<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>European directive - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/european-directive/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/european-directive/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 04 Oct 2021 09:25:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>European directive - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/european-directive/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>While preparing the NIS 2, update of the European overview of NIS transposition by the Member States&#8230;toward convergence ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/09/en-pleine-preparation-de-la-nis-v2-mise-a-jour-du-tour-dhorizon-europeen-de-transposition-de-la-directive-nis-par-les-etats-membres-vers-une-convergence/</link>
		
		<dc:creator><![CDATA[Nicol4sVanThieghem]]></dc:creator>
		<pubDate>Tue, 21 Sep 2021 17:30:00 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[European directive]]></category>
		<category><![CDATA[NIS]]></category>
		<category><![CDATA[regulation]]></category>
		<guid isPermaLink="false">http://riskinsight-prepro.s189758.zephyr32.atester.fr/?p=16638</guid>

					<description><![CDATA[<p>The Network and Information System Security &#8211; (UE) 2016/1148 directive, commonly referred to as NIS,  was a European directive adopted by the European parliament on July, 6th , 2016. It has been transposed by member states into their national legislations...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/en-pleine-preparation-de-la-nis-v2-mise-a-jour-du-tour-dhorizon-europeen-de-transposition-de-la-directive-nis-par-les-etats-membres-vers-une-convergence/">While preparing the NIS 2, update of the European overview of NIS transposition by the Member States&#8230;toward convergence ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The <a href="https://eur-lex.europa.eu/legal-content/FR/TXT/HTML/?uri=CELEX:32016L1148"><em>Network and Information System Security &#8211; (UE) 2016/1148</em></a> directive, commonly referred to as <strong>NIS</strong>,  was a European directive adopted by the European parliament on July, 6<sup>th</sup> , 2016. It has been transposed by member states into their national legislations until May 9<sup>th</sup>, 2018. In the United Kingdom, the NIS requirements have been included in <a href="https://www.legislation.gov.uk/uksi/2018/506/pdfs/uksi_20180506_en.pdf">The Network and Information Systems Regulation</a>  which came  into force on May 10<sup>th</sup>, 2018 and  the <a href="https://www.legislation.gov.uk/uksi/2020/1245/pdfs/uksi_20201245_en.pdf">The Network and Information Systems (Amendment and Transitional Provision etc.) Regulations</a>  came into force on December 31<sup>st</sup>, 2020.</p>
<p style="text-align: justify;">The NIS directive is the <strong>first initiative of EU-wide legislation on cybersecurity</strong>. Its goal is to <strong>ensure a high and common level of security for European information systems and networks</strong>. To achieve this objective the directive focuses on four key points:</p>
<ul style="text-align: justify;">
<li>Consolidating the member states’ <strong>national cybersecurity capabilities</strong></li>
<li>Creating a <strong>political and organizational cooperation framework</strong> on cybersecurity across the EU,</li>
<li>Ensuring the cybersecurity of <strong>operators of essential services</strong> (OES). OES are private or public entities <strong>providing essential services for the maintenance of economic and societal activities</strong>. The provision of these services <strong>depends on network and information systems</strong>.</li>
<li>Ensuring the cybersecurity of <strong>digital service providers</strong> (DSP). DSPs are defined as “<em>any service normally provided for remuneration, at a distance by electronic means and at the individual request of a recipient of services</em>”<a href="#_ftn1" name="_ftnref1">[1]</a>. Three types of services are mentioned in the NIS Directive: <strong>Cloud computing services</strong>, <strong>online marketplace</strong> and <strong>online search engines</strong>.</li>
</ul>
<p style="text-align: justify;">On the one hand, the security of operators of essential services is a <strong>sovereign prerogative of states while on</strong>n the other hand, the role of the EU is to ensure the <strong>proper functioning of the European market</strong>. In order to reconcile these two objectives, the NIS directive clearly states that: “<em>This Directive should be without prejudice to the possibility for each Member State to take the necessary measures to ensure the protection of the <strong>essential interests of its security</strong>, to <strong>safeguard public policy</strong> and <strong>public security</strong>, and to allow for the investigation, detection and prosecution of criminal offences.”</em><a href="#_ftn2" name="_ftnref2"><em><strong>[2]</strong></em></a><em>.</em> Each country can <strong>therefore adapt the legislative text to fit its priorities and strategic objectives</strong> as well as to guarantee its security and that of its networks and information systems. The NIS directive, however, sets <strong>common requirements</strong> in terms of; <strong>transposition of the directive into national legislation</strong>, of <strong>sectors concerned</strong>, of <strong>risk identification</strong>, of <strong>supervision</strong>, of <strong>implementation of technical and organisational measures</strong>, of <strong>cyber incident notification</strong>, and of <strong>sanctions in case of non-compliance</strong>.</p>
