Cybersecurity 2025

Last Updated March 13, 2025

Portugal

Law and Practice

Authors



Abreu Advogados is a big four independent law firm with over 30 years of experience in the Portuguese market, navigating in tomorrow’s sectors and industries. The firm continuously attracts strategic opportunities for its clients in key areas such as finance, corporate and M&A, tax, litigation, and competition, among others. The firm invests in multidisciplinary teams that tackle increasingly complex transactions with cost-effective solutions and anticipate clients’ needs with a business-oriented vision. Either from Portugal or internationally, Abreu is chosen to provide legal advice in international transactions across Portuguese-speaking countries, particularly Angola, Mozambique and Timor-Leste. Abreu Advogados partnered with FBL Advogados in 2007 and with JLA Advogados in 2010 to meet clients’ interests in the Angolan, Mozambican and Portuguese markets while benefitting from an international decision-making process when presenting innovative legal solutions to its clients.

Portugal has demonstrated a strong commitment to enhancing the country’s cybersecurity by defining a National Cybersecurity Strategy for 2019 to 2023. This government initiative outlines three strategic objectives to ensure a high national level of cybersecurity: i) maximising digital resilience; ii) promoting innovation in cyberspace; and iii) generating and securing resources. To achieve these objectives, the government has set six priorities:

  • cyberspace security structure;
  • prevention, education, and awareness;
  • protection of cyberspace and infrastructures;
  • response to threats and combating cybercrime;
  • research, development, and innovation; and
  • national and international co-operation.

The National Cybersecurity Centre (CNCS), as the national cybersecurity authority, has undertaken various actions to implement the Action Plan of the National Cybersecurity Strategy. The CNCS has particularly focused on preventing cyber-risks and raising awareness among citizens and companies.

However, the CNCS highlights in its 2024 Society report that the increasing number and sophistication of cyber-attacks, driven by the growing online presence of Portuguese citizens, reveal a lack of resources in the Portuguese public administration to address these new challenges. Currently, there is no national cybersecurity strategy for the upcoming years, although the CNCS has indicated that an updated strategy will be developed to address the sector’s most pressing needs.

On another note, the EU has taken on the role of legislator in cybersecurity matters, delegating the transposition and implementation of these laws to member states, considering their national contexts. Given that cybersecurity is a fundamental challenge for the Union, it is essential for member states to maintain a consistent and robust legal framework. This ensures that countries like Portugal can benefit from shared resources and guidelines, promoting a high level of cybersecurity in the borderless cyberspace.

The primary laws and regulations governing cybersecurity in Portugal are the following:

  • Regulation (EU) 2016/679, of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (the GDPR);
  • Regulation (EU) 2019/881, of 17 April 2019 on ENISA and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act);
  • Commission Implementing Regulation (EU) 2024/482, of 31 January 2024;
  • Regulation (EU) 2022/2554, of 14 December 2022 (DORA);
  • Directive (EU) 2022/2555, of 14 December 2022 (NIS 2 Directive);
  • Directive (EU) 2022/2556, of 14 December 2022 (amending Directives 2009/65/EC, 2009/138/EC, 2011/61/EU, 2013/36/EU, 2014/59/EU, 2014/65/EU, (EU) 2015/2366 and (EU) 2016/2341 as regards digital operational resilience for the financial sector);
  • Directive (EU) 2022/2557, of 14 December 2022 (Resilience of Critical Entities);
  • Regulation (EU) 2024/2847, of 23 October 2024 (Cyber-Resilience Act);
  • Regulation (EU) 2025/38, of 19 December 2024 (Cyber-Solidarity Act);
  • Law No 46/2018, of 13 August (The Legal Framework for Cyberspace Security);
  • Decree-Law No 65/2021, of 30 July (Regulates the Legal Framework for Cyberspace Security);
  • Decree-Law No 3/2012, of 16 January (Approves the organisation of the National Security Office);
  • Decree-Law No 20/2022, of 28 January (Approves the procedures for identifying, designating, protecting and increasing the resilience of national and European critical infrastructures);
  • CNCS Regulation No 183/2022, of 21 February (Regulation setting out technical instructions on communications between organisations and the National Cybersecurity Centre); and
  • Regulation (EU) 2023/2854, of 13 December (Data Act).

The CNCS is the national cybersecurity authority, pursuant to the terms of the implementing Law of NIS1 Directive (Law No 46/2018). This authority operates within the framework of the National Security Office, and its mission is to ensure the safe and free use of cyberspace in Portugal.

