65 Amendments of Arba KOKALARI related to 2022/0272(COD)
Amendment 74 #
Proposal for a regulation
Recital 19
Recital 19
(19) Certain tasks provided for in this Regulation should be carried out by ENISA, in accordance with Article 3(2) of Regulation (EU) 2019/881. In particular, ENISA should receive notifications from manufacturers of actively exploited vulnerabilities contained in products with digital elements, as well as incidents having an impact on the security of those products. ENISA should also forward these notifications to the relevant Computer Security Incident Response Teams (CSIRTs) or, respectively, to the relevant single points of contact of the Member States designated in accordance with Article [Article X] of Directive [Directive XXX / XXXX (NIS2)], and inform the relevant market surveillance authorities about the notified vulnerability. On the basis of the information it gathers, ENISA should prepare a biennial technical report on emerging trends regarding cybersecurity risks in products with digital elements and submit it to the Cooperation Group referred to in Directive [Directive XXX / XXXX (NIS2)]. Furthermore, considering its expertise and mandate, ENISA should be able to support the process for implementation of this Regulation. In particular, it should be able to propose joint activities to be conducted by market surveillance authorities based on indications or information regarding potential non-compliance with this Regulation of products with digital elements across several Member States or identify categories of products for which simultaneous coordinated control actions should be organised. In exceptional circumstances, at the request of the Commission, ENISA should be able to conduct evaluations in respect of specific products with digital elements that present a significant cybersecurity risk, where an immediate intervention is required to preserve the good functioning of the internal market. ENISA should publish and maintain a known exploited vulnerability catalogue, as an authoritative source of vulnerabilities exploited. Manufacturers should monitor the catalogue and notify any listed vulnerability found in their product. Active exploitation in this context does not include scanning, security research exploits or Proofs of Concept.
Amendment 78 #
Proposal for a regulation
Recital 22
Recital 22
(22) In order to ensure that products with digital elements, when placed on the market, do not pose cybersecurity risks to persons and organisations, essential requirements should be set out for such products. When the products are subsequently modified, by physical or digital means, in a way that is not foreseen by the manufacturer and that may imply that they no longer meet the relevant essential requirements, the modification should be considered as substantial. For example, software updates or repairs could be assimilated to maintenance operations provided that they do not modify a product already placed on the market in such a way that compliance with the applicable requirements may be affected, or that the intended use for which the product has been assessed may be changed. As is the case for physical repairs or modifications, a product with digital elements should be considered as substantially modified by a software change where the software update modifies the original intended functions, type or performance of the product and these changes were not foreseen in the initial risk assessment, or the nature of the hazard has changed or the level of risk has significantly increased because of the software update.
Amendment 80 #
Proposal for a regulation
Recital 23
Recital 23
(23) In line with the commonly established notion of substantial modification for products regulated by Union harmonisation legislation, whenever a substantial modification occurs that may affect the compliance of a product with this Regulation or when the intended purpose of that product changes, , it is appropriate that the compliance of the product with digital elements is verified and that, where applicable, it undergoes a newthe conformity assessment is updated. Where applicable, if the manufacturer undertakes a conformity assessment involving a third party, changes that might lead to substantial modifications should be notified to the third party. Should a substantial modification be deemed to occur, the update to the conformity assessment should focus solely on the aspects of the assessment affected by the modification.
Amendment 94 #
Proposal for a regulation
Recital 32
Recital 32
(32) In order to ensure that products with digital elements are secure both at the time of their placing on the market as well as throughout their life-cycle, it is necessary to lay down essential requirements for vulnerability handling and essential cybersecurity requirements relating to the properties of products with digital elements. While manufacturers should comply with all essential requirements related to vulnerability handling and ensure that all their products are delivered without any known exploitable vulnerabilities, they should determine which other essential requirements related to the product properties are relevant for the concerned type of product. For this purpose, manufacturers should undertake an assessment of the cybersecurity risks associated with a product with digital elements to identify relevant risks and relevant essential requirements and in order to appropriately apply suitable harmonised standards or common specifications.