<p style="text-align: justify;">This analysis brings together elements on the transposition of the NIS directive in each of the <strong>27 member states</strong> of the European Union, as well as in the <strong>United-Kingdom</strong> and <strong>Switzerland</strong>. It highlights the various approaches and underlines the similarities and differences between countries, especially in the context of the upcoming evolution of the legislative text. Indeed, a <strong>proposal to revise the NIS directive</strong> has been adopted by the European Commission in December 2020 and <strong>aims at replacing the original text</strong>.</p>
<h1 style="text-align: justify;">An achieved transposition for certain themes…</h1>
<p><strong>Different types and numbers of legislative texts to transpose the NIS</strong></p>
<p><img decoding="async" class="size-medium wp-image-16866 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-437x82.png" alt="" width="437" height="82" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-437x82.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-768x144.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3.png 1526w" sizes="(max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;"><strong>The transposition of the NIS occurred in all the national legislations of EU member states. </strong>However, there is <strong>heterogeneity in the type of legislative text adopted</strong>. In most countries, the transposition takes the form of a <strong>law</strong> (<strong>twenty-two countries</strong>), to which <strong>thirteen countries</strong> have added <strong>at least on other legislative text</strong> (ordinance, decree, regulation, amendment or ministerial decision). In <strong>two countries,</strong> the transposition took place in <strong>each sectoral law</strong> which increases the number of legislative texts (<strong>four texts or more</strong>).</p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-16878 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-418x191.png" alt="" width="499" height="228" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-768x351.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-1536x701.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3.png 1818w" sizes="(max-width: 499px) 100vw, 499px" /></p>
<p><strong>A general implementation of cyber incident notification processes</strong></p>
<p><img decoding="async" class="size-medium wp-image-16868 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-437x105.png" alt="" width="437" height="105" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-437x105.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-768x185.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3.png 1152w" sizes="(max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;"><strong>All countries </strong>managed to implement cyber incident notification processes. Once again, there are various approaches depending on the country.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-16880 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-400x191.png" alt="" width="457" height="218" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-400x191.png 400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-768x367.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-1536x734.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3.png 1934w" sizes="auto, (max-width: 457px) 100vw, 457px" /></p>
<p style="text-align: justify;">There are six different procedures for transmitting alerts during a cyber incident:</p>
<ul style="text-align: justify;">
<li>In the first case (<strong>nine countries</strong>), the operator of essential services must first notify the <strong>competent national authority</strong> of the occurrence of a cyber incident,</li>
<li>A second process (<strong>ten countries</strong>) exists in which the first point of contact is the <strong>CSIRT</strong>, the <strong>Computer Security Incident Response Team</strong>, also called <strong>CERT</strong> (Computer Emergency Response Team),</li>
<li>In a lower number of cases (<strong>three countries</strong>), the OES must notify the <strong>competent sectoral authority</strong>,</li>
<li>The notification of cyber incident is carried out via a <strong>secure platform</strong> in <strong>four countries</strong>.</li>
<li>Even less frequently (<strong>two countries</strong>), the <strong>single point of contact</strong> (SPOC) has to be alerted.</li>
<li>Finally, for one country (Hungary), the OES alerts an <strong>event management centre</strong>.</li>
</ul>
<p style="text-align: justify;">In addition,<strong> all member states</strong> must notify the <strong>point of contact of a member state,</strong> if it is also affected by the cyber incident, and must inform the <strong>public</strong> when necessary.</p>