The CNCS is responsible for developing the national capacity to prevent and detect cybersecurity incidents, both by promoting training and by developing innovation projects in the field of cybersecurity. The CNCS is also responsible for ensuring the security of government information and communication systems and critical national infrastructures.

As the national authority responsible for the security of cyberspace, the CNCS is a national single point of contact for international co-ordination and plays a central role in liaising with other national actors in the field of cybersecurity.

From a regulatory standpoint, this authority has the power to issue cybersecurity regulations and to monitor compliance with the cybersecurity legal framework. In this context, the CNCS has the power to instruct administrative proceedings against offenders and to impose fines.

The CNCS also assumes the role of the National Cybersecurity Certification Authority (ANCC), in accordance with Decree-Law 65/2021, which implements Regulation (EU) 2019/881.

Pursuant to the current cybersecurity legal framework for critical infrastructures (ie, Decree-Law No 20/2022), there are sectoral entities which have the obligation to elaborate a list of potential national and European critical infrastructures.

Notwithstanding the above, in the near future, the Draft Law on the implementation of the NIS2 Directive will lead to some changes to the institutional framework of cybersecurity. We highlight the following:

  • national sectoral cybersecurity authorities: (i) the National Security Office (GNS), with regard to trust services in electronic transactions in the internal market; (ii) the National Communications Authority (ANACOM), with regard to electronic communications; and (iii) the postal service; and
  • special national cybersecurity authorities on digital operational resilience in the financial sector: (i) the Insurance and Pensions Authority (ASF); (ii) the Portuguese Securities Market Commission (CMVM); (iii) the Bank of Portugal; and (iv) the Cyberspace Security Assessment Commission.

The NIS 2 Directive (Directive (EU) 2022/2555) sets out cybersecurity risk management measures and reporting obligations for critical infrastructures regardless of their size, as well as for essential and important entities. This Directive is complemented by the CER Directive (Directive (EU) 2022/2557, of 14 December 2022). Both directives came into effect in 2022 and became applicable from 18 October 2024, the date on which EU member states had to ensure the transpositions into national law. However, Portugal has not yet approved such legislation, thus infringing this requirement.

In this regard, we note that on 6 February, the Council of Ministers approved the draft legislative authorisation law establishing the new Cybersecurity Legal Framework, which transposes the NIS 2 Directive, and which will now be submitted to Parliament for approval. Given the state of the legislative process, this law may still be approved and enter into force in 2025.

Until such approval, companies that are qualified as critical infrastructures are currently governed by Law No 46/2018, which provides the general cybersecurity legal framework, and Decree-Law No 20/2022, governing the resilience of national critical infrastructures. The concept of “critical infrastructures”, as contemplated in Decree-Law No 20/2022 and the CER Directive, includes all the facilities or networks that are necessary for the provision of a service deemed crucial for society. Pursuant to this Directive, member states must indicate a list of critical entities that belong to any of the categories established in the Annex (eg, entities operating in the electricity sector).

Therefore, stakeholders are currently waiting for the implementation of the NIS 2 Directive, as this law is currently undergoing a legislative process with no clear end date.

In accordance with Decree-Law No 20/2022, critical infrastructure is required to enhance its resilience and safeguard the infrastructure that enables the provision of essential services. This must be achieved through collaboration between national and European critical infrastructure. Additionally, the Decree-Law mandates that each national critical infrastructure develop an operator security plan.

Such infrastructure is required to designate security liaison officers, who function as a point of contact for security-related issues between the operator and other critical infrastructure. The designation of the officer must be communicated to the National Security Office, the Secretary-General of the internal security system, and the Portuguese National Authority for Emergency and Civil Protection. Moreover, the infrastructure must also designate a point of contact to establish communication with emergency and civil protection authorities.

Under Law No 46/2018, critical infrastructure operators must implement technical and organisational measures that are proportionate and appropriate to prevent, detect, and mitigate cybersecurity risks to their networks and information systems. These measures are further detailed in Decree-Law No 65/2021, which also requires that operators of critical infrastructures elaborate risk assessments and an annual report describing the main developed activities in terms of cybersecurity and demonstrating an aggregated assessment of all the incidents with a substantial or relevant impact (see Article 8 of Decree-Law No 65/2021).

Additionally, they are required to fulfil specific notification obligations in the event of a cybersecurity incident.

In the Portuguese legal framework, the notification requirements for critical infrastructure owners and operators are laid down in Law No 46/2018, and regulated in detail in Decree-Law No 65/2021.

When operators have knowledge of a significant incident that substantially impacts the continuity of services, they must proceed with an initial notification. The term to notify the CNCS shall be the moment of knowledge of the incident, or up to two hours after that knowledge. Regardless of the notification obligation, the entity should prioritise the implementation of mitigation measures for the risks.

