A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks.[1] While cybersecurity regulations aim to minimize cyber risks and enhance protection, the uncertainty arising from frequent changes or new regulations can significantly impact organizational response strategies.[1]
There are numerous measures available to prevent cyberattacks. Cybersecurity measures include firewalls, anti-virus software, intrusion detection and prevention systems, encryption, and login passwords.[2] There have been attempts to improve cybersecurity through regulation and collaborative efforts between the government and the private sector to encourage voluntary improvements to cybersecurity.[1][2][3] Industry regulators, including banking regulators, have taken notice of the risk from cybersecurity and have either begun or planned to begin to include cybersecurity as an aspect of regulatory examinations.[2]
Recent research suggests there is also a lack of cyber-security regulation and enforcement in maritime businesses, including the digital connectivity between ships and ports.[4]
Background
editIn 2011 the US DoD released a guidance called the Department of Defense Strategy for Operating in Cyberspace which articulated five goals: to treat cyberspace as an operational domain, to employ new defensive concepts to protect DoD networks and systems, to partner with other agencies and the private sector in pursuit of a "whole-of-government cybersecurity Strategy", to work with international allies in support of collective cybersecurity and to support the development of a cyber workforce capable of rapid technological innovation.[3] A March 2011 GAO report "identified protecting the federal government's information systems and the nation's cyber critical infrastructure as a governmentwide high-risk area" noting that federal information security had been designated a high-risk area since 1997. As of 2003 systems protecting critical infrastructure, called cyber critical infrastructure protection of cyber CIP has also been included.[5]
In November 2013, the DoD put forward the new cybersecurity rule (78 Fed. Reg. 69373), which imposed certain requirements on contractors: compliance with certain NIST IT standards, mandatory reporting of cybersecurity incidents to the DoD, and a "flow-down" clause that applies the same requirements to subcontractors.[6]
A June 2013 Congressional report found there were over 50 statutes relevant to cybersecurity compliance. The Federal Information Security Management Act of 2002 (FISMA) is one of the key statutes governing federal cybersecurity regulations.[6]
United States
editFederal government
editThere are few federal cybersecurity regulations and the ones that exist focus on specific industries. The three main cybersecurity regulations are the 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act, which included the Federal Information Security Management Act (FISMA). The three regulations mandate that healthcare organizations, financial institutions, and federal agencies should protect their systems and information.[3] For example, FISMA, which applies to every government agency, "requires the development and implementation of mandatory policies, principles, standards, and guidelines on information security." However, the regulations do not address numerous computer-related industries, such as Internet Service Providers (ISPs) and software companies.[4] Furthermore, the regulations do not specify what cybersecurity measures must be implemented and require only a "reasonable" level of security. The vague language of these regulations leaves much room for interpretation. Bruce Schneier, the founder of Cupertino's Counterpane Internet Security, argues that companies will not make sufficient investments in cybersecurity unless the government forces them to do so.[5] He also states that successful cyberattacks on government systems still occur despite government efforts.[6]
It has been suggested that the Data Quality Act already provides the Office of Management and Budget the statutory authority to implement critical infrastructure protection regulations by the Administrative Procedure Act rulemaking process. The idea has not been fully vetted and would require additional legal analysis before a rulemaking could begin.[7]
State governments
editState governments have attempted to improve cybersecurity by increasing public visibility of firms with weak security. In 2003, California passed the Notice of Security Breach Act, which requires that any company that maintains personal information of California citizens and has a security breach must disclose the details of the event. Personal information includes name, social security number, driver's license number, credit card number or financial information.[7] Several other states have followed California's example and passed similar security breach notification regulations.[8] Such security breach notification regulations punish firms for their cybersecurity failures while giving them the freedom to choose how to secure their systems. Also, the regulation creates an incentive for companies to voluntarily invest in cybersecurity to avoid the potential loss of reputation and the resulting economic loss that can come from a successful cyber attack.[8]
In 2004, the California State Legislature passed California Assembly Bill 1950, which also applies to businesses that own or maintain personal information for California residents. The regulation dictates for businesses to maintain a reasonable level of security and that they required security practices also extend to business partners.[9] The regulation is an improvement on the federal standard because it expands the number of firms required to maintain an acceptable standard of cybersecurity. However, like the federal legislation, it requires a "reasonable" level of cybersecurity, which leaves much room for interpretation until case law is established.[10]
Proposed regulation
editThe US Congress has proposed numerous bills that expand upon cybersecurity regulation. The Consumer Data Security and Notification Act amends the Gramm-Leach-Bliley Act to require disclosure of security breaches by financial institutions. Congressmen have also proposed "expanding Gramm-Leach-Bliley to all industries that touch consumer financial information, including any firm that accepts payment by a credit card."[11] Congress has proposed cybersecurity regulations similar to California's Notice of Security Breach Act for companies that maintain personal information. The Information Protection and Security Act requires that data brokers "ensure data accuracy and confidentiality, authenticate and track users, detect and prevent unauthorized activity, and mitigate potential harm to individuals."[12]
In addition to requiring companies to improve cybersecurity, Congress is also considering bills that criminalize cyberattacks. The Securely Protect Yourself Against Cyber Trespass Act (SPY ACT) was a bill of this type. It focused on phishing and spyware bill and was passed on May 23, 2005, in the US House of Representatives but died in the US Senate.[8] The bill "makes unlawful the unauthorized usage of a computer to take control of it, modify its setting, collect or induce the owner to disclose personally identifiable information, install unsolicited software, and tamper with security, anti-spyware, or anti-virus software."[13]
On May 12, 2011, US president Barack Obama proposed a package of cybersecurity legislative reforms to improve the security of US persons, the federal government, and critical infrastructure. A year of public debate and Congress hearings followed, resulting in the House of Representative passing an information sharing bill and the Senate developing a compromise bill seeking to balance national security, privacy, and business interests.
