Data breach notification: Notify data subjects in compliance with the requirements set forth in the Private DPRs in case the data controllers are subject to a data breach.
  • Third-party compliance: Verify that any third-party data processor or recipient of personal data adheres to the Private DPRs and aligns with the controller’s privacy notice.

Although the Private DPRs cover multiple categories of personal data, they single out sensitive personal data as particularly important to protect. Sensitive personal data is generally understood as personal data that affects an individual’s most intimate sphere or that, if misused, could give rise to discrimination or entail a serious risk to the individual. Because of its heightened risk profile, sensitive personal data attracts stricter compliance expectations and a higher standard of care throughout the processing life-cycle.

In practical terms, controllers should ensure enhanced safeguards, including:

  • Stricter consent standard: Processing sensitive personal data generally requires express, written consent.
  • Narrowly defined purposes and minimisation: Purposes should be tightly framed and limited to what is genuinely necessary.
  • Clear outlines: The privacy notice should clearly identify the sensitive categories of data involved and the relevant information about its processing.
  • Heightened security and confidentiality: Controllers should implement stronger administrative, technical and physical measures.
  • Stronger vendor and transfer controls: Where processors or third-party controllers are involved, contracts and transfer documentation should reflect the higher sensitivity.

For minors, the Private DPRs should be read alongside the overarching standard that the best interests of the child must be the primary consideration when designing and operating data processing, meaning a controller should prioritise a minor’s welfare over commercial objectives.

In any event, data relating to minors – and, more broadly, data relating to any category of data subject – should be assessed against the applicable definition of personal data to determine the compliance requirements that follow, since such data may fall within that definition and therefore trigger the obligations set out in the Private DPRs.

Processing for research and development purposes is allowed if data controllers comply with the Private DPRs. Furthermore, the Private DPRs recognise the concept of dissociation (disociación), defined as a procedure through which personal data cannot be associated with the relevant data subject, nor can it be identified by virtue of its structure, content, or degree of disaggregation. Where dissociation is implemented with that effect, the resulting dataset would no longer qualify as personal data and may therefore be processed outside the scope of the Private DPRs. Any process that does not exclusively involve dissociated data remains subject to the Private DPRs.

On automated decision-making, the Private DPRs take a more targeted approach than establishing an “AI risk taxonomy”. A data subject may oppose processing where (i) their personal data are used in automated processing that produces undesired legal effects or otherwise significantly affects their interests, rights or freedoms, and (ii) where the processing is intended to evaluate, analyse or predict aspects of the individual without meaningful human intervention.

Accordingly, specific and binding AI prohibitions are not features of the Private DPRs themselves; constraints arise from applying general rules. Specifically, a risk-sensitive compliance expectation is embedded through (i) heightened requirements for sensitive personal data, and (ii) security obligations that should scale with the risk profile of the processing (including foreseeable harm).

Under the Private DPRs, data controllers are expected to implement safeguards to protect personal data and to respond promptly where a security incident compromises it. Where a breach occurs, the Private DPRs require controllers to take the following steps:

  • Immediate containment and mitigation: Take prompt measures to stop the incident and reduce exposure, including technical and organisational remediation.
  • Impact assessment: Evaluate the main aspects of the incident and its legal implications for rights and obligations.
  • Notification to affected individuals where warranted: Where the breach significantly affects data subjects’ property or moral rights, the controller must notify the affected individuals so they can take protective steps. Notifications should be made without undue delay and in clear, accessible terms.
  • Post-incident assessment: Determine and implement corrective actions and improvements to avoid future occurrences with the same characteristics.

The 2024 constitutional reform provided for the dissolution of the National Institute for Transparency, Access to Information and Personal Data Protection (Instituto Nacional de Transparencia, Acceso a la Información y Protección de Datos Personales, or INAI) and the redistribution of its personal data protection mandates among various public bodies according to the type of entity being regulated. These changes took effect in 2025 upon the entry into force of new legislation.

For organisations, the most significant consequence is that the Ministry for Anti-Corruption and Good Government (Secretaría de Anticorrupción y Buen Gobierno, or SABG) now serves as the primary regulator of the private sector.

Furthermore, functions previously exercised by the INAI in the public sector were reassigned to diverse government entities, in some cases at the constitutional level. The National Electoral Institute (Instituto Nacional Electoral), for example, now oversees the processing of personal data by political parties.

From an enforcement perspective, matters under the Mexican data protection framework arise from data subject complaints, security incidents, or other events that put a processing practice in question; referrals or findings generated by the public sector; and ex officio initiatives in which the competent authority opens a file on its own motion. Co-ordination within Mexico is further shaped by the post-INAI allocation of mandates described above. Cross-border engagement is not organised around a “one-stop shop” model and may instead be handled on a case-by-case basis when international elements are present (for example, cross-border transfers, foreign vendors or multinational group processing).

