As a prominent voice in the European Union (EU) and a founder of the European Council, France has also led European digital strategy and its efforts to become safer and more autonomous.
France has updated and refined its cybersecurity laws and regulations to reflect its dedication to building better cybersecurity practices. This post highlights those laws and regulations to help you understand cybersecurity requirements in France and how to achieve compliance.
Learn how UpGuard helps businesses become compliant with laws and regulations >
In 2015, French Prime Minister Manuel Valls announced France’s national digital security strategy to help the French fully transition into a modern, digital society. The strategy was led by the agence nationale de la sécurité des systèmes d'information (ANSSI), also known as the French National Agency for the Security of Information Systems.
This initiative responds to the digital age’s emerging issues. While new technologies have inspired innovation and growth, addressing the increased risks of cybercrime, sabotage, the exploitation of personal data, espionage, and propaganda is necessary. These cyber threats affect the state of France and the EU, its citizens, and economic stakeholders.
France has noted that cyber attacks from state or non-state groups:
Accordingly, France’s National Digital Security Strategy focuses on the following:
In May 2022, a European Union initiative led to the meeting of three European cybersecurity communities: Cyber Crisis Liaison Organisation Network (CyCLONe), CSIRTs (Computer Security Incident Response Teams) Network, and Network and Information Systems (NIS) Cooperation Group. These groups also include the European Commission and ENISA. Together, they pursue the common goal of strengthening Europe’s cybersecurity.
With the cooperation of ANSSI, the French Ministry for the Armed Forces, and the Minister of the Interior, among other stakeholders, and international forums such as NATO, the G7, and the OSCE, France is enhancing European and homeland cybersecurity. It is determined to respond to the technical advancements of information systems with appropriate security measures to protect the country’s infrastructure and economy.
In France, the data protection authority is the Commission Nationale de l’Informatique et des Libertés (CNIL), which provides the public with information and support regarding protecting data and how to be compliant.
CNIL was created following a government proposal to introduce a unique identifier for every citizen of France (SAFARI) — the proposal aimed to interconnect government records. The government created an independent oversight committee to ensure that despite Information Technology (IT) developments, organizations would make adequate efforts to protect people’s privacy, rights, and liberties.
France’s CNIL aims to help anyone working with data to do so with the proper respect for privacy. It achieves these goals through workshops, online information, and advising companies so they can begin their activities with privacy in mind.
CNIL is also responsible for investigating non-compliance with data protection laws and issuing fines for non-compliance in France. It can be investigated on-site or online. In 2021, it carried out 173 of its 384 investigations online.
Some of CNIL’s fines, outlined below, illustrate how a financial penalty can motivate an entity, particularly an industry behemoth, to protect its data, clients, and country.
France’s drive to transition to a modern digital society while addressing the inherent and growing cybersecurity risks has led to new acts, decrees, and regulations, in addition to updates of outdated legislation. We've collated the most prominent and important to help businesses operating in France handle the complexity of French cybersecurity laws and regulations.
All the following cybersecurity regulations support customer data security and data breach resilience. To help understand these French laws and regulations, we’ve included the following helpful information with each listed regulation:
This data protection regulation makes the following data types subject to authorization:
France’s Data Protection and Privacy Act 1978 obligated information security from 1978. The Act is reinforced by the EU GDPR.
Articles 34 and 34-bis of DPA 1978 consider cybersecurity, insisting that public and private entities implement appropriate security measures when processing personal data. The stipulations include protecting this data from unauthorized access, modification, or theft.
These articles also require internet service providers (ISPs) to record cyber attacks and report data breaches to CNIL immediately.
Non-compliance with DPA 1978 used to carry a maximum fine of €3 million. With the introduction of the EU General Data Protection Regulation (GDPR), however, in effect 25 May 2018, all private or public data controllers and processors risk an administrative fine of up to €20 million or 4% of the organization’s global annual turnover, whichever is more.
CNIL may also seek an injunction to prevent the firm from processing data, conducting inspections, and issuing non-compliance warnings to the public. In the event of criminal sanctions, the data controller could face as much as five years in prison.
The following list of free resources could help organizations achieve DPA 1978 compliance:
CNIL is the regulatory authority for the EU’s GDPR, which obligates public and private sector organizations to protect data. GDPR came into place in May 2018 to reinforce the Data Protection and Privacy Act 1978 framework. With GDPR, personal data security now has more requirements. And data protection authorities are more empowered to support organizations.
Under GDPR, organizations handling data must:
Yes, all firms collecting or processing data in the EU must comply with GDPR. It imposes cyber security obligations on organizations of all sizes and sectors.
CNIL has the power to investigate and verify a firm’s level of compliance with GDPR. It can impose a formal notice and fines on a data controller if dissatisfied.
Non-compliance with GDPR can lead to an administrative fine of €20 million or 4% of the organization’s annual turnover, whichever is more.
The following list of free resources could help organizations achieve GDPR compliance:
According to decrees 2015-350 and 2015-351 (27 March 2015), organizations in key sectors must:
This act designated the governmental agency ANSSI, operating under the General Secretary for Defense and National Security, to ensure that the law is applied correctly and upholds network and information systems security.
Yes. Organizations must adopt certain measures when requested by relevant authorities.