In July 2012, the Cybersecurity Act of 2012 was proposed by Senators Joseph Lieberman and Susan Collins.[14] The bill would have required creating voluntary "best practice standards" for protection of key infrastructure from cyber attacks, which businesses would be encouraged to adopt through incentives such as liability protection.[15] The bill was put to a vote in the Senate but failed to pass.[16] Obama had voiced his support for the Act in a Wall Street Journal op-ed[17], and it also received support from officials in the military and national security including John O. Brennan, the chief counterterrorism adviser to the White House.[18][19] According to The Washington Post, experts said that the failure to pass the act may leave the United States "vulnerable to widespread hacking or a serious cyberattack." [20] The act was opposed by Republican senators like John McCain who was concerned that the act would introduce regulations that would not be effective and could be a "burden" for businesses.[21] After the Senate vote, Republican Senator Kay Bailey Hutchison stated that the opposition to the bill was not a partisan issue but it not take the right approach to cybersecurity.[22]The senate vote was not strictly along partisan lines, as six Democrats voted against it, and five Republicans voted for it.[23] Critics of the bill included the US Chamber of Commerce,[24] advocacy groups like the American Civil Liberties Union and the Electronic Frontier Foundation,[25] cybersecurity expert Jody Westby, and The Heritage Foundation, both of whom argued that although the government must act on cybersecurity, the bill was flawed in its approach and represented "too intrusive a federal role."[26]
In February 2013, Obama proposed the Executive Order Improving Critical Infrastructure Cybersecurity. It represents the latest iteration of policy but is not considered to be law as it has not been addressed by Congress yet. It seeks to improve existing public-private partnerships by enhancing timeliness of information flow between DHS and critical infrastructure companies. It directs federal agencies to share cyber threat intelligence warnings to any private sector entity identified as a target. It also tasks DHS with improving the process to expedite security clearance processes for applicable public and private sector entities to enable the federal government to share this information at the appropriate sensitive and classified levels. It directs the development of a framework to reduce cyber risks, incorporating current industry best practices and voluntary standards. Lastly, it tasks the federal agencies involved with incorporating privacy and civil liberties protections in line with Fair Information Practice Principles.[9]
In January 2015, Obama announced a new cybersecurity legislative proposal. The proposal was made in an effort to prepare the US from the expanding number of cyber crimes. In the proposal, Obama outlined three main efforts to work towards a more secure cyberspace for the US. The first main effort emphasized the importance of enabling cybersecurity information sharing. By enabling that, the proposal encouraged information sharing between the government and the private sector. That would allow the government to know what main cyber threats private firms are facing and would then allow the government to provide liability protection to those firms that shared their information. Furthermore, that would give the government a better idea of what the US needs to be protected against. Another main effort that was emphasized in this proposal was to modernize the law enforcement authorities to make them more equipped to properly deal with cyber crimes by giving them the tools they need in order to do so. It would also update classifications of cyber crimes and consequences. One way this would be done would be by making it a crime for overseas selling of financial information. Another goal of the effort is to place cyber crimes prosecutable. The last major effort of the legislative proposal was to require businesses to report data breaching to consumers if their personal information had been sacrificed. By requiring companies to do so, consumers are aware of when they are in danger of identity theft.[10]
In February 2016, Obama developed a Cybersecurity National Security Action Plan (CNAP). The plan was made to create long-term actions and strategies in an effort to protect the US against cyber threats. The focus of the plan was to inform the public about the growing threat of cyber crimes, improve cybersecurity protections, protects personal information of Americans, and to inform Americans on how to control digital security. One of the highlights of this plan include creating a "Commission on Enhancing National Cybersecurity." The goal of this is to create a Commission that consists of a diverse group of thinkers with perspectives that can contribute to make recommendations on how to create a stronger cybersecurity for the public and private sector. The second highlight of the plan is to change Government IT. The new Government IT will make it so that a more secure IT can be put in place. The third highlight of the plan is to give Americans knowledge on how they can secure their online accounts and avoid theft of their personal information through multi-factor authentication. The fourth highlight of the plan is to invest 35% more money that was invested in 2016 into cybersecurity.[11]
Recent federal and sectoral developments (2023-2025)
editIn July 2023, the SEC adopted rules that require public companies to report “material” cybersecurity incidents on Form 8-K and to describe risk management and governance practices in periodic reports; the incident disclosure is due four business days after a registrant determines materiality. Most registrants began complying in December 2023.[12][13]
At the state level, the New York Department of Financial Services amended its cybersecurity regulation (23 NYCRR Part 500) with a second set of changes that became effective on 1 November 2023. The amendments expand requirements for governance and incident handling, and introduce heightened obligations for larger “Class A” firms.[14]
The Federal Trade Commission amended the Safeguards Rule to add a breach-notification obligation for certain non-bank financial institutions. The requirement is now in effect and calls for notification to the FTC as soon as practicable and no later than 30 days after discovery when an incident involves the information of at least 500 consumers.[15][16]
In health care, the HIPAA Security Rule has been the subject of a modernization proposal. The U.S. Department of Health and Human Services released a notice of proposed rulemaking in late 2024 with publication in the Federal Register on 6 January 2025, seeking updates to strengthen requirements for safeguarding electronic protected health information. [17][18]
Following the 2021 Colonial Pipeline incident, the Transportation Security Administration issued and later revised pipeline cybersecurity Security Directives. A redacted version of SD Pipeline-2021-02E was posted in July 2024, and the agency maintains a page listing current security directives for pipelines and other modes.[19][20]
Other government efforts
editIn addition to regulation, the federal government has tried to improve cybersecurity by allocating more resources to research and collaborating with the private sector to write standards. In 2003, the President's National Strategy to Secure Cyberspace made the Department of Homeland Security (DHS) responsible for security recommendations and researching national solutions. The plan calls for cooperative efforts between government and industry "to create an emergency response system to cyber-attacks and to reduce the nation's vulnerability to such threats "[27] In 2004, the US Congress allocated $4.7 billion toward cybersecurity and achieving many of the goals stated in the President's National Strategy to Secure Cyberspace.[28] Some industry security experts state that the President's National Strategy to Secure Cyberspace is a good first step but is insufficient.[29] Bruce Schneier stated, "The National Strategy to Secure Cyberspace hasn't secured anything yet." [30] However, the President's National Strategy clearly states that the purpose is to provide a framework for the owners of computer systems to improve their security rather than the government taking over and solving the problem.[31] However, companies that participate in the collaborative efforts outlined in the strategy are not required to adopt the discovered security solutions.