<p><strong>To comply with the constraints imposed by the NIS, certain states have even gone further</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16870 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-437x103.png" alt="" width="437" height="103" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-437x103.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-768x181.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3.png 1340w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">The NIS directive initially applies to the following sectors: <strong>transport, energy, health, drinking water, banking, finance, </strong>and<strong> digital</strong>. In the transposition, more <strong>than half of the analysed countries</strong> added other essential <strong>sectors and sub-sectors</strong> in addition to the seven previously mentioned. They are listed below, sorted by frequency of occurrence :</p>
<ul style="text-align: justify;">
<li>Austria, Croatia, Cyprus, Lithuania, Malta, Slovakia, Spain and Switzerland also mention<strong> public administration</strong>,</li>
<li>Cyprus, Estonia, Germany, Lithuania, the Netherlands, Slovakia, Spain and Switzerland add <strong>information and communication technologies</strong> and <strong>IT</strong>.</li>
<li>Estonia, France, Germany, Hungary, Lithuania, Slovenia, Spain, Switzerland add</li>
<li>The Czech Republic, Lithuania, the Netherlands, Spain complete the list with <strong>industry</strong>.</li>
<li>Estonia, Germany and Switzerland also mention <strong>heating and housing</strong>.</li>
<li>Lithuania and Slovakia subjoin <strong>defence</strong>, Switzerland <strong>national security</strong>.</li>
<li>Lithuania and Slovenia add the <strong>protection of the environment</strong>.</li>
<li>France is the only one to add <strong>education</strong>.</li>
<li>Spain is the only one to mention <strong>space</strong> and <strong>research centres</strong>.</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-16882 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-392x191.png" alt="" width="443" height="216" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-392x191.png 392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-768x374.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-1536x749.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3.png 1908w" sizes="auto, (max-width: 443px) 100vw, 443px" /></p>
<h1 style="text-align: left;">… However, the variation needs to be finalized on other themes.</h1>
<p><strong>Strong disparities on state supervision</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16876 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-437x103.png" alt="" width="437" height="103" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-437x103.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-768x181.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3.png 1238w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">Several categories and different levels of control are exercised by authorities to certify compliance with the NIS. The strong disparities concern in particular the <strong>authorities ensuring the control</strong> (national or sectoral authority) as well as the <strong>expected level of control</strong> (supervision, inspection, audit, evaluation…): there is <strong>no consensus</strong> around the process to adopt. Moreover, <strong>six countries</strong> <strong>do not provide any information </strong>on the type of supervision implemented.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-16884 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-433x191.png" alt="" width="526" height="232" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-433x191.png 433w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-768x338.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-1536x677.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3.png 1906w" sizes="auto, (max-width: 526px) 100vw, 526px" /></p>
<p><strong>Heterogeneous level and diffusion of security measures</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16872 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-437x100.png" alt="" width="437" height="100" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-437x100.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-768x176.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3.png 1381w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">Except for <strong>six countries</strong> for which no information has been given on the type of security measures implemented, there are two main approaches:</p>
<ul style="text-align: justify;">
<li>The security measures are directly mentioned in the <strong>body of the legislative text(s)</strong> transposing the NIS (<strong>eleven countries</strong>),</li>
<li>They are enumerated in; a <strong>guide</strong>, a <strong>list of recommendations</strong>, an <strong>online publication</strong> and established by <strong>different entities</strong> (government, regulation, decree…) in <strong>twelve countries</strong>.</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-16886 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-386x191.png" alt="" width="453" height="224" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-386x191.png 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-768x380.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-1536x759.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3.png 1726w" sizes="auto, (max-width: 453px) 100vw, 453px" /></p>