As mentioned in 1.1 Overview of Data and Privacy-Related Laws, the guidelines, criteria and recommendations issued by the competent authorities typically operate as interpretative tools and enforcement benchmarks. Even where such guidance is not formally binding in the same manner as legislation, it often carries significant practical weight in audits, verification procedures and the authorities’ assessment of compliance.

Enforcement by the SABG is typically structured as a step-by-step administrative workflow. In practice, the first operational step for a data controller is usually receiving a formal request for information and documentation from the authority. The authority then reviews the response and may issue follow-up requests to address inconsistencies or obtain further evidence. Regardless, companies are subject to three main tracks: (i) the rights-protection procedure (focused on ARCO Rights disputes); (ii) the verification procedure (fact-finding and compliance review); and (iii) the sanctioning procedure (imposition of penalties). Although these tracks may be connected in practice, each follows its own sequence of procedural acts and statutory timeframes.

Decisions issued by the SABG may be challenged through judicial remedies. Specifically, affected parties may seek constitutional relief (amparo) against acts and resolutions of the SABG.

Rights-Protection Procedure

If the SABG receives and admits a rights-protection request from any data subject, the SABG serves it on the controller and requests a response with supporting evidence. The file then moves through an evidentiary phase, followed by final allegations, and ends with a binding decision. As a useful rule of thumb, the authority’s decision is issued within 50 days, with the possibility of an extension for justified cause. Where the decision favours the data subject, the controller is expected to implement the ordered measures and report compliance.

Conciliation may be promoted at any stage (subject to specific limitations). If the parties reach and comply with an agreement, the matter is generally closed without the need for a final decision on the merits.

Verification Procedure

Once verification is opened, the SABG typically begins with documentary information requests and may, where warranted, escalate to an on-site verification visit to confirm processing practices and controls. The overall verification stage is subject to a maximum duration of 180 days, with the possibility of an extension for justified cause.

Sanctioning Procedure

Sanctioning usually follows findings from a rights-protection or verification matter. It starts with formal service of the alleged infringement, after which the alleged infringer is given an opportunity to respond and submit evidence. The authority then closes the evidentiary record, receives final submissions and issues a final resolution. The sanctioning procedure has an overall statutory decision period of 50 days, with the possibility of an extension for justified cause.

Potential Sanctions and Remedies

Depending on the nature of the breach, exposure may arise on three tracks:

  • Administrative sanctions: The SABG may issue orders (including warnings requiring corrective action) and impose fines, potentially multiple in a single matter. Where sensitive personal data is involved, the framework allows for fines to be doubled.
  • Criminal exposure: Certain profit-driven conduct (eg, causing a breach for gains) may trigger criminal liability, with enhanced penalties where sensitive data is involved.
  • Civil liability (damages claims): Affected individuals may pursue damages claims under general civil liability rules, with remedies centred on compensation rather than public sanctions.

The SABG’s recent communications and enforcement activity suggest the following:

  • Increased enforcement action: A more assertive response to non-compliance, with investigations used as deterrence, and an explicit narrative linking breach cases to administrative fines and, in serious scenarios, criminal exposure.
  • Preventive engagement: A parallel push for controllers to seek early institutional engagement and compliance support, signalling an emphasis on prevention alongside sanctions.
  • Execution and collection focus: Increased attention to ensuring that sanctions are executed (including fine collection) and follow-ups on legacy matters previously treated as closed.
  • Reform-oriented posture: An expressed intention to pursue updates to the federal and general data protection framework, suggesting enforcement may be accompanied by a legislative and policy push.

Privacy disputes in Mexico have not yet matured into a robust, standalone litigation stream. The legal system does not generally recognise a direct “private enforcement” action whose sole purpose is to vindicate data protection breaches in court. Rather, individuals who consider themselves affected typically need to frame their case as a civil liability claim, seeking damages for the harm allegedly caused by the relevant conduct.

This private route operates on a different logic from administrative oversight. Regulatory proceedings are designed to protect the public interest through corrective measures and sanctions (notably fines), whereas civil litigation is intended to compensate the claimant. Accordingly, the remedy most frequently pursued is monetary compensation. Assessment is usually case-specific and tied to the proof and seriousness of the alleged impact, rather than to a bespoke statutory tariff for privacy harm.

Unlike other jurisdictions, Mexico does not rely on case law to apply data privacy regulation. However, recent resolutions issued by Mexico’s Supreme Court of Justice (Suprema Corte de Justicia de la Nación) have addressed modern issues, such as the role of search engines as intermediaries in internet access, their processing of personal data, and the implications for free speech rights.