In the United States, the US Congress is trying to make information more transparent after the Cyber Security Act of 2012, which would have created voluntary standards for protecting vital infrastructure, failed to pass through the Senate.[21] In February 2013, the White House issued an executive order, titled "Improving Critical Infrastructure Cybersecurity," which allows the executive branch to share information about threats with more companies and individuals.[21][22] In April 2013, the House of Representatives passed the Cyber Intelligence Sharing and Protection Act (CISPA), which calls for protecting against lawsuits aimed at companies that disclose breach information.[21] The Obama administration said that it might veto the bill.[21]
India
editIn the light of the hacking of the website of the Indian Space Agency's commercial arm in 2015, Antrix Corporation and government's Digital India programme, a cyberlaw expert and advocate at the Supreme Court of India, Pavan Duggal, stated that "a dedicated cyber security legislation as a key requirement for India. It is not sufficient to merely put cyber security as a part of the IT Act. We have to see cyber security not only from the sectoral perspective, but also from the national perspective."[23]
More on India, Their cyber-security framework is built primarily on the Information Technology Act, 2000 (IT Act) and its 2008 amendments, which give legal recognition to electronic records and digital signatures and create offenses for unauthorized access, data tampering and certain forms of online content. The Act also designates the Indian Computer Emergency Response Team (CERT-In) as the national agency for incident response under section 70B, with functions that include collecting and analyzing incident information, issuing advisories and coordinating technical response. [24][25]
Under the IT Act, a series of rules and notifications provide more detailed obligations. The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 place due diligence requirements on “intermediaries” such as social media and messaging services, including provisions on content take down and for certain categories of content, traceability of the originator.[26]
In April 2022, CERT-In issued binding directions under section 70B that require service providers, intermediaries, data centers, virtual asset service providers and virtual private network (VPN) providers to report specified cyber incidents to the agency within six hours of detection and to retain certain system logs for 180 days. The directions also call for maintaining accurate subscriber or customer information that can be furnished to authorities on request.[27]
China
editChina has developed a comprehensive framework of laws and regulations that govern cyber security, data and personal information. The core instruments are the Cybersecurity Law, which entered into force in 2017, the Data Security Law, effective in 2021, and the Personal Information Protection Law (PIPL), effective in November 2021. Together they regulate network operators, “critical information infrastructure operators”, the classification and protection of data, and the processing of personal information, with an explicit emphasis on national security and public interest.[28]
The Cybersecurity Law requires operators of critical information infrastructure to adopt technical and organizational security measures, undergo security reviews for certain network products and services, and, in many cases, store personal information and “important data” generated within mainland China on domestic servers unless a security assessment is passed for cross-border transfers.[28] The Data Security Law introduces a layered system for classifying and protecting data, including the concept of “important data”, and links data handling obligations to potential risks for national security, the public interest and individual rights.[28]
The Personal Information Protection Law sets out principles for lawful, fair and transparent processing of personal information, defines the rights of individuals over their data, and establishes duties for personal information handlers that are similar to those imposed on data controllers in other jurisdictions. It has extra territorial effect in certain situations where organizations outside China handle the personal information of individuals in China for providing products or services or for analyzing their behavior, and it imposes additional requirements such as security assessments, standard contracts or certification for transferring personal information abroad.[29]
Detailed rules issued by the Cyberspace Administration of China, including the Measures for Security Assessment of Cross Border Data Transfers that took effect in 2022, further specify when data exporters must apply for an official security assessment, for example when exporting important data or large volumes of personal information. Business groups and legal commentators have highlighted the compliance burden and uncertainty created by overlapping definitions and approval procedures, especially for multinational companies that need to move operational or research data out of China.[30][31][32]
These data transfer rules have also affected international scientific cooperation. In 2025 several major European public research funders announced pauses or changes to co-funded programs with Chinese partners, citing concerns that China’s data protection regime, particularly under the Data Security Law, makes it difficult to share research data across borders while remaining compliant.[33]
European Union
editCybersecurity standards have been of great prominence in today's technology driven businesses. To maximize their profits, corporations leverage technology by running most of their operations by the internet. Since there are a large number of risks that entail internetwork operations, such operations must be protected by comprehensive and extensive regulations. Existing cybersecurity regulations all cover different aspects of business operations and often vary by region or country in which a business operates. Because of the differences in a country's society, infrastructure, and values, one overarching cyber security standard is not optimal for decreasing risks. While US standards provide a basis for operations, the European Union has created a more tailored regulation for businesses operating specifically within the EU. Also, in light of Brexit, it is important to consider how the UK has chosen to adhere to such security regulations.