Amendment 98 #
Proposal for a regulation
Recital 35
Recital 35
Amendment 103 #
Proposal for a regulation
Recital 45
Recital 45
(45) As a general rule the conformity assessment of products with digital elements should be carried out by the manufacturer under its own responsibility following the procedure based on Module A of Decision 768/2008/EC. The manufacturer should retain flexibility to choose a stricter conformity assessment procedure involving a third-party. If the product is classified as a critical product of class I, additional assurance is required to demonstrate conformity with the essential requirements set out in this Regulation. The manufacturer should apply harmonised standards, common specifications or cybersecurity certification schemes under Regulation (EU) 2019/881 which have been identified by the Commission in an implementing act, if it wants to carry out the conformity assessment under its own responsibility (module A). If the manufacturer does not apply such harmonised standards, common specifications or cybersecurity certification schemes, the manufacturer should undergo conformity assessment involving a third party. Taking into account the administrative burden on manufacturers and the fact that cybersecurity plays an important role in the design and development phase of tangible and intangible products with digital elements, conformity assessment procedures respectively based on modules B+C or module H of Decision 768/2008/EC have been chosen as most appropriate for assessing the compliance of critical products with digital elements in a proportionate and effective manner. The manufacturer that carries out the third- party conformity assessment can choose the procedure that suits best its design and production process. Given the even greater cybersecurity risk linked with the use of products classified as critical class II products, the conformity assessment should always involve a third party.
Amendment 105 #
Proposal for a regulation
Recital 62
Recital 62
(62) In order to ensure that the regulatory framework can be adapted where necessary, the power to adopt acts in accordance with Article 290 of the Treaty should be delegated to the Commission in respect of updates to the list of critical products in Annex III and specifying the definitions of the these product categories. Power to adopt acts in accordance with that Article should be delegated to the Commission to identify products with digital elements covered by other Union rules which achieve the same level of protection as this Regulation, specifying whether a limitation or exclusion from the scope of this Regulation would be necessary as well as the scope of that limitation, if applicable. Power to adopt acts in accordance with that Article should also be delegated to the Commission in respect of the potential mandating ofvoluntary certification of certain highly critical products with digital elements based on criticality crieria set out in this Regulation, as well as for specifying the minimum content of the EU declaration of conformity and supplementing the elements to be included in the technical documentation. It is of particular importance that the Commission carry out appropriate consultations during its preparatory work, including at expert level, and that those consultations be conducted in accordance with the principles laid down in the Inter-institutional Agreement of 13 April 2016 on Better Law-Making 33 . In particular, to ensure equal participation in the preparation of delegated acts, the European Parliament and the Council receive all documents at the same time as Member States’ experts, and their experts systematically have access to meetings of Commission expert groups dealing with the preparation of delegated acts. __________________ 33 OJ L 123, 12.5.2016, p. 1.
Amendment 106 #
Proposal for a regulation
Recital 63
Recital 63
(63) In order to ensure uniform conditions for the implementation of this Regulation, implementing powers should be conferred on the Commission to: specify the format and elements of the software bill of materials, specify further the type of information, format and procedure of the notifications on actively exploited vulnerabilities and incidents submitted to ENISA by the manufacturers, based on industry best practices, specify the European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019/881 that can be used to demonstrate conformity with the essential requirements or parts therefore as set out in Annex I of this Regulation, adopt common specifications in respect of the essential requirements set out in Annex I, lay down technical specifications for pictograms or any other marks related to the security of the products with digital elements, and mechanisms to promote their use, decide on corrective or restrictive measures at Union level in exceptional circumstances which justify an immediate intervention to preserve the good functioning of the internal market. Those powers should be exercised in accordance with Regulation (EU) No 182/2011 of the European Parliament and of the Council34 . __________________ 34 Regulation (EU) No 182/2011 of the European Parliament and of the Council of 16 February 2011 laying down the rules and general principles concerning mechanisms for control by the Member States of the Commission's exercise of implementing powers (OJ L 55, 28.2.2011, p.13).