Mexican data protection law does not provide for collective administrative proceedings. Where a breach causes harm and civil liability arises, data subjects may pursue claims under the civil framework.

Non-personal data generally falls outside the scope of the Private and Public DPRs, which apply only to the processing of personal data. Information labelled “non-personal” may still be treated as personal data where individuals can reasonably be identified from the dataset itself or by linkage with other data. By contrast, data that has been robustly dissociated, such that identification is not possible, will typically remain outside the data protection regulations.

Mexico does not have a dedicated, cross-sector legal framework governing non-personal data access and sharing (including for IoT or cloud environments). Instead, non-personal data governance is primarily driven by general legal protections (notably confidentiality and trade secrets), sector-specific rules (such as financial secrecy and open finance for Mexican financial institutions), cybersecurity expectations, and contractual boundaries among data holders, service providers and data users.

Where a dataset includes both personal and non-personal elements, the approach is essentially cumulative: privacy rules govern the personal-data layer, while other legal regimes govern the non-personal value layer (confidentiality, trade secrets and IP), with contracts typically co-ordinating how these obligations operate in practice.

Overall, the interaction is less about statutory “data access rights” and more about layering: the Private DPRs set the compliance perimeter for identifiable information; confidentiality and IP rules protect the commercial value of non-personal datasets, as well as contractual arrangements allocate rights, responsibilities and risk among data holders, service providers and data users.

Unless a dataset has been properly dissociated so that individuals are no longer identifiable, the processing will generally fall within the scope of the data protection regime, and the primary rights available to individuals are the ARCO Rights.

Under Mexico’s current framework, non-personal data is not overseen by a single, cross-sector regulator; instead, the applicable rules and enforcement authorities vary depending on the nature of the dataset and the sector in which it is used.

The Private DPRs require data controllers to inform data subjects when using remote or local electronic, optical or other technologies that automatically and simultaneously collect personal data upon interaction, such as cookies. This notification must be provided at the moment of contact through a visible communication or warning that details the use of such technologies, the data collected, and how to disable them.

Personalised and targeted advertising under the Private DPRs is regulated in the same way as other data processing. A key aspect is the distinction between primary and secondary purposes: processing that is necessary to provide the product or service requested by the individual will be categorised as primary, whereas advertising, commercial prospecting and similar activities will generally fall within secondary purposes (subject to a case-by-case assessment).

Where marketing or profiling is treated as a secondary purpose, the data controller must ensure that it is clearly disclosed in the privacy notice and that individuals are given straightforward mechanisms to withhold consent or withdraw consent for those purposes. Individuals may exercise the right of opposition to processing for secondary purposes, which is particularly relevant where profiling or behavioural targeting is involved.

Additional sensitivity arises in two scenarios. Firstly, it applies where marketing relies on sensitive personal data. Secondly, where advertising relates to minors, controllers should apply a heightened standard of care and avoid practices that could be seen as undermining a child’s best interests, as discussed in 1.3 Special Categories of Personal Data.

Mexican data protection rules apply to employers in the same way they apply to any other data controller. Accordingly, an employer that collects or uses employee or candidate information must comply with the Private DPRs throughout the employment life-cycle.

In practice, this means that workplace monitoring and the use of IT systems should be structured around necessity and proportionality. Although corporate devices and accounts are work tools, employees retain privacy interests, and monitoring should be limited.

In M&A transactions, the regular data privacy requirements apply. Personal data often becomes part of the due diligence exercise, the integration planning and – depending on the structure – the assets being acquired. Where that is the case, the parties should also treat data protection as a discrete workstream and implement controls designed to ensure compliance with the Private DPRs throughout the deal cycle.

In practice, companies should consider the following steps:

  • Confirm whether personal data is in scope (and at what sensitivity).
    1. Identify whether the transaction involves personal data at all, and whether any sensitive personal data is implicated.
    2. Map the categories of data likely to be reviewed or transferred (eg, employee, customer, supplier, health, financial, geolocation).
    3. Confirm that the contemplated uses of the data (diligence, valuation, integration) align with the principles of purpose limitation and proportionality.
  • Define how, when and by whom the data will be accessed.
    1. Determine where relevant datasets are stored and how they will be made available (eg, data room, clean teams, extracts, redacted samples).
    2. Identify the recipients (deal team, advisers, auditors, consultants, potential buyers) and apply need-to-know access controls.
    3. Clarify where the data will be held during the process and after closing, including any cross-border elements.
  • Implement deal-specific safeguards and documentation.
    1. Put in place appropriate confidentiality and data-handling terms, including restrictions and covenants on processing, onward disclosure, retention and deletion/return.
    2. Where the buyer (or advisers) will process data on behalf of the seller, adopt suitable processor-type controls; where disclosure is to an independent recipient, ensure the transfer is properly documented and consistent with the applicable privacy notice and any required consents.
    3. Apply stricter controls where sensitive data is involved, including tighter access, segmentation and enhanced security measures.
  • Assess security posture and breach history.
    1. Identify prior security incidents affecting relevant datasets and evaluate any open remediation items.
    2. Assess foreseeable breach risks at three points – pre-closing, during diligence/transition and during post-closing integration – and align technical and organisational measures accordingly.
  • Validate compliance foundations.
    1. Confirm that the data was collected and is being used under appropriate transparency practices (privacy notices) and, where required, valid consents.
    2. Review whether existing security measures are proportionate to the risks and adequate for the intended deal-related processing and subsequent integration.

