EU member states should have transposed by 17 October 2024 the Directive on measures for a high common level of cybersecurity across the EU (NIS2). However, most EU member states did not meet the transposition deadline. Thus far, only Belgium, Croatia, Hungary, Italy, Latvia, and Lithuania have adopted national legislation to transpose the directive.
The NIS2 repealed and replaced on 18 October 2024 the former NIS Directive, and also repealed articles 40 and 41 of the European Electronic Communications Code (EECC).
In several member states, including for example France, Germany, the Netherlands and Sweden, the draft laws transposing the directive were not yet adopted into law.
If a member state does not transpose EU legislation by the deadline, the European Commission may launch an infringement procedure and ultimately refer a member state to the Court of Justice of the EU (CJEU).
The NIS2 Directive imposes baseline cybersecurity risk-management requirements and incident reporting obligations to entities operating in EU critical sectors (e.g. energy, telecoms, cloud computing). Additionally, certain digital entities, for example cloud providers, data centres, managed security service providers (MSSPs), are subject to EU harmonised security obligations under a Commission implementing regulation. The latter details:
- the cybersecurity risk management measures that these entities are required to adopt; and
- the cases in which an incident should be considered significant and notified to the national competent authority.
The Commission adopted the implementing regulation on 17 October 2024. According to the Commission’s press release, the implementing regulation will be published in the Official Journal of the EU “in due course” and enter into force twenty days thereafter.
A draft implementing regulation was open to feedback until 25 July 2024. Following the consultation, the final text of the regulation introduced some changes compared to the draft, in particular related to the thresholds to report incidents. For example, an incident will be considered significant and notified where:
- It can cause financial loss for the entity concerned exceeding €500,000 (instead of €100,000) or 5% of the entity’s total annual turnover in the preceding financial year (whichever is lower). The entity should consider all costs related to the incident, e.g. staff expenses, compensating costs for customers.
- The services of cloud providers and MSSPs should be unavailable for more than 30 minutes (instead of the originally proposed 10 minutes) for the incident to be reported as significant.
The NIS2 Directive requires that only significant incidents are notified to the national competent authorities following a multi-step process. The initial notification should be submitted within 24 hours, followed by a second one within 72 hours after having become aware of a significant incident. A final report providing additional information on the breach should be submitted in one month.
For more information on Cullen's NIS2 transposition benchmark and complete NIS2 report coverage, please click on “Access the full content” - or on “Request Access”, in case you are not subscribed to our European Digital Economy service.
more news
04 November 24
Nine European countries have symmetric access obligations that go beyond the Broadband Cost Reduction Directive or Gigabit Infrastructure Act
Our new benchmark analyses where regulators imposed asymmetric SMP obligations for access to ducts and where symmetric access obligations go beyond BCRD and GIA.
31 October 24
Update on 5G security measures across Europe
Based on publicly available information, Estonia, Germany, Romania and Sweden are the only EU countries that explicitly banned certain 5G equipment vendors.
31 October 24
Most countries in the Americas have no restrictions on vendors for 5G networks
Cullen International’s new benchmark on 5G national security in the Americas region shows that Brazil, Chile and the United States are the only researched countries that have adopted network security measures that apply to 5G networks.