Three major regulations within the EU include the ENISA, the NIS Directive and the EU GDPR. They are part of the Digital Single Market strategy.
Regarding standards, the Cybersecurity Act / ENISA Regulation does not refer directly to standards. Nevertheless, ENISA recognises on its website that "EU’s cybersecurity strategy underscores support for greater standardisation via the European standardisation organisations (CEN, CENELEC and ETSI) as well as ISO.[34]"
ISO/IEC Standards, as well as European Standards from CEN, CENELEC and ETSI can be used on a voluntary way to support the requirements in the EU legislation. An updated list of ISO/IEC and CEN/CENELEC standards on the topic of Cybersecurity can be followed up via the free and publicly available information website Genorma.com.[35]
ENISA
editThe European Union Agency for Cybersecurity (ENISA) is a governing agency that was originally set up by the Regulation (EC) No 460/2004 of the European Parliament and of the Council of 10 March 2004 for the Purpose of Raising Network and Information Security (NIS) for all internetwork operations in the EU. ENISA currently runs under Regulation (EU) No 526/2013,[36] which has replaced the original regulation in 2013. ENISA works actively with all member states of the EU to provide a range of services. The focus of their operations are on three factors:
- Recommendations to member states on the course of action for security breaches
- Policy making and implementation support for all members states of the EU
- Direct support with ENISA taking a hands-on approach to working with operational teams in the EU[37]
ENISA is made up of a management board that relies on the support of the executive director and the Permanent Stakeholders Group. Most operations, however, are run by the heads of various departments.[38]
ENISA has released various publications that cover all major issues on cybersecurity. ENISA's past and current initiatives include the EU Cloud Strategy, Open Standards in Information Communications Technology, a Cyber Security Strategy of the EU and a Cyber Security Coordination Group. ENISA also works in collaboration with existing international standard organizations like the ISO and the ITU.[39]
NIS Directive
editOn July 6, 2016, the European Parliament set into policy the Directive on Security of Network and Information Systems (the NIS Directive).[40]
The directive went into effect in August 2016, and all member states of the European Union were given 21 months to incorporate the directive's regulations into their own national laws.[41] The aim of the NIS Directive is to create an overall higher level of cybersecurity in the EU. The directive significantly affects digital service providers (DSPs) and operators of essential services (OESs). Operators of essential services include any organizations whose operations would be greatly affected in the case of a security breach if they engage in critical societal or economic activities. Both DSPs and OES are now held accountable for reporting major security incidents to Computer Security Incident Response Teams (CSIRT).[42] While DSPs are not held to as stringent regulations as operators of essential services, DSPs that are not set up in the EU but still operate in the EU still face regulations. Even if DSPs and OES outsource the maintenance of their information systems to third parties, the NIS Directive still holds them accountable for any security incidents.[43]
The member states of the EU are required to create a NIS directive strategy, which includes the CSIRTs, in addition to National Competent Authorities (NCAs) and Single Points of Contact (SPOCs). Such resources are given the responsibility of handling cybersecurity breaches in a way that minimizes impact. In addition, all member states of the EU are encouraged to share cyber security information.[44]
Security requirements include technical measures that manage the risks of cybersecurity breaches in a preventative manner. Both DSP and OES must provide information that allows for an in depth assessment of their information systems and security policies.[45] All significant incidents must be notified to the CSIRTs. Significant cybersecurity incidents are determined by the number of users affected by the security breach as well as the longevity of the incident and the geographical reach of the incident.[45]
NIS2
editThe NIS2 Directive (Directive (EU) 2022/2555) broadened the sectors covered by EU network and information security rules and updated incident reporting and oversight. Member States were required to transpose NIS2 by 17 October 2024, and the earlier NIS Directive was repealed on 18 October 2024. [46]
Only 23 Member States have fully implemented the measures contained with the NIS Directive. Infringement proceedings against them to enforce the Directive have not taken place, and they are not expected to take place in the near future.[47] This failed implementation has led to the fragmentation of cybersecurity capabilities across the EU, with differing standards, incident reporting requirements and enforcement requirements being implemented in different Member States.
EU Cybersecurity Act
editThe Cyber Resilience Act (Regulation (EU) 2024/2847) sets horizontal cybersecurity requirements for products with digital elements. It was adopted on 23 October 2024. Application is staged, with certain provisions applying in 2026 and full application from 11 December 2027, as set out in Article 71. [48] ENISA will have a key role in setting up and maintaining the European cybersecurity certification framework.[49]
EU GDPR
editThe EU General Data Protection Regulation (GDPR) was set into place on 14 April 2016, but then the date of enforcement has been changed to 25 May 2018.[50] The GDPR aims to bring a single standard for data protection among all member states in the EU. Changes include the redefining of geographical borders. It applies to entities that operate in the EU or deal with the data of any resident of the EU. Regardless of where the data is processed, if an EU citizen's data is being processed, the entity is now subject to the GDPR.[51]
Fines are also much more stringent under the GDPR and can total €20 million or 4% of an entity's annual turnover, whichever is higher.[51] In addition, like in previous regulations, all data breaches that effect the rights and freedoms of individuals residing in the EU must be disclosed within 72 hours.