This approach helps reduce unnecessary exposure during due diligence, supports smoother post-closing integration, and mitigates regulatory and litigation risk when personal data forms part of the transaction footprint.

The Private DPRs permit cross-border transfers of personal data, provided the transferring data controller complies with the applicable transparency and, where required, consent requirements. For these purposes, a transfer should be understood broadly as any communication, disclosure or making available of personal data to a third party other than the data subject (or its subsidiaries, affiliates and service providers), within or outside Mexico. Importantly, the fact that a transfer is international does not dilute the controller’s obligations: the general processing requirements continue to apply, and cross-border transfers are treated as an extension of the originating processing activity rather than as a separate, unregulated step.

A defining feature of the Mexican approach is that the foreign recipient must assume obligations equivalent to those borne by the transferring controller under the Private DPRs. In practice, this is typically implemented through contractual arrangements. While the DPRs allow controllers to rely on a range of legal instruments to meet their duties, contractual clauses are the principal mechanism expressly contemplated for international transfers. As a baseline, transfer clauses should ensure that:

  • the recipient undertakes to comply with obligations equivalent to those applicable to the transferring controller under the Private DPRs; and
  • the recipient agrees to process the data consistently with the scope of the authorisations and limitations communicated to the data subject through the applicable privacy notice (including the stated purposes and any transfer conditions).

Where there is uncertainty about whether a contemplated cross-border transfer aligns with the Private DPRs, a controller may seek a non-binding view from the competent authority on the transfer’s permissibility and the adequacy of the proposed safeguards.

No government notifications or approvals are required to transfer data internationally. The data controller must include transfers of personal data in the privacy notice to inform the data subject when consent is required.

Mexico’s regulation on personal data protection (both Private and Public DPRs) does not establish specific data localisation requirements, nor do they contemplate the need to store personal data in-country. Therefore, under the scope of personal data protection, data can be transferred internationally; however, data controllers are still required to implement measures to safeguard data and comply with the requirements for transferring personal data established in the DPRs, such as providing a privacy notice to the data recipient.

Aside from the nation’s sovereignty and the provisions of the Constitution, there are no specific statutes regarding “blocking”.

As discussed in 1.7 Regulators, recent regulatory changes primarily focused on dissolving the INAI and reallocating its responsibilities. On this note, the Regulation of the LFPDPPP has not been amended to properly address these changes; therefore, further updates are expected for this instrument. Additionally, while several legislative initiatives on specific data protection matters were proposed in 2025, none have been enacted; however, the SABG has stated that additional regulatory changes are needed.

Nader, Hayaux & Goebel

Paseo de los Tamarindos
No. 400-B, Piso 7
Bosques de las Lomas
05120 CDMX
Mexico

+52 55 4170 3000

info@nhg.com.mx nhg.mx
Author Business Card

Trends and Developments


Authors



Baker McKenzie has 60 years of experience in Mexico and has a strong presence in five states of the country, namely Mexico City, Guadalajara, Juárez, Monterrey and Tijuana. As the most recommended law firm in major practice areas around the world, its offices are constantly involved in major mergers and acquisitions and sophisticated financial transactions. The firm’s global presence allows it to rapidly create teams of specialists in multiple jurisdictions to meet the needs of its clients. Baker McKenzie is known locally for the highly specialised and industry-focused knowledge of its attorneys.

Executive Summary

Mexico’s privacy architecture was fundamentally reshaped in 2025. A sweeping constitutional reform dissolved the autonomous data protection regulator and ushered in a new statutory framework, including a revised Federal Law for the Protection of Personal Data Held by Private Parties (“LFPDPPP 2025”, for its initials in Spanish), effective from 21 March 2025. Enforcement authority over the private sector moved to the Secretariat of Anti-Corruption and Good Governance (SABG, for its initials in Spanish), an executive-branch body, while judicial review now proceeds through specialised federal courts via amparo.

