Source: OJ L 333, 27.12.2022, p. 1–79
EN
- Digital operational resilience act
Basic legislative acts
- DORA regulation
Article 8 Identification
As part of the ICT risk means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; management framework referred to in Article 6(1), financial entitiesas defined in Article 2, points (a) to (t) shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information assets means a collection of information, either tangible or intangible, that is worth protecting; and ICT assets means a software or hardware asset in the network and information systems used by the financial entity; supporting those functions, and their roles and dependencies in relation to ICT risk means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment;. Financial entitiesas defined in Article 2, points (a) to (t) shall review as needed, and at least yearly, the adequacy of this classification and of any relevant documentation.
proportionality Paragraph allows for application of the proportionality principle according to Article 4.Financial entitiesas defined in Article 2, points (a) to (t) shall, on a continuous basis, identify all sources of ICT risk means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment;, in particular the risk means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; exposure to and from other financial entitiesas defined in Article 2, points (a) to (t), and assess cyber threats means a cyber threat as defined in Article 2, point (8), of Regulation (EU) 2019/881; and ICT vulnerabilities means a weakness, susceptibility or flaw of ICT products or ICT services that can be exploited by a cyber threat; relevant to their ICT supported business functions, information assets means a collection of information, either tangible or intangible, that is worth protecting; and ICT assets means a software or hardware asset in the network and information systems used by the financial entity;. Financial entitiesas defined in Article 2, points (a) to (t) shall review on a regular basis, and at least yearly, the risk means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; scenarios impacting them.
proportionality Paragraph allows for application of the proportionality principle according to Article 4.Financial entitiesas defined in Article 2, points (a) to (t), other than microenterprises means a financial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and/or annual balance sheet total that does not exceed EUR 2 million;, shall perform a risk means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; assessment upon each major change in the network and information system means: any device or group of interconnected or related devices, one or more of which, pursuant to a programme, carry out automatic processing of digital data; or digital data stored, processed, retrieved or transmitted by elements covered under points (a) and (b) for the purposes of their operation, use, protection and maintenance; an electronic communications network as defined in Article 2, point (1), of Directive (EU) 2018/1972; infrastructure, in the processes or procedures affecting their ICT supported business functions, information assets means a collection of information, either tangible or intangible, that is worth protecting; or ICT assets means a software or hardware asset in the network and information systems used by the financial entity;.
exemption Paragraph has a reduced scope, i.e., it does not apply to all financial entities in Article 2(1) but some or only those of a certain size.proportionality Paragraph allows for application of the proportionality principle according to Article 4.Financial entitiesas defined in Article 2, points (a) to (t) shall identify all information assets means a collection of information, either tangible or intangible, that is worth protecting; and ICT assets means a software or hardware asset in the network and information systems used by the financial entity;, including those on remote sites, network resources and hardware equipment, and shall map those considered critical. They shall map the configuration of the information assets means a collection of information, either tangible or intangible, that is worth protecting; and ICT assets means a software or hardware asset in the network and information systems used by the financial entity; and the links and interdependencies between the different information assets means a collection of information, either tangible or intangible, that is worth protecting; and ICT assets means a software or hardware asset in the network and information systems used by the financial entity;.
proportionality Paragraph allows for application of the proportionality principle according to Article 4.Financial entitiesas defined in Article 2, points (a) to (t) shall identify and document all processes that are dependent on ICT third-party service providers means an undertaking providing ICT services;, and shall identify interconnections with ICT third-party service providers means an undertaking providing ICT services; that provide services that support critical or important functions means a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;.
COIF Paragraph has special considerations for 'critical or important functions' as defined by Article 3 point 22.proportionality Paragraph allows for application of the proportionality principle according to Article 4.For the purposes of paragraphs 1, 4 and 5, financial entitiesas defined in Article 2, points (a) to (t) shall maintain relevant inventories and update them periodically and every time any major change as referred to in paragraph 3 occurs.
proportionality Paragraph allows for application of the proportionality principle according to Article 4.Financial entitiesas defined in Article 2, points (a) to (t), other than microenterprises means a financial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and/or annual balance sheet total that does not exceed EUR 2 million;, shall on a regular basis, and at least yearly, conduct a specific ICT risk means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; assessment on all legacy ICT systems means an ICT system that has reached the end of its lifecycle (end-of-life), that is not suitable for upgrades or fixes, for technological or commercial reasons, or is no longer supported by its supplier or by an ICT third-party service provider, but that is still in use and supports the functions of the financial entity; and, in any case before and after connecting technologies, applications or systems.
exemption Paragraph has a reduced scope, i.e., it does not apply to all financial entities in Article 2(1) but some or only those of a certain size.proportionality Paragraph allows for application of the proportionality principle according to Article 4.
Springlex and this text is meant purely as a documentation tool and has no legal effect. No liability is assumed for its content. The authentic version of this act is the one published in the Official Journal of the European Union.