<p style="text-align: justify;">For the measures included in the body of the legislative text(s), there are <strong>similarities</strong> on their organisation:</p>
<ul style="text-align: justify;">
<li>The <strong>international norm ISO27001</strong> and the <strong>cybersecurity framework NIST</strong> are used as models to establish the security measures in respectively <strong>four and two countries</strong>.</li>
<li>The same <strong>six categories</strong> (security of systems and installations, handling of incidents, business continuity management…) are used in <strong>four countries</strong>.</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-16888 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-395x191.png" alt="" width="437" height="211" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-1536x743.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3.png 1772w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p><strong>Different amount and format of penalties</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16874 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-437x101.png" alt="" width="437" height="101" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-437x101.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-768x178.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3.png 1211w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">The financial penalty for not complying with the directive varies in the different countries and can range from <strong>less than a 100k</strong><strong>€ to 20M</strong><strong>€ maximum</strong> (except for Finland which has not implemented any sanctions). Most countries have chosen to apply a fine of <strong>less than 200k</strong><strong>€</strong> (<strong>eighteen countries</strong>) whereas <strong>four countries</strong> have decided that the maximum should be <strong>beyond 1M</strong><strong>€</strong>. It should also be noted that the sanctions are likely to <strong>accumulate in the event of</strong> <strong>multiple non-conformities</strong>, which does not make the <strong>overall maximum amount of a sanction</strong> a certainty.</p>
<p style="text-align: justify;"><strong>Imprisonment sentences</strong> have been implemented in <strong>two countries</strong> (Belgium and Cyprus).</p>
<p style="text-align: justify;">Finally, <strong>four countries</strong> have not yet communicated the penalties in case of non-compliance.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-16890 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-372x191.png" alt="" width="448" height="230" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-372x191.png 372w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-768x394.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-1536x788.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3.png 1770w" sizes="auto, (max-width: 448px) 100vw, 448px" /></p>
<h1 style="text-align: justify;"><strong>Conclusion</strong></h1>
<p style="text-align: justify;">The goal of the NIS directive was to <strong>address the unequal levels of security of networks and information systems</strong> within the European Union. To achieve it, it has now been transposed in <strong>all the member states</strong>. This has led to the <strong>creation of a common security framework</strong> while also leaving the possibility for states to ensure <strong>their security and the protection of their essential and strategic interests</strong>. Indeed, <strong>each country designates its operators of essential services</strong> and <strong>chooses the sectors it deems the most strategic to protect</strong>. In addition, the transposition of the directive as well as the supervision and cyber incident notification processes are carried out by the <strong>authority deemed competent. This is non dependant</strong>whether <strong>national</strong> or <strong>sectoral</strong>, whether it is the <strong>CSIRT</strong> or the <strong>single point of contact</strong>. This flexibility makes it possible for the NIS to adapt to the organisation of all member states. There are <strong>visible similarities</strong> creating groupings between the countries, as well as <strong>major dissimilarities.</strong> These leave room for many variations and make the comparison relevant and rich.</p>
<p style="text-align: justify;">A <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52020PC0823">proposal to revise the NIS directive</a>  was adopted in December 2020, but its provisional calendar has not yet been communicated. However, its main objectives has  been listed and includes <strong>reaching a higher level of cybersecurity and more homogeneous processes</strong> within the EU, while further <strong>increasing the cooperation between member states</strong>. The revision of the NIS directive revolves around;</p>
<ul style="text-align: justify;">
<li>the <strong>abandonment of the distinction between OES and DSPs</strong></li>
<li>the <strong>designation of OES by the Directive and not the states</strong></li>
<li>the <strong>creation of a new European network for major cyber incidents</strong></li>
<li><strong>imposition of CSIRTs supportive of entities</strong>,</li>
<li>the <strong>control by the states of the technical and organisational measures implemented</strong> (for risk analysis and crisis management).</li>