For businesses, the impact has been immediate: refreshed definitions, tighter consent and privacy notice mechanics, and a new enforcement and litigation pathway, all unfolding during a transitional period in which implementing regulations remain pending and further revisions to the LFPDPPP 2025 may result in a new law which it is rumoured will be issued in 2026. This analysis reflects the legal and regulatory position as of February 2026.

At the same time, Mexico is rolling out a biometric digital identity system (CURP biométrica andLlave MX), a National Cybersecurity Plan (2025–2030) and seeking real-time access to digital platforms transactional information, including personal data of taxpayers/users for tax audit purposes. Together, these initiatives elevate risks and compliance expectations regarding governance, security, identity proofing and electronic evidence preservation. Cross-border strategies should also anticipate the USMCA joint review in 2026 and Mexico’s engagement with the UN Convention against Cybercrime, both of which will influence data flow governance and incident response standards.

Treat 2026 as a year to reset the foundations: assess, harden and document privacy and security programmes now, allowing future regulatory updates to require only adjustments, rather than a full redesign.

1. Introduction

Mexico’s data protection landscape has undergone a profound transformation during 2025–2026. Rather than incremental reform, change has been driven by institutional restructuring, political realignment, and an ambitious digital transformation agenda from the government. These dynamics have created a complex compliance environment in which companies must plan for uncertainty.

Although the market anticipated a substantive modernisation of Mexico’s privacy framework, particularly around the European General Data Protection Regulation (GDPR), artificial intelligence (AI), automated processing and decision-making, and algorithmic transparency, the enacted private sector law largely preserves the architecture of the 2010 regime. As a result, organisations are increasingly relying on internal governance, risk-based analysis and international standards to bridge regulatory gaps while awaiting secondary legislation, new enforcement priorities from the new data protection authority and early judicial interpretation.

The reforms originate in a November 2024 constitutional amendment that eliminated seven autonomous agencies, including the National Institute for Transparency, Access to Information and Personal Data Protection (INAI), which had served as Mexico’s data protection authority. Such reform was effective in early 2025. Decrees published in the Official Gazette in March  2025 formalised a new law (LFPDPPP 2025) for the private sector and a General Law governing public sector processing of personal data, both effective from 21 March 2025.

As of early 2026, implementing regulations have not yet been published. SABG initiated stakeholder dialogues in January 2026, but no revised regulations or technical corrections have appeared in the Official Gazette. No judicial precedents from the specialised courts have been reported publicly. SABG has, however, signalled increased scrutiny following several high-profile cyber incidents during the end of 2025 and early 2026, suggesting that enforcement activity may resume before the regulatory framework is fully harmonised.

2. Legislative Shifts and Regulatory Redesign

2.1 The 2025 reset: new laws, new authority, new courts

On 20 March 2025, Mexico enacted a package of reforms realigning its data protection framework with the dissolution of INAI. Central to this package are the new LFPDPPP (private sector) and the General Law on the Protection of Personal Data Held by Obligated Subjects (public sector) (LFPDPPSO, for its initials in Spanish), both effective the following day.

Private sector oversight now resides with SABG, an executive-branch ministry. Appeals against enforcement decisions proceed through specialised federal courts via amparo. This institutional redesign matters in practice: enforcement culture, evidentiary expectations and timelines are likely to differ from those developed under INAI. During this bedding-in period, companies should document compliance judgments and risk-based decisions carefully, anticipating later scrutiny by courts rather than administrative precedent.

2.2 LFPDPPP 2025: continuity over transformation

The LFPDPPP 2025 preserves the core principles of the 2010 law: lawfulness, consent, information, quality, purpose, loyalty, proportionality and accountability. However, critical definitions such as “data processing”, “personal data” and “data controller”, which were previously aligned with international frameworks such as the GDPR, have now been altered, creating interpretative risks. Privacy Notices must now describe processing activities with greater precision, disclose whether sensitive personal data is being processed, and distinguish those activities which the data subject may choose to opt-in to or opt-out from before the collection of data takes place.

Structurally, however, the statute remains familiar. The absence of a dedicated framework for AI governance, automated decision-making or algorithmic transparency is widely viewed as a missed opportunity. Until secondary regulation or future legislative amendments address these areas, organisations must rely on internal controls and risk assessments following a data protection impact assessment methodology, together with international benchmarks to manage exposure.

2.3 Key definitional and structural updates

Updated definitions emphasise the breadth of “personal data” and recalibrate consent standards towards specificity and revocability. Privacy notices must be clearer and more granular, identifying categories of data and linking them to defined purposes. These changes heighten supply-chain accountability and reinforce the need for auditable data-processing agreements.

2.4 Consent, notices, transfers and supply-chain accountability

Consent under the new statute must be free, specific and informed, with diminished tolerance for bundling multiple purposes under broad compatibility theories. When purposes change materially, fresh consent should be obtained. Privacy notices must distinguish which purposes require consent and clearly identify sensitive data.