Amendment 108 #
Proposal for a regulation
Recital 69
Recital 69
(69) Economic operators should be provided with a sufficient time to adapt to the requirements of this Regulation. This Regulation should apply [248 months] from its entry into force, with the exception of the reporting obligations concerning activelyknown exploited vulnerabilities and significant incidents, which should apply [124 months] from the entry into force of this Regulation.
Amendment 109 #
Proposal for a regulation
Recital 71 a (new)
Recital 71 a (new)
(71 a) The Commission shall present easy-to-understand guidelines for businesses with the requirements of this Regulation. When developing such guidelines, the Commission should take into consideration needs of SMEs so as to keep administrative and financial burdens to a minimum while facilitating their compliance with this Regulation. The Commission should consult relevant stakeholders, with expertise in the field of cybersecurity.
Amendment 110 #
Proposal for a regulation
Recital 71 b (new)
Recital 71 b (new)
(71 b) Where third party assessment is mandated, such assessment should take into account: the similarity of products with digital elements by accepting one product as representative of a family or category of products for assessment purposes due to them having equitable hardware and/or software; reciprocity to eliminate duplication by accepting of other entities’ assessments or certification (e.g. recognition of assessments from qualified bodies outside the Union; reuse of certifications); deltas in order to only focus on additional requirements not covered by other entities’ assessments and not reassessing the whole set; attestation in order to accept assessments from the manufacturer for certain aspects of the wider third-party assessment; and maintenance to allow certain changes or software updates to the product without requiring reassessment. In particular, software updates that do not weaken the security posture of the product should not be considered as justifiable to require reassessment.
Amendment 118 #
Proposal for a regulation
Article 2 – paragraph 4 – subparagraph 2
Article 2 – paragraph 4 – subparagraph 2
Amendment 125 #
Proposal for a regulation
Article 3 – paragraph 1 – point 1 a (new)
Article 3 – paragraph 1 – point 1 a (new)
(1 a) 'partly completed products with digital elements’ means an assembly which cannot in itself function so as to perform a specific application and which is only intended to be incorporated into or assembled with a product with digital elements or other partly completed product with digital elements, thereby forming a product with digital elements;
Amendment 137 #
Proposal for a regulation
Article 3 – paragraph 1 – point 31
Article 3 – paragraph 1 – point 31
(31) ‘substantial modification’ means a change to the product with digital elements, excluding security and maintenance updates, following its placing on the market, which affects the compliance of the product with digital elements with the essential requirements set out in Section 1 of Annex I or results in a modification to the intended use for which the product with digital elements has been assessed;
Amendment 138 #
Proposal for a regulation
Article 3 – paragraph 1 – point 39
Article 3 – paragraph 1 – point 39
(39) ‘actively exploited vulnerability’ means a patched vulnerability for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner;
Amendment 140 #
Proposal for a regulation
Article 3 – paragraph 1 – point 40 a (new)
Article 3 – paragraph 1 – point 40 a (new)
(40 a) ‘life-cycle’ means the period from the moment that product covered by this Regulation is placed on the market or put into service until the moment that it is discarded, including the effective time when it is capable of being used and the phases of transport, assembly, dismantling, disabling, scrapping or other physical or digital modifications foreseen by the manufacturer;
Amendment 142 #
Proposal for a regulation
Article 4 – paragraph 1
Article 4 – paragraph 1
1. Member States shall not impede, for the matters covered by this Regulation, the making available on the market of products with digital elements or partly completed products with digital elements which comply with this Regulation.
Amendment 146 #
Proposal for a regulation
Article 4 – paragraph 2
Article 4 – paragraph 2
2. At trade fairs, exhibitions and demonstrations or similar events, Member States shall not prevent the presentation and use of a product with digital elements or partly completed products with digital elements which does not comply with this Regulation.
