Generated by GPT-5-mini| Network and Information Security Directive | |
|---|---|
| Title | Network and Information Security Directive |
| Status | Retained as NIS Directive (EU Directive) |
| Adopted | 2016 |
| In force | 2016 |
| Replaced by | Directive (EU) 2016/1148 (NIS), partially succeeded by NIS2 |
| Jurisdiction | European Union |
Network and Information Security Directive The Network and Information Security Directive is a European Union law adopted in 2016 to enhance cybersecurity across member states, coordinating measures among European Commission, European Parliament, Council of the European Union, European Council and national authorities. It arose from concerns raised by incidents such as the WannaCry ransomware attack, the NotPetya cyberattack, the Sony Pictures hack and strategic assessments from institutions like ENISA, Europol and NATO.
The directive was developed in response to high-profile incidents involving Ukraine power grid attack, Stuxnet, Equifax data breach, Yahoo data breaches and strategic reports by European External Action Service, European Central Bank, International Telecommunication Union and World Economic Forum. Legislative drafting involved actors including Jeroen Dijsselbloem, Věra Jourová, Jean-Claude Juncker, Federica Mogherini and committees such as the Committee on Industry, Research and Energy and Committee on Civil Liberties, Justice and Home Affairs. It interacts with instruments like the General Data Protection Regulation, the eIDAS Regulation, the Budapest Convention on Cybercrime and the Directive on attacks against information systems while drawing on standards from ISO/IEC 27001, NIST Cybersecurity Framework and guidance by ENISA.
The directive defines essential and digital service operators, referencing sectors such as energy sector, transport sector, banking sector, healthcare sector, digital infrastructure and cloud computing provided by entities like Deutsche Telekom, Orange S.A., Telefonica, Siemens and Schneider Electric. It differentiates operators of essential services and digital service providers, invoking definitions aligned with instruments like NIS2 and input from agencies including CERT-EU, EUROPOL's European Cybercrime Centre and European Banking Authority. Core terms were harmonized across member states including Germany, France, Poland, Italy and Spain to address cross-border incidents affecting networks operated by companies such as EDF, Enel, Iberdrola, Ryanair and Maersk.
The directive obliges risk management, incident notification, and cooperation mechanisms modeled after practices at ENISA, NATO Cooperative Cyber Defence Centre of Excellence, US Department of Homeland Security, Cybersecurity and Infrastructure Security Agency and National Cyber Security Centre (UK). It requires operators to implement technical and organizational measures similar to ISO/IEC 27002 guidance and to notify significant incidents akin to practices in Bank for International Settlements frameworks. The law mandates designation of national competent authorities, single points of contact, and a network of Computer Security Incident Response Teams like CERT-France, CERT-UK, CERT-Eu and CSIRT-NL to coordinate with INTERPOL, FBI and German Federal Office for Information Security (BSI) during transnational incidents.
Member states transposed the directive into national law with instruments involving ministries such as Ministry of Economic Affairs (Netherlands), Bundesministerium des Innern (Germany), Ministry of the Interior (France) and regulators including Autorité de la concurrence, National Commission for Data Protection (CNIL), BaFin and Comisión Nacional de los Mercados y la Competencia. Compliance frameworks cite standards from ISO, IEC, NIST, procurement practices of European Investment Bank and sectoral regulators like European Banking Authority, European Aviation Safety Agency and European Medicines Agency. Capacity building leveraged funding streams managed by European Structural and Investment Funds, Horizon 2020, Connecting Europe Facility and cooperation with World Bank cybersecurity initiatives.
Enforcement relied on national competent authorities such as ANSSI (France), CNPD, BNetzA (Germany), AEPD (Spain) and Garante (Italy), which applied administrative measures, remediation orders and fines in line with national administrative law traditions exemplified by rulings from courts like the Court of Justice of the European Union and tribunals such as the General Court. Sanctions could include administrative fines, operational restrictions and public reporting requirements, coordinated with supervisory actions by entities like European Securities and Markets Authority, European Insurance and Occupational Pensions Authority and criminal investigations involving Eurojust or national prosecutors such as the Parquet National Financier.
The directive drove harmonization between member states including Belgium, Sweden, Denmark, Romania and Greece and influenced successor legislation like NIS2 and policy debates in bodies including European Council on Foreign Relations, Bruegel, Chatham House and Carnegie Endowment for International Peace. Critics from think tanks such as Center for European Policy Studies, RAND Corporation, Bertelsmann Stiftung and legal scholars at Hertie School argued it created uneven burdens on small and medium enterprises represented by Eurochambres and SME United, raised concerns echoed by BusinessEurope, and left gaps noted by researchers at University of Oxford, KU Leuven and Stanford University. Proponents highlighted improved incident reporting, cross-border cooperation, and resilience demonstrated during events like SolarWinds supply chain attack simulations coordinated with ENISA and CERT-EU.