Although the statute no longer mandates a standalone section relating to transfers in comprehensive notices, transfer obligations themselves remain intact. Organisations should design separate, standardised transfer workflows and obtain consent where required. The definition of publicly accessible sources has been narrowed to those explicitly authorised by law, excluding datasets obtained through informal or unlawful means.

Administrative fines can reach up to 320,000 UMAs (approximately MXN40 million), with enhanced penalties for sensitive data and repeat violations. Appeals against SABG resolutions proceed through amparo, reinforcing the need for precise lawful-basis mapping, consent records and decision logs.

2.5 Implementing regulations and transitional risk

The legislative package contemplated harmonised regulations following enactment. In practice, most organisations continue to rely on the 2011 Regulations and legacy guidance, interpreting references to the former authority as applying to SABG.

As of February 2026, no updated regulations or technical corrections have been published. Market speculation persists that additional legislative amendments could precede finalised regulations, potentially rendering draft rules obsolete. In this environment, conservative compliance strategies are prudent: overdisclosure in notices, disciplined purpose limitation, low-friction re-consent mechanisms, and meticulous documentation of interpretative choices.

2.6 Institutional transition: from INAI to SABG

The shift from an autonomous regulator to an executive-branch authority marks a structural pivot. During this transition, enforcement activity slowed and official guidance became limited, prompting consumer protection agencies, financial regulators and other sector-specific authorities to step in and fill the gaps.

Given her record of strict oversight of tax regulation while serving at the tax authority, the new head of SAGB was widely expected to take an equally firm approach to data protection enforcement. Her background suggested that SABG would not hesitate to pursue significant actions against major companies, including technology operators.

Early enforcement actions that occurred in January 2026 following several highly publicised cyber incidents affecting Mexican governmental and private organisations and data subjects already illustrate this shift, with authorities initiating formal proceedings immediately and making them public from the outset. This represents a sharp departure from prior INAI practices, where preliminary review stages often allowed early clarification or resolution before escalation. The new approach indicates a greater willingness to pair legal processes with public communication to enhance deterrence. At the same time, growing calls for stronger sanctions indicate that enforcement will intensify as broader legislative reforms move forward.

While no public sanctions or judicial decisions have been issued as of early 2026, early probes suggest heightened scrutiny of data controllers and processors’ conduct and incident handling. Companies should prepare for uneven enforcement criteria and prioritise defensible governance, DPIA-style analysis for high-risk processing (such as AI and biometrics), and investigation-ready documentation.

3. Cybersecurity: Strategy Ahead of Statute

Mexico still lacks a single comprehensive cybersecurity statute. Obligations remain distributed across criminal law, data protection rules and sectoral regulation. In late 2025, however, the federal government presented a National Cybersecurity Plan (2025–2030) and a General Cybersecurity Policy for the federal administration.

These instruments signal a more co-ordinated approach to cyber risk, including centralisation of CSIRTs/CERTs, phased adoption of AI-driven defences and enhanced co-operation on incident response. Mexico remains highly exposed to ransomware, with over 150 publicly reported victims since 2019. For companies, governance is the priority: integrate cyber risk into enterprise risk management, align incident response with electronic-evidence preservation, maintain 24/7 law-enforcement contact protocols and conduct regular tabletop exercises.

Sectoral alignment is emerging, particularly in financial services and critical infrastructure, where supervisory expectations already include breach reporting and resilience testing.

4. Mexico’s New Identity Verification Framework: Key Implications for Companies

Mexico’s emergency involving forced disappearances has prompted the government to introduce sweeping reforms, centred on the creation of a unified identity verification framework known as the Plataforma Única de Identidad (PUI). Designed to consolidate biometric and administrative records, the PUI enables faster cross-agency verification and seeks to strengthen national search and identification capabilities.

A key element of the new regime is the transition to the electronic, biometric CURP, a new national identity document which replaces legacy identifiers and incorporates facial images, fingerprints and digital signatures. Any organisation classified as a “Diverse Institution”, that is, any entity maintaining records useful for identifying individuals, will be required to collect the electronic CURP. This broad definition encompasses companies with customers, users, or patient, student or employee databases across sectors such as finance, healthcare, telecommunications, insurance, transportation, education, private assistance and delivery services. Consequently, even businesses with no connection to public security must interconnect with the PUI and collaborate with law enforcement authorities, marking a significant compliance shift for nearly all data processing entities in Mexico.

To comply, organisations must connect to the PUI through secure web-service protocols, implement internal search capabilities (basic, historical and continuous), adopt cybersecurity measures aligned with a technical manual, expand breach-notification procedures and maintain updated compliance documentation. Sanctions for non-compliance are substantial, ranging from USD60,000 to USD120,000.