The overarching board, the EU Data Protection Board, EDP, is in charge of all oversight set by the GDPR.
Consent plays a major role in the GDPR. Companies that hold data in regards to EU citizens must now also offer to them the right to back out of sharing data just as easily as when they consented to sharing data.[52]
In addition, citizens can also restrict processing of the data stored on them and can choose to allow companies to store their data but not process it, which creates a clear differentiation. Unlike previous regulations, the GDPR also restricts the transfer of a citizen's data outside of the EU or to a third party without a citizen's prior consent.[52]
NIS 2 Directive
editOn the 16 January 2023, the EU Parliament and Council adopted the 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS Directive)[53]. This new Directive aims to extend the scope of obligations on entities required to take measures to increase their cybersecurity capabilities. The Directive also aims to harmonise the EU approach to incident notifications, security requirements, supervisory measures and information sharing.[54] The National Cyber Security Bill 2024 will transpose NIS2 into Irish law once enacted. The National Cyber Security Bill 2024 represents a proactive step towards safeguarding Ireland's critical infrastructure and enhancing its overall cybersecurity resilience in line with European standards, as stipulated in NIS2.[55]
Background
editAgainst the backdrop of increasing dependence on digital technologies, the COVID-19 pandemic highlighted how sensitive digitised societies can be to unexpected risks.[56] In light of this evidence, the European Commission reviewed the existing NIS (Network and Information Security) Directive and identified the following critical points:
- insufficient cyber resilience of companies operating in the EU,
- inconsistent compared robustness across Member States and sectors,
- insufficient shared understanding of the main threats and challenges among Member States,
- lack of joint crisis response.
Following various rounds of consultations, the final NIS 2 Directive[57] was adopted by the EU Commission on 14 December 2022.
Content
editThe directive requires the member states of the European Union to adopt a national cybersecurity strategy. Furthermore, national computer security incident response teams (CSIRTs) must be designated, responsible for handling risks and incidents. A so-called single point of contact (SPoC) is intended to ensure a secure cross-border cooperation between the authorities of the Member States.
The NIS 2 Directive imposes stricter requirements on national authorities than the previous NIS Directive and aligns sanction possibilities across Member States. The directive introduces stricter supervisory measures for national authorities, stricter enforcement requirements, and harmonisation of sanction regimes in all Member States.
Expansion of scope
editUnlike, for example, in the ordinance issued in 2016 under the German BSI Act to protect critical infrastructures (BSI-KritisV),[58] culture and media, local public transport and wholesale of medicines are not covered by the NIS 2 Directive, but new areas such as space, top-level domain registrars and trust service providers were added.[59] The increase in affected institutions is mainly due to the fact that the thresholds known from the BSI-KritisV no longer apply here. In addition, there are several gradations: a distinction is now made between so-called essential entities and important entities, primarily based on the number of employees or turnover. As before, there are also critical entities.[60]
The Digital Operational Resilience Act (DORA)
editDORA creates a regulatory framework on digital operational resilience whereby all firms need to make sure they can withstand, respond to and recover from all types of ICT-related disruptions and threats. These requirements are homogenous across all EU member states. The regulation will apply from 17 January 2025 for relevant financial entities and ICT third-party service providers.[61]
Cyber Resilience Act
editThe Cyber Resilience Act (Regulation (EU) 2024/2847) sets horizontal cybersecurity requirements for products with digital elements. It was adopted on 23 October 2024. Application is staged, with certain provisions applying in 2026 and full application from 11 December 2027, as set out in Article 71.[62][63][64]
Individual EU Countries
editRepublic of Ireland
editThe Criminal Justice (Offences Relating to Information Systems) Act 2017 was introduced in May 2017 to consolidate laws on computer crime.[65][66]
United Kingdom
editThe Product Security and Telecommunications Infrastructure (PSTI) regime introduced mandatory security requirements for consumer “connectable” products in the UK. It came into force on 29 April 2024 and includes measures such as banning default or easily guessable passwords, publishing a point of contact for vulnerability reporting, and providing transparency about security updates. [67][68]
Frameworks and standards
editOutside binding law, the NIST Cybersecurity Framework was updated to version 2.0 in February 2024. The update added a new Govern function that emphasizes governance and supply-chain risk and is intended to inform how organizations implement the other functions. [69][70]
Reactions
editWhile experts agree that cybersecurity improvements are necessary, there is disagreement about whether the solution is more government regulation or more private-sector innovation.