Amendment 151 #
Proposal for a regulation
Article 6 – paragraph 2 – introductory part
Article 6 – paragraph 2 – introductory part
2. The Commission is empowered to adopt delegated acts in accordance with Article 50 to amend Annex III by including in the list of categories of critical products with digital elements a new category or withdrawing an existing one from that list 48 months after the start of application of this Regulation and every 5 years thereafter. When assessing the need to amend the list in Annex III, the Commission shall take into account the level of cybersecurity risk related to the category of products with digital elements. In determining the level of cybersecurity risk, one or several of the following criteria shall be taken into account:
Amendment 153 #
Proposal for a regulation
Article 6 – paragraph 2 – point c
Article 6 – paragraph 2 – point c
(c) the intended use and scale of performing critical or sensitive functions, such as the volume of processing of personal data;
Amendment 154 #
Proposal for a regulation
Article 6 – paragraph 3
Article 6 – paragraph 3
Amendment 160 #
Proposal for a regulation
Article 6 – paragraph 5 – introductory part
Article 6 – paragraph 5 – introductory part
5. The Commission is empowered to adopt delegated acts in accordance with Article 50 to supplement this Regulation by specifying categories of highly critical products with digital elements for which the manufacturers shall be required tomay obtain a European cybersecurity certificate under a European cybersecurity certification scheme pursuant to Regulation (EU) 2019/881 to demonstrate conformity with the essential requirements set out in Annex I, or parts thereof. When determining such categories of highly critical products with digital elements, the Commission shall take into account the level of cybersecurity risk related to the category of products with digital elements, in light of one or several of the criteria listed in paragraph 2, as well as in view of the assessment of whether that category of products is:
Amendment 162 #
Proposal for a regulation
Article 7 – paragraph 1
Article 7 – paragraph 1
Amendment 164 #
Proposal for a regulation
Article 8 – paragraph 2
Article 8 – paragraph 2
Amendment 167 #
Proposal for a regulation
Article 8 – paragraph 3
Article 8 – paragraph 3
Amendment 168 #
Proposal for a regulation
Article 9 – paragraph 1
Article 9 – paragraph 1
Amendment 180 #
Proposal for a regulation
Article 10 – paragraph 6 – subparagraph 1
Article 10 – paragraph 6 – subparagraph 1
When placing a product with digital elements on the market, and for the expected product lifetime at the time of placing that product on the market or for a period of five years from the placing of the product on the market, whichever is shorter, manufacturers shall ensure that vulnerabilities of that product are handled effectively and in accordance with the essential requirements set out in Section 2 of Annex I.
Amendment 193 #
Proposal for a regulation
Article 11 – paragraph 1
Article 11 – paragraph 1
1. The manufacturer shall, without undue delay and in any event within 24 hours of becoming aware of it, notify to ENISA any actively exploitedwhen it has a reasonable belief that a critical or high vulnerability listed in the known exploited vulnerability catalogue referred to in paragraph 5a is present and exploitable in the product with digital elements, and after clear remediation guidance is made available, notify to ENISA such listed known vulnerability contained in the product with digital elements. The notification shall include details concerning that vulnerability and, where applicable, any corrective or mitigating measures taken. ENISA shall, without undue delay, unless for justified cybersecurity risk-related grounds, forward the notification to the CSIRT designated for the purposes of coordinated vulnerability disclosure in accordance with Article [Article X] of Directive [Directive XXX/XXXX (NIS2)] of Member States concerned upon receipt and inform the market surveillance authority about the notified vulnerability.