These reforms require companies to redesign onboarding processes to register the electronic CURP, align systems with the technical manual, strengthen privacy and cybersecurity controls, and reassess cross-border data transfers involving identity attributes. Ultimately, it is clear that Mexico is moving towards a model where identity governance and public-security objectives converge, demanding robust, multidisciplinary compliance strategies from all organisations operating in the country.

5. Real-Time Data Access Requirements: Mexico’s New Article 30-B Framework

Article 30‑B of Mexico’s Federal Fiscal Code, effective from 1 April 2026, will require certain digital platforms to grant the tax authority (SAT) permanent, real‑time access to transactions databases for tax‑verification purposes. This represents a significant departure from traditional audit mechanisms, which operate through targeted, time‑bound information requests. By enabling continuous visibility into operational and transactional data, the reform creates a potential risk of exfiltration of personal data relating to customers.

This real‑time monitoring obligation raises considerable privacy and cybersecurity concerns. Granting SAT officials unrestricted system access increases the risk of data misuse, unauthorised extraction, or cross‑referencing of sensitive information for purposes unrelated to tax compliance. To mitigate these risks, companies should deploy strict technical and procedural controls, such as compliant platforms, detailed access logs, and mandatory on‑screen notices reminding officials of their legal duties and liabilities.

For digital businesses operating in Mexico, Article 30‑B will require a comprehensive compliance strategy. Organisations must ensure that tax‑verification access is tightly constrained, auditable, and compatible with their confidentiality obligations. This includes implementing protective controls, updating internal policies and reassessing how high‑volume data environments are monitored. Ultimately, the proposal signals a shift towards far more intrusive digital‑economy enforcement, and companies will need to balance tax compliance expectations with robust protections for user data and corporate systems.

6. International Context: USMCA and the UN Cybercrime Convention

The USMCA Digital Trade Chapter continues to anchor Mexico’s cross-border data strategy. The first joint review, scheduled for July 2026, is expected by many observers to increase discussions regarding cybersecurity co-operation, AI governance and automated decision-making transparency. Even in the absence of immediate binding outcomes, supervisory expectations and contractual standards often evolve in parallel with these reviews.

Separately, the UN Convention against Cybercrime, opened for signature in Hanoi in October 2025, establishes a framework for harmonised cybercrime definitions, 24/7 co-operation mechanisms and standardised electronic-evidence preservation. Mexico has characterised the Convention as a historic step towards improved evidence sharing. Corporate incident response programmes should anticipate expedited evidence requests and stricter chain-of-custody expectations.

7. Practical Roadmap for Doing Business in Mexico in 2026

A practical compliance roadmap should begin by determining whether a company falls within the scope of a “Diverse Institution” under Article 12 Bis of the Ley General en Materia de Desaparición Forzada de Personas, as amended in 2025, and by extension under the interconnection obligations created through the Ley General de Población, as well as whether it qualifies as a “Digital Platform” under Article 30-B of the Federal Fiscal Code. This threshold assessment will determine the breadth of compliance duties and the pace at which implementation must occur.

Once within scope, organisations should begin by mapping the types of data they hold, focusing specifically on transaction-level information and identity-related data that may be subject to access requests. This includes both historical and recent information that may need to be made available to different authorities operating under varying technical environments and procedural rules. Any collaboration with authorities must also ensure robust traceability and auditable evidence of access.

In parallel, companies should assess the maturity of their cybersecurity position against OWASP and NIST benchmarks, as required by the PUI framework. This involves aligning internal programmes with national cybersecurity expectations, assigning accountable owners, inventorying critical assets, exercising incident response capabilities and integrating mechanisms for the preservation of electronic evidence. From there, organisations should initiate the development and deployment of the mandatory PUI endpoints, together with the redesign of onboarding and data collection processes to ensure compliant intake and management of identification data.

These operational changes must be accompanied by a full refreshment of privacy notices. Notices should be concise, specific, and explicit about categories of personal and sensitive data. Any consent-dependent activities must be clearly identified, and cross-border transfers must be supported by standardised, well-documented workflows. Consent management itself requires renewed rigour, as legacy reliance on broad or “compatible” purposes is becoming increasingly unsustainable. If a company is using AI tools to monitor or predict employee conduct or behaviour, implementation should comply with privacy laws, and candidate and employee privacy notices should be refreshed as well.

Data processors must be treated as material compliance risks, with contracts that reflect statutory obligations concerning security, sub-processing controls, breach notification standards and audit rights.

Finally, companies should re-baseline their records of processing, lawful basis mapping and accountability documentation. With judicial oversight potentially weakening, investigation-ready files, such as DPIAs for high-risk processing, incident reports, vendor due diligence records, system logs and training documentation, are becoming essential safeguards. This strengthened governance will be critical as organisations navigate a regulatory environment in which identity, security and enforcement frameworks converge.