Non-compliance with MPA 2013 can result in a fine of 150,000 euros.
The following list of free resources could help organizations achieve MPA 2013 compliance:
This act (no. 2013-1168 of 18 December) outlines several cybersecurity obligations for vitally important operators (VIOs). Article L.1332-1 of the French Defence Code defines these vitally important operators as public or private establishments, the loss of which would seriously impair the economic or military power of the country. This includes banks, nuclear power plants, hospitals, restoration, education, and digital infrastructure. The exhaustive list of VIOs can be found in the annex of Decree No. 2018-384.
Article 22 of MPA 2014 - 2019 gave France’s National Cybersecurity Agency (ANSSI) new prerogatives on behalf of the Prime Minister. With the introduction of this act, it could enforce security and control measures.
According to Article 22 of this law, vitally important operators must report incidents detected on their IT systems to the relevant authorities.
According to decrees 2015-350 and 2015-351, VIOs must implement detection tools to prevent cyber attacks on their networks and IT infrastructures. They must also perform regular security audits of their IT infrastructures and adopt any particular measures requested by the relevant authorities.
Non-compliance can lead to a fine of as much as 150,000 euros.
The following list of free resources could help organizations achieve MPA 2014 - 2019 compliance:
The main goals of the NIS2 Directive, proposed in December 2020, are to:
NIS2, approved in November 2022, standardizes and clarifies risk management measures and reporting obligations across all critical sectors. It sets minimum regulatory rules and promotes cooperation between each member state’s relevant authorities.
This directive established CyCLONe, which coordinates crisis management for large-scale cybersecurity incidents.
NIS2 also introduces a size cap so that the directive covers all medium and large entities. It covers public administrations, as they are often cyber attack targets, commonly via ransomware, but does not apply to defense or national security entities, the judiciary, law enforcement, public security, parliaments, and central banks.
To avoid over-reporting and burdening the covered entities, NIS2 streamlines earlier reporting obligations. It also proposes that encryption be mandatory for key services.
This NIS directive entails various incident reporting and information management obligations to help strengthen cybersecurity across the EU.
Each EU member state may set its own penalty limit for NIS2 non-compliance. Non-compliance with NIS2 could lead organizations to face fines in France's region of €20 million.
The following list of free resources could help organizations achieve NIS2 compliance:
eIDAS stands for Electronic Identification, Authentication, and Trust Services. This was created to foster digital trust in electronic transactions across EU member states. It intends to create a foundation for secure electronic transmission between public authorities, businesses, and citizens to make public and private online services, business, and commerce more effective.
The eIDAS regulation builds on the European Parliament and the European Council’s 1999/93/EC directive, which delivered a secure framework for safe and secure electronic transactions. It aims to enhance people’s digital rights and enjoyment of a single market with cross-border digital services while simultaneously fighting the potentially diverse power of cybercrime.
Directive 1999/93/EC aims to make it easier for people to access services, such as healthcare, across Europe using the access credentials common to their home country. This level of accessibility and digital infrastructure, however, requires data protection, secure electronic identification, and authentication regulated by eIDAS.
eIDAS defines the standards for electronic identification in the EU, including:
It aims to give electronic transactions the legal validity of paper documents.
Complying with eIDAS is mandatory for trust service providers serving clients within the EU. This includes companies that provide the following:
There are no specific penalties for using the EU trust mark incorrectly or without being accredited.
Launched in September 2006, the PCI DSS requirements aim to see to it that all entities storing, processing, and transmitting credit card information do so securely. It manages PCI security standards and aims to improve account security.
It’s an independent body created by JCB, Discover, American Express, MasterCard, and Visa and administered by the PCI Security Standards Council (PCI SSC), but the payment brands are responsible for enforcing compliance.
These firms wish people to use their cards worldwide, so these standards apply in France. The 12 requirements for PCI DSS compliance, in no intentional order, are as follows:
PCI DSS is a standard, not a law. However, it is enforced through contracts between merchants, payment brands, and banks. To avoid fines and other repercussions, all service providers and merchants that process, transmit, or store cardholder data must comply with PCI DSS.
Non-compliance with PCI DSS can lead to a firm being penalized between €4,300 and €86,000 per month until they are compliant.
Banks may also impose fees or make their transactions more costly. And the card brand may seek compensation for costs incurred due to the security incident. These costs could be as much as €4700 to €9500 per month.
The EU’s Payment Services Directive is a European regulation for electronic payment services. It aims to make payments more secure in Europe, help banking services adapt to emerging technologies, and boost innovation. It has helped banks open their payment services to Third-Party Payment Services Providers.
The original PSD began in 2007. 2013s PSD2 considers two developments that changed the landscape of payment processing: Account Information Services (AIS), which allowed customers to view their financial situation efficiently, and Payment Initiation Services (PIS), which facilitated online banking to make online payments.
After some delays, PSD2 finally went into force in September 2019, including regulations to protect online payments, using strong authentication, such as multi-factor authentication, and improving customer data security.
Yes, PSD2 is mandatory in the EU and the European economic area. Companies must apply for a license to become a payment initiation service provider (PISP) or an account information service provider (AISP).
Potential penalties for PSD2 non-compliance are significant. An entity can be fined 4% of its total turnover, depending on which penalty is more.