Amendment 197 #
Proposal for a regulation
Article 11 – paragraph 2
Article 11 – paragraph 2
2. The manufacturer shall, without undue delay and in any event within 24 hours of becoming aware of it, notify to ENISAwhen it has a reasonable belief that a significant incident has occurred, notify any incident having a significant impact on the security of the product with digital elements. ENISA shall, without undue delay, unless for justified cybersecurity risk-related grounds, forward the notificationdevelopment, build and distribution environment of the product with digital elements to the single point of contact designated in accordance with Article [Article X] of Directive [Directive XXX/XXXX (NIS2)] of the Member States concerned and inform the market surveillance authority about the notified significant incidents. The significant incident notification shall include information on the severity and impact of the incidentstrictly necessary information to make the competent authority aware of the incident and allow the entity to seek assistance if requires and, where applicable, indicate whether the manufacturer suspects the incident to be caused by unlawful or malicious acts or considers it to have a cross-border impact. The mere act of notification shall not subject the notifying entity to increased liability.
Amendment 200 #
Proposal for a regulation
Article 11 – paragraph 3
Article 11 – paragraph 3
3. ENISA shall submit to the European cyber crisis liaison organisation network (EU-CyCLONe) established by Article [Article X] of Directive [Directive XXX/XXXX (NIS2)] information notified pursuant to paragraphs 1 and 2 if such information is relevant for the coordinated management of large-scale cybersecurity significant incidents and crises at an operational level.
Amendment 203 #
Proposal for a regulation
Article 11 – paragraph 4
Article 11 – paragraph 4
4. The manufacturer shall inform, without undue delay and after becoming aware, the users of the product with digital elements about the, where appropriate and if likely to be adversely affected by the significant incident and, where necessary, about corrective measures that the user can deploy to mitigate the impact of the incident.
Amendment 206 #
Proposal for a regulation
Article 11 – paragraph 6
Article 11 – paragraph 6
6. ENISA, on the basis of the notifications received pursuant to paragraphs 1 and 2, shall prepare a biennial technical report on emerging trends regarding cybersecurity risks in products with digital elements and submit it to the Cooperation Group referred to in Article [Article X] of Directive [Directive XXX/XXXX (NIS2)]. The first such report shall be submitted within 24 months after the obligations laid down in paragraphs 1 and 2 start applying.
Amendment 216 #
Proposal for a regulation
Article 18 – paragraph 1 a (new)
Article 18 – paragraph 1 a (new)
1 a. The Commission shall, as provided in Article 10(1) of Regulation (EU) 1025/2012, request one or more European standardisation organisations to draft harmonised standards for the requirements set out in Annex I.
Amendment 221 #
Proposal for a regulation
Article 19 – paragraph 1
Article 19 – paragraph 1
Amendment 228 #
Proposal for a regulation
Article 22 – paragraph 6 a (new)
Article 22 – paragraph 6 a (new)
6 a. The Commission shall present easy-to-understand guidelines for businesses with the requirements of this Regulation. When developing such guidelines, the Commission should take into consideration needs of SMEs so as to keep administrative and financial burdens to a minimum while facilitating their compliance with this Regulation. The Commission should consult relevant stakeholders, with expertise in the field of cybersecurity.
Amendment 231 #
Proposal for a regulation
Article 23 – paragraph 3
Article 23 – paragraph 3
3. For products with digital elements referred to in Articles 8 and 24(4) that are also subject to other Union acts, one single technical documentation shall be drawn up containing the information referred to in Annex V of this Regulation and the information required by those respective Union acts.
Amendment 232 #
Proposal for a regulation
Article 23 – paragraph 5
Article 23 – paragraph 5
Amendment 238 #
Proposal for a regulation
Article 24 – paragraph 4 a (new)
Article 24 – paragraph 4 a (new)
4 a. For products to which Union harmonisation legislation based on the New Legislative Framework apply, the manufacturer shall follow the relevant conformity assessment as required under those legal acts. The requirements set out in Chapter 3 shall apply to those products.
Amendment 242 #
Proposal for a regulation
Article 24 a (new)
Article 24 a (new)
Amendment 244 #
Proposal for a regulation
Article 27 – paragraph 5
Article 27 – paragraph 5
5. A notifying authority shall safeguard the confidentiality of the information it obtains, especially trade secrets and proprietary information.