</ul>
<p style="text-align: justify;">These changes will be detailed further in a new article.</p>
<p> </p>
<h3 style="text-align: justify;">Sources :</h3>
<p style="text-align: justify;">Directive Network and Information System &#8211; Article ANSSI Link: <a style="font-size: revert;" href="https://www.ssi.gouv.fr/entreprise/reglementation/directive-nis/">Link to the article on NIS Directive</a></p>
<p style="text-align: justify;">Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union Link : <a style="font-size: revert;" href="https://eur-lex.europa.eu/legal-content/FR/TXT/HTML/?uri=CELEX:32016L1148">Link to the NIS Directive</a></p>
<p style="text-align: justify;">On Digital Service Providers (DSPs) – ANSSI Article – May 23rd 2018 Link : <a style="font-size: revert;" href="https://www.ssi.gouv.fr/entreprise/reglementation/directive-nis/faq-des-fournisseurs-de-service-numerique-fsn/#:~:text=La%20directive%20NIS%20d%C3%A9finit%20le,'un%20destinataire%20de%20services%20%C2%BB">Link to the article on DSPs</a></p>
<p style="text-align: justify;">On Operators of Essential Services (OES) – ANSSI Article Link : <a style="font-size: revert;" href="https://www.ssi.gouv.fr/entreprise/reglementation/directive-nis/faq-operateurs-de-services-essentiels-ose/#:~:text=Qu'est%2Dce%20qu',%C3%A9conomie%20ou%20de%20la%20soci%C3%A9t%C3%A9">Link to the article on OES</a></p>
<p style="text-align: justify;">Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148 Link: <a style="font-size: revert;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52020PC0823">Link to the proposal of the revised NIS Directive</a></p>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> Directive (EU) 2015/1535 of the European Parliament and of the Council of 9 September 2015.</p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> Directive (UE) 2016/1148 of the European Parliament and of the Council of 6 July 2016.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/en-pleine-preparation-de-la-nis-v2-mise-a-jour-du-tour-dhorizon-europeen-de-transposition-de-la-directive-nis-par-les-etats-membres-vers-une-convergence/">While preparing the NIS 2, update of the European overview of NIS transposition by the Member States&#8230;toward convergence ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The EU NIS directive: what are the issues and how can you prepare for it?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/12/the-eu-nis-directive-what-are-the-issues-and-how-can-you-prepare-for-it/</link>
		
		<dc:creator><![CDATA[RomainSoul3tis]]></dc:creator>
		<pubDate>Sun, 17 Dec 2017 21:41:17 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Critical systems]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[dsp]]></category>
		<category><![CDATA[European directive]]></category>
		<category><![CDATA[législation]]></category>
		<category><![CDATA[Member States]]></category>
		<category><![CDATA[NIS]]></category>
		<category><![CDATA[OES]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[sectoral regulations]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10268/</guid>

					<description><![CDATA[<p>On July 6, 2016, the NIS (Network and Information Security) directive went into effect. With only a short time to go until the deadline for transposition (May 9, 2018), discussions about the directive  are picking up steam. But what exactly...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/12/the-eu-nis-directive-what-are-the-issues-and-how-can-you-prepare-for-it/">The EU NIS directive: what are the issues and how can you prepare for it?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>On July 6, 2016, the <strong>NIS</strong> (Network and Information Security) <strong>directive</strong> went into effect. With <strong>only a short time to go until the deadline for transposition</strong> (May 9, 2018), discussions about the directive  are picking up steam. But what exactly are the directive&#8217;s requirements?</em></p>
<h2>The NIS directive: a major piece of legislation</h2>
<p>At a national level, the directive requires the establishment of a cybersecurity strategy and the establishment of a CSIRT, along with an authority figure to oversee these matters. For companies, it introduces two new areas of responsibility for two different types of players:</p>
<ul>
<li><strong>Operators of Essential Services</strong> must implement <strong>technical and organizational measures</strong> to manage network and information system security risks</li>
<li><strong>Digital Service Providers</strong> are required to notify the appropriate authority of security incidents</li>
</ul>
<p>&nbsp;</p>
<figure id="post-10271 media-10271" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-10271" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS.png" alt="" width="1059" height="390" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS.png 1059w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS-437x161.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS-768x283.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS-71x26.png 71w" sizes="auto, (max-width: 1059px) 100vw, 1059px" /></figure>
<h2>The need for a robust and standardized approach</h2>