Support
editMany government officials and cybersecurity experts believe that the private sector has failed to solve the cybersecurity problem and that regulation is needed. Richard Clarke states that "industry only responds when you threaten regulation. If industry does not respond [to the threat], you have to follow through."[32] He believes that software companies must be forced to produce more secure programs.[33] Bruce Schneier also supports regulation that encourages software companies to write more secure code through economic incentives.[34] US Representative Rick Boucher (D–VA) proposes improving cybersecurity by making software companies liable for security flaws in their code.[35] In addition, to improving software security, Clarke believes that certain industries, such as utilities and ISPs, require regulation.[36]
Opposition
editOn the other hand, many private-sector executives and lobbyists believe that more regulation will restrict their ability to improve cybersecurity. Harris Miller, a lobbyist and president of the Information Technology Association of America, believes that regulation inhibits innovation.[37] Rick White, former corporate attorney and president and CEO of the lobby group TechNet, also opposes more regulation. He states that "the private-sector must continue to be able to innovate and adapt in response to new attack methods in cyber space, and toward that end, we commend President Bush and the Congress for exercising regulatory restraint."[38]
Another reason many private-sector executives oppose regulation is that it is costly and involves government oversight in private enterprise. Firms are just as concerned about regulation reducing profits as they are about regulation limiting their flexibility to solve the cybersecurity problem efficiently.
Specifically around the CRA, concern is expressed over the breadth of impact by prominent free and Open source software organizations: Eclipse Foundation, Internet Society, and Python Software Foundation. These organizations highlight consequences unstated in the regulation, that they conclude fundamentally damage the Open source movement. They offer changes that would allow Open source to be used in the EU without being regulated in the same manner as would be on commercial software developers.[71][72][73][74]
See also
edit- CERT Coordination Center
- Cyber security standards
- Cybersecurity Information Sharing Act
- Cyber Security and Resilience Bill - proposed UK regulation.
- Default password
- Information assurance
- List of data breaches
- Medical device hijack
- National Cyber Security Division
- National Strategy to Secure Cyberspace
- Presidential directive
- Proactive cyber defence
- United States Computer Emergency Readiness Team
- United States Department of Homeland Security
Notes
edit- ^ "A chronology of data breaches reported since the ChoicePoint incident." (2005). Retrieved October 13, 2005.
- ^ "Electronic privacy information center bill track: Tracking privacy, speech and civil liberties in the 109th congress." (2005). Retrieved October 23, 2005.
- ^ "How computer viruses work." (2005). Retrieved October 10, 2005.
- ^ "The National Strategy to Secure Cyberspace Archived 2012-02-27 at the Wayback Machine." (2003). Retrieved December 14, 2005.
- ^ "Notice of security breach – civil code sections 1798.29 and 1798.82 – 1798.84." 2003). Retrieved October 23, 2005.
- ^ "Richard Clarke interview." (2003). Retrieved December 4, 2005.
- ^ Gordon, L. A., Loeb, M. P., Lucyshyn, W. & Richardson, R. (2005). "2005 CSI/FBI computer crime and security survey." Retrieved October 10, 2005.
- ^ Heiman, B. J. (2003). Cybersecurity regulation is here. RSA security conference, Washington, D.C. Retrieved October 17, 2005.
- ^ Kirby, C. (2003, December 4, 2003). "Forum focuses on cybersecurity". San Francisco Chronicle.
- ^ Lemos, R. (2003). "Bush unveils final cybersecurity plan." Retrieved December 4, 2005.
- ^ Menn, J. (2002, January 14, 2002). "Security flaws may be pitfall for Microsoft". Los Angeles Times, pp. C1.
- ^ Rasmussen, M., & Brown, A. (2004). "California Law Establishes Duty of Care for Information Security." Retrieved October 31, 2005.
- ^ Schmitt, E., Charron, C., Anderson, E., & Joseph, J. (2004). "What Proposed Data Laws Will Mean for Marketers." Retrieved October 31, 2005.
- ^ Jennifer Rizzo. (August 2, 2012) "Cybersecurity bill fails in Senate." Accessed August 29, 2012.
- ^ Paul Rosenzweig. (July 23, 2012) "Cybersecurity Act of 2012: Revised Cyber Bill Still Has Problems[unfit]." The Heritage Foundation. Accessed August 20, 2012.
- ^ Ed O'Keefe & Ellen Nakashima. (August 2, 2012 ) "Cybersecurity bill fails in Senate." The Washington Post. Accessed August 20, 2012.
- ^ Alex Fitzpatrick. (July 20, 2012) "Obama Gives Thumbs-Up to New Cybersecurity Bill." Mashable. Accessed August 29, 2012.
- ^ Brendan Sasso. (August 4, 2012) "After defeat of Senate cybersecurity bill, Obama weighs executive-order option". The Hill. Accessed August 20, 2012.
- ^ Jaikumar Vijayan. (August 16, 2012) "No partisan fight over cybersecurity bill, GOP senator says". Computerworld. Accessed August 29, 2012.
- ^ Carl Franzen. (August 2, 2012) "As Cybersecurity Bill Fails In Senate, Privacy Advocates Rejoice". TPM. August 29, 2012.
- ^ Alex Fitzpatrick. (August 2, 2012) "Cybersecurity Bill Stalls in the Senate". Mashable. Accessed August 29, 2012.
- ^ Jody Westby (August 13, 2012) "Congress Needs to Go Back To School on Cyber Legislation". Forbes. Accessed August 20, 2012.
References
edit- ^ a b Kianpour, Mazaher; Raza, Shahid (2024). "More than malware: unmasking the hidden risk of cybersecurity regulations". International Cybersecurity Law Review. 5: 169–212. doi:10.1365/s43439-024-00111-7. hdl:11250/3116767.
- ^ a b "Cyber: Think risk, not IT" (PDF). pwc.com. PwC Financial Services Regulatory Practice, April, 2015.
- ^ a b "DOD-Strategy-for-Operating-in-Cyberspace" (PDF).
