Source: OJ L, 2024/1774, 25.6.2024
EN- Digital operational resilience in the financial sector
ICT risk management
- RTS on ICT risk management framework
Article 14 Securing information in transit
As part of the safeguards to preserve the availability, authenticity, integrity and confidentiality of data, financial entitiesas defined in Article 2, points (a) to (t) shall develop, document, and implement the policies, procedures, protocols, and tools to protect information in transit. Financial entitiesas defined in Article 2, points (a) to (t) shall in particular ensure all of the following:
the availability, authenticity, integrity and confidentiality of data during network transmission, and the establishment of procedures to assess compliance with those requirements;
the prevention and detection of data leakages and the secure transfer of information between the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations; and external parties;
that requirements on confidentiality or non-disclosure arrangements reflecting the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;’s needs for the protection of information for both the staff of the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations; and of third parties are implemented, documented, and regularly reviewed.
Financial entitiesas defined in Article 2, points (a) to (t) shall design the policies, procedures, protocols, and tools to protect the information in transit referred to in paragraph 1 on the basis of the results of the approved data classification and of the ICT risk means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; assessment.
Springlex and this text is meant purely as a documentation tool and has no legal effect. No liability is assumed for its content. The authentic version of this act is the one published in the Official Journal of the European Union.