<p>The NIS Directive is the <strong>security counterpart to the</strong> <a href="https://ec.europa.eu/commission/priorities/digital-single-market_fr"><strong>European Digital Single Market strategy,</strong></a> which was launched in 2015 and aims to turn digital systems into an engine of growth. Business and consumer trust is essential to this project: because without trust, there will be no growth!</p>
<p>European countries are becoming increasingly dependent on digital and information systems while their networks are becoming ever-more interconnected. <strong>This interconnectivity is both a strength and a weakness</strong> because an information system’s level of security is only as good as its weakest link.</p>
<p>However, there are marked differences when it comes to Member States because to date, cybersecurity issues have been handled at national level.</p>
<p>It is this inherent <strong>systemic risk</strong> that Europe is seeking to remedy with the NIS Directive, which is the first piece of European legislation to govern cybersecurity practices in a cross-sectoral manner.</p>
<p>The NIS Directive  differs from regulations designed to deal with specific issues, such as the GDPR. Though often associated with the NIS Directive, the GDPR does not have the same objectives –  its scope is solely about the protection of personal data. Conversely, the directive aims to ensure a base level of cybersecurity through the implementation of security standards and a requirement to give notice when incidents occur (whether they are personal-data related or not). Having said that, a cyber-attack often involves both areas, and it doesn’t make sense to not(?) consider the two pieces of legislation when thinking about compliance.</p>
<h2>A transposition process already in motion</h2>
<p>As the text is a directive and not a regulation, each Member State has to transpose the directive’s provisions into its own national legislative framework.</p>
<p>Many countries have already announced their first steps:</p>
<ul>
<li>The <strong>UK</strong> has confirmed that it plans to transpose the text, despite Brexit; the levels of penalties provided for in the text, <a href="https://www.gov.uk/government/news/new-fines-for-essential-service-operators-with-poor-cyber-security">which are particularly heavy</a>, have recently been announced;</li>
<li><strong>Poland</strong> has announced the opening of a new national center dedicated to cybersecurity (NC Cyber);</li>
<li><strong>Belgium</strong> has set out six flagship measures to strengthen cybersecurity: a reaction to WannaCry, a global cyber-attack that paralyzed many businesses in recent months;</li>
<li>The <strong>Czech Republic (Czehia)</strong> has amended its cybersecurity laws to take account of more critical sectors and comply with the directive’s requirements;</li>
<li><strong>Italy</strong> has revised its National Plan for Cyber Protection and Digital Security to align with the directive’s provisions;</li>
<li><strong>Croatia</strong> has set up a working group to determine how the directive will be transposed;</li>
<li><strong>Sweden</strong> has already revealed some of the details of its transposition, such as the levels of penalties and the bodies responsible for implementation.</li>
</ul>
<p>In several respects, the <strong>text is very “non-directive”</strong> –  setting out objectives but not specifying how they should be achieved. It will be up to <strong>each country to work out its own interpretation</strong> and draw up the concrete measures that will meet the objectives.</p>
<p>The challenge, therefore, is to <strong>reduce the degree of difference</strong> between European countries, while standardizing the levels of cybersecurity to a greater extent by avoiding large differences so that players operating in several countries don&#8217;t face undue complexity..</p>
<p>To achieve this goal, collaboration is taking place at the EU level:</p>
<ul>
<li>A <strong>review of the remit of ENISA </strong>(the European agency in charge of network and information security) is being considered with the aim of, among other things, giving it the powers needed to carry out directive-related activities.</li>
<li>A <strong>Cooperation Group</strong> made up of national representatives, ENISA, and the European Commission, will provide strategic direction;</li>
<li>A <strong>network of CSIRTs</strong> will also be active and able to ensure that good practice is communicated and exchanged, as well as supporting Member States on directive-related matters.</li>
</ul>
<h2>How should you prepare for the directive coming into effect ?</h2>
<p>Or, more specifically, how can you prepare for this new legislation now and what plan of action will you need to have in place? In practice, that depends on the type of entity in view (an OES or DSP).</p>
<p>For <strong>Digital Service Providers (DSPs)</strong>, a standardized approach is needed: Member States cannot impose additional security or notification requirements and, therefore, for this type of player the directive is closer to an EU regulation. This particular treatment, compared with OESs, arises from the cross-border nature of their activities and the fact that many are foreign companies without bases in Europe.  DSPs will have to appoint an entity which is based in a member state to be their official representative on NIS-related issues (as required by Article 18 of the directive). Thus, it is essential that each Member State has the same requirements, ensuring that future decisions to  enter an EU country are not influenced by uneven interpretation of these criteria.</p>