- ^ Hopcraft, Rory (2018). "Effective maritime cybersecurity regulation - the case for a cyber code". Journal of Indian Ocean Region. 14 (3): 354–366. doi:10.1080/19480881.2018.1519056. S2CID 158311827.
- ^ Schooner, Steven L.; Berteau, David J. (2012-03-01). Emerging Policy and Practice Issues (2011). Rochester, NY: Social Science Research Network. SSRN 2014385.
- ^ a b Schooner, Steven; Berteau, David (2014-01-01). "Emerging Policy and Practice Issues". GW Law Faculty Publications & Other Works.
- ^ "Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?". Retrieved 27 December 2016.
- ^ a b "Securely Protect Yourself Against Cyber Trespass Act (2005; 109th Congress H.R. 29) – GovTrack.us". GovTrack.us.
- ^ "Executive Order – Improving Critical Infrastructure Cybersecurity". whitehouse.gov. 12 February 2013 – via National Archives.
- ^ "SECURING CYBERSPACE – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts". whitehouse.gov. 2015-01-13. Retrieved 2017-08-06 – via National Archives.
- ^ "FACT SHEET: Cybersecurity National Action Plan". whitehouse.gov. 2016-02-09. Retrieved 2017-08-06 – via National Archives.
- ^ "SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure". U.S. Securities and Exchange Commission. 26 July 2023. Retrieved 25 October 2025.
- ^ "Public Company Cybersecurity Disclosures, Final Rules (Fact Sheet)" (PDF). U.S. Securities and Exchange Commission. 26 July 2023. Retrieved 25 October 2025.
- ^ "Cybersecurity Resource Center". New York State Department of Financial Services. 1 November 2023. Retrieved 25 October 2025.
- ^ "FTC Amends Safeguards Rule to Require Non-Banking Financial Institutions to Report Data Security Breaches" (Press release). Federal Trade Commission. 27 October 2023. Retrieved 25 October 2025.
- ^ "Safeguards Rule notification requirement now in effect". FTC Business Blog. 14 May 2024. Retrieved 25 October 2025.
- ^ "HIPAA Security Rule — NPRM Fact Sheet". U.S. Department of Health and Human Services. 27 December 2024. Retrieved 25 October 2025.
- ^ "HIPAA Security Rule to Strengthen the Cybersecurity of ePHI (Proposed Rule)". Federal Register. 6 January 2025. Retrieved 25 October 2025.
- ^ "Security Directive Pipeline-2021-02E (redacted)" (PDF). Transportation Security Administration. 27 July 2024. Retrieved 25 October 2025.
- ^ "Security Directives and Emergency Amendments". Transportation Security Administration. 2024. Retrieved 25 October 2025.
- ^ a b c d "Secrecy hampers battle for web". Financial Times. 7 June 2013. Retrieved 12 June 2013.
- ^ "Executive Order – Improving Critical Infrastructure Cybersecurity". The White House. Office of the Press Secretary. 12 February 2013. Retrieved 12 June 2013.
- ^ "Dedicated legislation for Cyber Security is needed: Pavan Duggal – Express Computer". Express Computer. 31 August 2015.
- ^ "The Information Technology Act, 2000". WIPO Lex. World Intellectual Property Organization. Retrieved 29 November 2025.
- ^ "Reforming Cyber Law: The IT Act's Move Towards Decriminalization". AZB & Partners. 19 May 2023. Retrieved 29 November 2025.
- ^ "The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021". PRS Legislative Research. PRS Legislative Research. Retrieved 29 November 2025.
- ^ "Directions under sub-section (6) of section 70B of the Information Technology Act, 2000 relating to information security practices, procedure, prevention, response and reporting of cyber incidents". Indian Computer Emergency Response Team (CERT-In). Ministry of Electronics and Information Technology, Government of India. 28 April 2022. Retrieved 29 November 2025.
- ^ a b c Creemers, Rogier; Triolo, Paul; Webster, Graham. "Translation: Cybersecurity Law of the People's Republic of China (Effective June 1, 2017)". New America. Retrieved 2025-11-29.
- ^ Translate, China Law (2021-08-20). "Personal Information Protection Law". China Law Translate. Archived from the original on 2025-08-18. Retrieved 2025-11-29.
- ^ "CAC Issues Guidelines For Data Export Security Assessment". www.mondaq.com. Retrieved 2025-11-29.
- ^ "BSA Comments in Response to the Office of the U.S. Trade Representative's Request for Comments on the 2022 Special 301 Review" (PDF). Regulations.gov. BSA | The Software Alliance. 2022. Retrieved 29 November 2025.
- ^ "BSA Submission for the 2025 National Trade Estimate Report on Foreign Trade Barriers" (PDF). BSA.org. BSA | The Software Alliance. 17 October 2024. Retrieved 29 November 2025.
- ^ "China's data protection rules prompt pause from major European research funders". Reuters. Archived from the original on 2025-04-25. Retrieved 2025-11-29.
- ^ "Standards". ENISA website. 4 April 2024.
- ^ "List of Cybersecurity Standards". GENORMA.COM.
- ^ "L_2013165EN.01004101.xml". eur-lex.europa.eu. Retrieved 2017-03-08.
- ^ "About ENISA — ENISA". www.enisa.europa.eu. Retrieved 2017-03-08.
- ^ "Structure and Organisation — ENISA". www.enisa.europa.eu. Retrieved 2017-03-08.