8. Sector Notes

8.1 Financial services

Institutions already face stringent supervisory expectations regarding breach reporting, governance and resilience testing. The national cybersecurity agenda is likely to reinforce electronic-evidence preservation and inter-institutional co-operation. Vendors should be subject to equivalent testing and drills.

8.2 Consumer and e-commerce

Narrowed definitions of publicly accessible sources and refined consent mechanics require renewed scrutiny of marketing data acquisition. Privacy notices, cookie banners and preference centres should align with purpose specificity and retention transparency.

8.3 Health and life sciences

Sensitive data handling and identity flows demand heightened risk assessment, particularly in telemedicine and employee benefits programmes. Clinical and HR governance should be co-ordinated to align access controls, logging and retention with sensitivity and risk.

9. Governance, Rights and Civil Liberties

Centralised digital identity and executive-branch oversight of privacy have prompted a sustained civil-liberties debate. For companies, the most sustainable position is technical neutrality anchored in privacy by design: collect only what is necessary, document proportionality, encrypt thoroughly and enable meaningful user controls.

Data-subject rights (known as ARCO rights) remain formally intact, but procedural expectations may tighten under SABG, particularly in regard to identity verification and response documentation. Automated decision-making remains largely unregulated, increasing the importance of internal safeguards, human-in-the-loop processes, explainability documentation and risk assessments, especially in credit, insurance, employment and mobility contexts.

10. What to Watch For

Key developments to monitor include publication of harmonised LFPDPPP regulations, potential technical corrections to statutory text, and early enforcement signals from SABG. The first judicial decisions from specialised courts will shape practical boundaries regarding consent, notices and accountability.

Digital platforms should begin developing cybersecurity and technical governance standards that allow companies to provide controlled and secure access to their information when required by tax authorities. At the same time, organisations should expect the electronic CURP to become the default mechanism for identifying employees and customers across a wide range of sectors, as Mexico continues to implement biometric-based identity verification. In parallel, companies should anticipate a growing volume of information requests from police and investigative authorities, who, under several of the 2025 reforms, may increasingly rely on corporate datasets for real-time or near-real-time investigative purposes.

Internationally, Mexico’s ratification and implementation of the UN Convention against Cybercrime and the outcomes of the USMCA 2026 review will influence electronic-evidence standards, cross-border data governance and AI-related expectations. Organisations that track these developments and maintain disciplined, well-documented governance will be well positioned to adapt incrementally rather than rebuild wholesale.

Mexico’s 2025–2026 privacy and cybersecurity environment is dynamic but navigable. Anchor compliance with the new statutory text, interpret consent and notice requirements conservatively, and pre-wire security and incident response programmes for cross-border evidence co-operation. Treat 2026 as a reset year: tighten controls now so future regulatory clarity is a matter of evolution rather than revolution.

Baker McKenzie

Pedregal 24, 12th floor
Lomas Virreyes / Col. Molino del Rey
México City, 11040
Mexico

+52 55 5279 2900

Adrian.Rodriguez-Montfort@bakermckenzie.com www.bakermckenzie.com/en/locations/latin-america/mexico
Author Business Card

Law and Practice

Authors



Nader Hayaux & Goebel is a leading full-service Mexican law firm with 22 partners and more than 40 associates. Its Data Privacy & Cybersecurity practice is led by one partner and supported by two associates, advising Mexican and foreign companies, both regulated and non-regulated, on compliance with Mexican data protection regulations and financial secrecy requirements. Based in Mexico City and supported by the firm’s London office, the team stands out for its extensive experience in international and cross-border data privacy and cybersecurity matters, including the implementation in Mexico of foreign regulations such as the GDPR. The practice provides comprehensive advice on privacy compliance, risk prevention and management, data breach response, biometric data processing and training programmes. Recent work includes advising a global videogame company on GDPR implementation, assisting international insurance companies with privacy notices and integrated compliance strategies, supporting a major e-commerce company on biometric data compliance, and conducting data privacy and financial secrecy audits for an insurance broker of a large automotive group.

Trends and Developments

Authors



Baker McKenzie has 60 years of experience in Mexico and has a strong presence in five states of the country, namely Mexico City, Guadalajara, Juárez, Monterrey and Tijuana. As the most recommended law firm in major practice areas around the world, its offices are constantly involved in major mergers and acquisitions and sophisticated financial transactions. The firm’s global presence allows it to rapidly create teams of specialists in multiple jurisdictions to meet the needs of its clients. Baker McKenzie is known locally for the highly specialised and industry-focused knowledge of its attorneys.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.