<p>The obligations for DSPs are somewhat less onerous. For example, they are obliged to notify regulator about an incident only in cases where they have access to the information needed to assess its impact against the criteria defined in the directive (Article 16).</p>
<p>It is already time for DSPs to begin the process of compliance since the implementing acts were published In August of 2016.</p>
<p>For the Operators of Essential Services (OESs) in France, there are two main scenarios.</p>
<p>First, let’s consider the <strong>operators already identified as VIOs—Vitally Important Operators—</strong>under the French Military Programming Act. For them, the issue of compliance is less significant given that the Act already introduces numerous obligations. The directive probably will not impose more onerous requirements. Some elements such as reporting may be adapted, but there are <strong>no major changes in sight</strong>.</p>
<p>However, the scope of the directive is likely to be wider than that of the Act, and some <strong>operators within the critical sectors defined by each state under the directive</strong> will need to begin complying. Member States have until November 2018 to designate operators as “OESs” based on the criteria defined in the text. This list will then be reviewed by the European Commission in May 2019.</p>
<p>Those involved will then have to ensure that they <strong>monitor legislation</strong> in order to follow developments in the transposition process, which is important because Member States have the power to impose measures that go beyond the common, base-level requirements set out in the directive.</p>
<p><em>Much of the development of the directive’s provisions must now be carried out by Member States: the specification of the security measures to be put in place, the definition of notification procedures, the penalties to be applied—not to mention the designation of critical sectors and OESs in each country.</em></p>
<p><em>The upshot of all this is a <strong>genuine renewal of the European cybersecurity legislative landscape</strong>, with the primary aim of increasing standardization of IS security levels between Member States—a process that will prove interesting to follow.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/12/the-eu-nis-directive-what-are-the-issues-and-how-can-you-prepare-for-it/">The EU NIS directive: what are the issues and how can you prepare for it?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lutte anti-blanchiment &#038; financement du terrorisme : ce que va changer la 4ème Directive Européenne</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/09/lutte-anti-blanchiment-financement-du-terrorisme-ce-que-va-changer-la-4eme-directive-europeenne/</link>
		
		<dc:creator><![CDATA[Valerie Hauser]]></dc:creator>
		<pubDate>Mon, 28 Sep 2015 15:28:06 +0000</pubDate>
				<category><![CDATA[Métiers - Stratégie d’entreprise]]></category>
		<category><![CDATA[directive européenne]]></category>
		<category><![CDATA[lutte anti-blanchiment]]></category>
		<category><![CDATA[parlement]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8309</guid>

					<description><![CDATA[<p>Certes considérée comme une avancée marquante dans la lutte anti-blanchiment et contre le financement du terrorisme (LAB/FT) en introduisant une approche par les risques, la 3ème directive européenne a rapidement été considérée comme non satisfaisante. Source d’une trop grande diversité...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/lutte-anti-blanchiment-financement-du-terrorisme-ce-que-va-changer-la-4eme-directive-europeenne/">Lutte anti-blanchiment &#038; financement du terrorisme : ce que va changer la 4ème Directive Européenne</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Certes considérée comme une avancée marquante dans la lutte anti-blanchiment et contre le financement du terrorisme (LAB/FT) en introduisant une approche par les risques, la 3<sup>ème</sup> directive européenne a rapidement été considérée comme non satisfaisante. Source d’une trop grande diversité dans les mesures nationales conduisant à des incohérences dans un contexte transfrontalier; impliquant des obligations simplifiées de vigilance conduisant à une exemption automatique de toute obligation de vigilance pour certaines catégories de clients/transactions. Mais cette 4 <sup>ème</sup> directive va-t-elle suffire ?</p>
<h1 style="margin: 0cm; margin-bottom: .0001pt; text-align: justify;">Une 4<sup>ème</sup> Directive Européenne plus ambitieuse</h1>
<p>Depuis février 2013, une nouvelle directive est en effet en cours de rédaction. Ce processus a abouti avec l’adoption de la 4<sup>ème</sup> directive par le parlement européen le 20 mai 2015.</p>
<p>Elle répond à un double objectif :</p>
<ul>
<li>Adapter, d’une part le cadre juridique aux nouveaux risques de blanchiment et de financement du terrorisme.</li>
<li>Mettre à jour, d’autre part la législation européenne en intégrant les <a href="http://www.fatf-gafi.org/fr/themes/recommandationsgafi/documents/recommandations-gafi.html">recommandations du GAFI de février 2012</a>.</li>
</ul>