Amendment 245 #
Proposal for a regulation
Article 27 – paragraph 6 a (new)
Article 27 – paragraph 6 a (new)
6 a. A notifying authority shall be organised in such a way so that bureaucracy and fees are at an absolute minimum, especially for SMEs.
Amendment 246 #
Proposal for a regulation
Article 29 – paragraph 10
Article 29 – paragraph 10
10. The personnel of a conformity assessment body shall observe professional secrecy with regard to all information obtained in carrying out their tasks under Annex VI or any provision of national law giving effect to it, except in relation to the market surveillance authorities of the Member State in which its activities are carried out. Proprietary rights, trade secrets and other sensitive information shall be protected. The conformity assessment body shall have documented procedures ensuring compliance with this paragraph.
Amendment 247 #
Proposal for a regulation
Article 29 – paragraph 12
Article 29 – paragraph 12
12. Conformity assessment bodies shall operate in accordance with a set of consistent, fair and reasonable terms and conditions, in particular taking into account the interests of SMEs in relation to fees and also respecting the confidentiality of trade secrets and proprietary information.
Amendment 250 #
Proposal for a regulation
Article 36 – paragraph 3
Article 36 – paragraph 3
3. The Commission shall ensure that all trade secrets and sensitive information obtained in the course of its investigations is treated confidentially.
Amendment 251 #
Proposal for a regulation
Article 37 – paragraph 2
Article 37 – paragraph 2
2. Conformity assessments shall be carried out in a proportionate manner, avoiding unnecessary burdens for economic operators, with special considerations for SMEs. Conformity assessment bodies shall perform their activities taking due account of the size of an undertaking, the sector in which it operates, its structure, the degree of complexity of the product technology in question and the mass or serial nature of the production process.
Amendment 253 #
Proposal for a regulation
Article 39 – paragraph 1
Article 39 – paragraph 1
The Commission shall provide for the organisation of exchange of experience between the Member States' national authorities responsible for notification policy. Experience and knowledge which also can facilitate corporate compliance must also be made publicly available by the Commission.
Amendment 254 #
Proposal for a regulation
Article 40 – paragraph 1
Article 40 – paragraph 1
1. The Commission shall ensure that appropriate coordination and cooperation between notified bodies are put in place in a way that reduces bureaucracy and fees, and properly operated in the form of a cross-sectoral group of notified bodies.
Amendment 255 #
Proposal for a regulation
Article 40 – paragraph 2
Article 40 – paragraph 2
2. Member States shall ensure that the bodies notified by them participate in the work of that group, directly or by means of designated representatives, in a way that reduces bureaucracy and fees.
Amendment 265 #
Proposal for a regulation
Article 42 – paragraph 1
Article 42 – paragraph 1
Where necessary to assess the conformity of products with digital elements and the processes put in place by their manufacturers with the essential requirements set out in Annex I and upon a reasoned request, the market surveillance authorities shall be granted access to the data required to assess the design, development, production and vulnerability handling of such products, including related internal documentation of the respective economic operator. Where appropriate, and in accordance with Article 52(1) point (a), this shall be in a secure, controlled environment determined by the manufacturer.
Amendment 296 #
Proposal for a regulation
Article 55 – paragraph 1
Article 55 – paragraph 1
1. EU type-examination certificates and approval decisions issued regarding cybersecurity requirements for products with digital elements that are subject to other Union harmonisation legislation shall remain valid until [42 months after the date of entry into force of this Regulation], unless they expire beforeafter that date, or unless otherwise specified in other Union legislation, in which case they shall remain valid as referred to in that Union legislation.
Amendment 302 #
Proposal for a regulation
Article 57 – paragraph 2
Article 57 – paragraph 2
It shall apply from [248 months after the date of entry into force of this Regulation]. However Article 11 shall apply from [12 months after the date of entry into force of this Regulation].