- ^ Purser, Steve (2014). "Standards for Cyber Security". In Hathaway, Melissa E. (ed.). Best Practices in Computer Network Defense: Incident Detection and Response. Nato Science for Peace and Security Series - D: Information and Communication Security. Vol. 35. IOS Press. doi:10.3233/978-1-61499-372-8-97. ISBN 978-1-61499-372-8.
- ^ "Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union". EUR Lex. 19 July 2016. Retrieved 2018-04-26.
- ^ "The Directive on security of network and information systems (NIS Directive)". Digital Single Market. Retrieved 2017-03-12.
- ^ "The Network and Information Security Directive – who is in and who is out?". The Register. 7 January 2016. Retrieved 2017-03-12.
- ^ "NIS Directive Published: EU Member States Have Just Under Two Years to Implement – Data Protection Report". Data Protection Report. 2016-07-21. Retrieved 2017-03-12.
- ^ "Agreement reached on EU Network and Information Security (NIS) Directive | Deloitte Luxembourg | Technology | Insight". Deloitte Luxembourg. Archived from the original on 2018-03-02. Retrieved 2017-03-12.
- ^ a b "Network and Information Security Directive will be implemented in the UK despite Brexit vote, government confirms". www.out-law.com. Retrieved 2017-03-12.
- ^ "NIS2 Directive: securing network and information systems". European Commission. 2025. Retrieved 25 October 2025.
- ^ "NIS Implementation Tracker".
- ^ "Regulation (EU) 2024/2847 (Cyber Resilience Act)". EUR-Lex. 23 October 2024. Retrieved 25 October 2025.
- ^ "The EU Cybersecurity Act". Retrieved 2019-12-06.
- ^ "Home Page of EU GDPR". EU GDPR Portal. Retrieved 2017-03-12.
- ^ a b "Key Changes with the General Data Protection Regulation". EU GDPR Portal. Retrieved 2017-03-12.
- ^ a b "Overview of the General Data Protection Regulation (GDPR)". ico.org.uk. 2017-03-03. Retrieved 2017-03-12.
- ^ "Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union", Official Journal of the European Union, vol. 194, 2016-07-06, retrieved 2025-10-27
- ^ "NIS2 Directive". eur-lex.europa.eu. Retrieved 27 March 2023.
- ^ "Technology Law Landscape in 2025". Mason Hayes Curran. Retrieved 12 December 2024.
- ^ "Directive on measures for a high common level of cybersecurity across the Union (NIS2 Directive) - FAQs | Shaping Europe's digital future". digital-strategy.ec.europa.eu. Retrieved 2025-10-27.
- ^ "Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive)", OJ L, vol. 333, pp. 80–152, 2022-12-14, retrieved 2025-10-27
- ^ "BSI-KritisV - Verordnung zur Bestimmung Kritischer Infrastrukturen nach dem BSI-Gesetz" [BSI-KritisV – Ordinance on the Determination of Critical Infrastructures under the BSI Act]. Bundesamt für Justiz (in German). Retrieved 2025-10-27.
- ^ "NIS2 requirements: A complete guide to compliance & implementation". DataGuard. Retrieved 2025-10-27.
- ^ Weissmann, Paul. "EU NIS2 and RCE directives for Critical Infrastructures". OpenKRITIS. Retrieved 2025-10-27.
- ^ "Digital Operational Resilience Act (DORA)". eiopa.europa.eu/. Retrieved 27 March 2024.
- ^ Bertuzzi, Luca (2021-09-16). "EU chief announces cybersecurity law for connected devices". www.euractiv.com. Retrieved 2023-01-30.
- ^ "Why a clear cyber policy is critical for companies". Financial Times. 2022-11-09. Retrieved 2023-01-30.
- ^ "EU pitches cyber law to fix patchy Internet of Things". POLITICO. 2022-09-15. Retrieved 2023-01-30.
- ^ Reidy, Diane (2019-04-15). "Away in a hack". Law Society of Ireland. Retrieved 2024-02-19.
- ^ Finlay, Adam; Hughes, Ruth. "iclg.com > Practice Areas > Cybersecurity > Ireland". iclg.com. Retrieved 2024-02-20.
- ^ "Regulations: consumer connectable product security (PSTI)". UK Government. 17 March 2025. Retrieved 25 October 2025.
- ^ "The Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023". legislation.gov.uk. 2023. Retrieved 25 October 2025.
- ^ "NIST Releases Version 2.0 of Landmark Cybersecurity Framework". NIST. 26 February 2024. Retrieved 25 October 2025.
- ^ "The NIST Cybersecurity Framework (CSF) 2.0" (PDF). NIST. 26 February 2024. Retrieved 25 October 2025.
- ^ Milinkovich, Mike. "Cyber Resilience Act: Good Intentions and Unintended Consequences". Eclipse Foundation Blog. Eclipse Foundation Executive Director. Retrieved 11 April 2023.
- ^ Kolkman, Olaf (24 October 2022). "The EU's Proposed Cyber Resilience Act Will Damage the Open Source Ecosystem". The Internet Society. The Internet Society Principal - Internet Technology, Policy, and Advocacy. Retrieved 11 April 2023.
- ^ Nicholson, Deb (11 April 2023). "The EU's Proposed CRA Law May Have Unintended Consequences for the Python Ecosystem". Python Software Foundation Blog. Python Software Foundation. Retrieved 11 April 2023.
- ^ Milinkovic, Mike (16 January 2023). "European Cyber Resiliency Act: Potential Impact on the Eclipse Foundation". Eclipse Foundation Blog. Retrieved 11 April 2023.