<p>Autant d’éléments indispensables entrant dans une dynamique plus importante de transparence et de fluidité dans la lutte anti-blanchiment.</p>
<h1>8 avancées permises par la nouvelle directive</h1>
<h2>1 &#8211; Des mesures de vigilance plus strictes</h2>
<p>La 4<sup>ème</sup> Directive met en place des mesures de vigilance minimales y compris en cas de risque faible, notamment en renforçant les contrôles sur la monnaie électronique anonyme. De plus, afin d’harmoniser l’analyse par les risques entre les Etats membres, des situations présentant un risque faible ou plus élevé sont listées en annexe.</p>
<h2>2 &#8211; Une transparence accrue de l’information sur les bénéficiaires effectifs</h2>
<p><a href="http://www.lesechos.fr/17/12/2014/lesechos.fr/0204023392651_lutte-anti-blanchiment---l-europe-trouve-un-accord-sur-la-transparence.htm">La 4<sup>ème</sup> Directive introduit un nouvel « outil » dans le paysage de la LAB/FT, en mettant en place des registres centralisés sur les bénéficiaires effectifs des personnes morales largement ouverts</a> aux autorités de contrôle, organismes assujettis et au public. A noter toutefois que les mesures visant les<em> trusts</em> sont moins contraignantes que pour les autres personnes morales.  Grâce à cette mesure qui accroît la transparence de l’information sur les bénéficiaires effectifs, les établissements devraient être plus à même de remplir leurs obligations de vigilance.</p>
<h2>3 &#8211; Une liste européenne des juridictions non coopératives</h2>
<p>L’Union Européenne publiera une liste noire des juridictions non coopératives regroupant les pays dont la législation est défaillante en matière de LAB/FT(Lutte anti-blanchiment/Financement du terrorisme). Cette liste prendra en compte les listes existantes dont celles du GAFI (Le Groupe d&#8217;action financière).</p>
<h2>4 &#8211; Distinction des PPE nationales et étrangères</h2>
<p>La notion de PPE (Personne Politiquement Exposée) est affinée et distingue PPE nationales et étrangères. Une PPE nationale est une personne physique qui est ou a été chargée de fonctions publiques importantes par un État membre. Alors qu’une personne physique qui est ou a été chargée de fonctions publiques importantes par un pays tiers répond désormais à la définition de PPE étrangère.</p>
<h2>5 &#8211; Modification des prérogatives des Cellules de Renseignement Financiers (CRF)</h2>
<p>L’indépendance opérationnelle et l’autonomie des CRF sont renforcées.</p>
<h2>6 &#8211; Renforcement du contrôle interne et des procédures LAB/FT à l’échelle groupe</h2>
<p>Les exigences en matière de contrôle interne ainsi que les procédures LAB/FT  sont précisées et renforcées si la taille et la nature de l’activité le justifient :</p>
<ul>
<li>Obligation de mettre en œuvre des procédures de LAB/FT à l’échelle du groupe.</li>
<li>Nomination d’un responsable du contrôle du respect des obligations LAB/FT.</li>
<li>Mise en place d’une fonction d’audit interne indépendante.</li>
</ul>
<h2>7 &#8211; Durcissement des sanctions</h2>
<p>La 4<sup>ème</sup> Directive prévoit une harmonisation minimale des sanctions applicables. De plus, elle introduit des plafonds de sanctions en distinguant les personnes physiques et les personnes morales de sorte que des sanctions pécuniaires puissent désormais être infligées aux personnes physiques.</p>
<h2>8 &#8211; Révision du <a href="http://eur-lex.europa.eu/legal-content/FR/TXT/?uri=CELEX:32006R1781">règlement (CE) n° 1781/2006</a></h2>
<p>Le Règlement sur les informations accompagnant les virements de fonds dont la mise en application est simultanée avec la 4<sup>ème</sup> Directive a pour objectif de réformer le règlement actuel (CE) 1781/2006, de prendre en compte la recommandation n°16 du GAFI et enfin de renforcer les informations accompagnant les transferts de fonds en introduisant de nouvelles obligations relatives au bénéficiaire.</p>
<h1>Une 4<sup>ème</sup> Directive pourtant déjà remise en question</h1>
<p>Avant même son adoption, la nouvelle Directive suscite déjà des critiques. Tout d’abord, la notion de PPE est limitée aux seules fonctions nationales et internationales. Les décideurs régionaux et locaux qui pourtant présentent les plus grands risques de corruption ne seraient donc pas considérés comme des PPE.</p>
<p>Par ailleurs, sa mise en œuvre au sein des établissements financiers français devrait avoir peu d’impacts en France. En effet, l’Ordonnance de 2009 a été amendée par des modifications du code monétaire et des lignes directrices de l’ACPR (Autorité de contrôle prudentiel et de résolution) afin d’anticiper les futures évolutions de la réglementation européenne et celles des recommandations du GAFI.</p>
<p>Cependant, dans le souci d’harmoniser les règlementations des Etats membres, l’affirmation des mesures de cette nouvelle Directive LAB/FT  est indispensable. Dans cette lutte contre le blanchiment et le financement du terrorisme, l’amélioration ne peut se faire que pas à pas. Et en ce sens, la 4ème directive apporte déjà une avancée qu’il serait dommage de remettre fondamentalement en cause.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/lutte-anti-blanchiment-financement-du-terrorisme-ce-que-va-changer-la-4eme-directive-europeenne/">Lutte anti-blanchiment &#038; financement du terrorisme : ce que va changer la 4ème Directive Européenne</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