Amendment 303 #
Proposal for a regulation
Annex I – Part 1 – point 2
Annex I – Part 1 – point 2
(2) Products with digital elements shall be delivered without any known critical or high severity exploitable vulnerabilities;
Amendment 306 #
Proposal for a regulation
Annex I – Part 1 – point 3 – point a
Annex I – Part 1 – point 3 – point a
(a) be delivered with a secure by default configuration, including the possibility to reset the product to its original state;
Amendment 309 #
Proposal for a regulation
Annex I – Part 1 – point 3 – point c
Annex I – Part 1 – point 3 – point c
(c) protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encryptingon, tokenization, compensating controls or other adequate protection of relevant data at rest or in transit by state of the art mechanisms;
Amendment 313 #
Proposal for a regulation
Annex I – Part 1 – point 3 – point i
Annex I – Part 1 – point 3 – point i
(i) be designed, developed and produced to reduce the impact of an significant incident using appropriate exploitation mitigation mechanisms and techniques;
Amendment 315 #
Proposal for a regulation
Annex I – Part 1 – point 3 – point k
Annex I – Part 1 – point 3 – point k
(k) ensure that vulnerabilities can be addressed through security updates, including, where applicable, separate from functionality updates and through automatic updates and the notification of available updates to users.
Amendment 318 #
Proposal for a regulation
Annex I – Part 2 – paragraph 1 – point 2
Annex I – Part 2 – paragraph 1 – point 2
(2) in relation to the risks posed to the products with digital elements, address and remediate critical and high vulnerabilities without delay, including by providing security updates or document the reasons for not remediating the vulnerability;
Amendment 319 #
Proposal for a regulation
Annex I – Part 2 – paragraph 1 – point 4
Annex I – Part 2 – paragraph 1 – point 4
(4) once a security update has been made available, publically or according to industry best practice disclose information about fixed known vulnerabilities, including a description of the vulnerabilities, information allowing users to identify the product with digital elements affected, the impacts of the vulnerabilities, their severity and information helping users to remediate the vulnerabilities;
Amendment 321 #
Proposal for a regulation
Annex I – Part 2 – paragraph 1 – point 4 a (new)
Annex I – Part 2 – paragraph 1 – point 4 a (new)
(4 a) Information regarding fixes and vulnerabilities is shared and disclosed in a controlled way, respecting principles of ‘harm reduction’ and trade secrets through responsible disclosure of vulnerabilities to the actors who can act to mitigate the vulnerability, and that it is not made publicly available to avoid the risk of inadvertently informing potential attackers;
Amendment 323 #
Proposal for a regulation
Annex I – Part 2 – paragraph 1 – point 8
Annex I – Part 2 – paragraph 1 – point 8
(8) ensure that, where security patches or updates arcan reasonably be made available to address identified security issues, theyre is a means by which users can obtain them are disseminated without delay and free of charge or at a transparent and non-discriminatory cost, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken.
Amendment 329 #
Proposal for a regulation
Annex II – paragraph 1 – point 9 – point a
Annex II – paragraph 1 – point 9 – point a
Amendment 330 #
Proposal for a regulation
Annex II – paragraph 1 – point 9 – point b
Annex II – paragraph 1 – point 9 – point b
Amendment 332 #
Proposal for a regulation
Annex II – paragraph 1 – point 9 – point d
Annex II – paragraph 1 – point 9 – point d
Amendment 345 #
Proposal for a regulation
Annex V – paragraph 1 – point 2 – point a
Annex V – paragraph 1 – point 2 – point a
Amendment 346 #
Proposal for a regulation
Annex V – paragraph 1 – point 3
Annex V – paragraph 1 – point 3
3. an statement or a summary of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained as laid down in Article 10 of this Regulation and, further to a reasoned request from a market surveillance authority, provided that it is necessary in order for this authority to be able to check compliance with the essential requirements set out in Annex I, a detailed assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained as laid down in Article 10 of this Regulation;