The following information must be included in the initial notification:

  • name, telephone number and email address of a representative of the organisation;
  • date and time when the incident began or, if unknown, when it was detected;
  • brief description of the incident;
  • estimate of the impact, considering:
    1. the number of users affected by the service disruption;
    2. the duration of the incident; and
    3. the geographical distribution, with regard to the area affected by the incident, including an indication of cross-border impact;
  • other information deemed relevant.

Additionally, operators should submit a notification to the CNCS communicating the end of the relevant impact of the incident, which shall be done at the moment of knowledge of the incident, or up to two hours after that knowledge.

Information that should be included in the notification communicating the end of the relevant impact of the incident:

  • an update, if any, of the information provided in the initial notification;
  • a brief description of the measures taken to deal with the incident;
  • a description of the impact situation at the time of the loss of relevant or significant impact, namely:
    1. the number of users affected by the service interruption;
    2. the duration of the incident;
    3. the geographical distribution in terms of the area affected by the incident, including an indication of the cross-border impact; and
    4. the estimated time for full restoration of services.

Lastly, critical infrastructure must issue a final notification within 30 working days from the moment the incident ceased.

Information that should be included in the final notification:

  • the date and time when the incident attained relevant or significant impact;
  • the date and time when the incident lost its relevant or significant impact;
  • the impact of the incident;
  • the indication of the measures taken to mitigate the incident;
  • a description of any residual effects remaining at the time of the final notification;
  • where applicable, information on the submission of the notification of the incident to the competent authorities (eg, the Public Prosecutor’s Office and the National Data Protection Authority); and
  • any other information deemed relevant.

The mission of the Portuguese state, through the National Security Office and the CNCS, is to ensure that Portuguese citizens benefit from a free, reliable and secure cyberspace. To this end, the state has created entities that are empowered to implement the necessary measures to anticipate, detect, respond to and recover from situations that, due to the threat or occurrence of incidents or cyber-attacks, jeopardise the functioning of critical infrastructure and national interests.

In this regard, the National Computer Security Incident Response Team (CERT.PT) was created. This team is responsible for co-ordinating the response to cybersecurity incidents at the operational level, as well as monitoring incidents with a national impact. For that purpose, it can activate early warning mechanisms to mitigate the impact of incidents.

The Portuguese government is also responsible for approving the National Cyberspace Security Strategy, which defines the state’s objectives and actions in this domain. Portugal currently has a National Cyberspace Security Strategy for 2019-2023, and the government has not presented any other plans for the following years. However, the Draft Law will lead to the implementation of a new National Strategy, which shall be reviewed every five years.

Additionally, Decree-Law No 20/2022 requires operators of critical national infrastructure to draw up a security plan to be submitted for approval to the Secretary-General of the Internal Security System.

In Portugal, as an EU country, the DORA Regulation applies (ie, Regulation (EU) 2022/2554, of the European Parliament and the Council, of 14 December, 2022, on digital operational resilience for the financial sector and amending Regulations (EC) No 1060/2009, No 648/2012, (EU) No 600/2014, No 909/2014 and No 2016/1011.

As for its material scope, the DORA Regulation applies to the following entities (Article 2):

  • credit institutions;
  • payment institutions, including payment institutions exempted pursuant to Directive (EU) 2015/2366;
  • account information service providers;
  • electronic money institutions, including electronic money institutions exempted pursuant to Directive 2009/110/EC;
  • investment firms;
  • crypto-asset service providers as authorised under a Regulation of the European Parliament and of the Council on markets in crypto-assets, and amending Regulations (EU) No 1093/2010 and (EU) No 1095/2010 and Directives 2013/36/EU and (EU) 2019/1937 (“the Regulation on markets in crypto-assets”) and issuers of asset-referenced tokens;
  • central securities depositories;
  • central counterparties;
  • trading venues;
  • trade repositories;
  • managers of alternative investment funds;
  • management companies;
  • data reporting service providers;
  • insurance and reinsurance undertakings;
  • insurance intermediaries, reinsurance intermediaries and ancillary insurance intermediaries;
  • institutions for occupational retirement provision;
  • credit rating agencies;
  • administrators of critical benchmarks;
  • crowdfunding service providers;
  • securitisation repositories (the aforesaid are jointly referred to as “financial entities”); and
  • ICT third-party service providers.

DORA applies to all the above-mentioned entities that provide services in the EU and are located herein.

Additionally, the territorial scope of DORA is broad and extends to organisations based outside the EU, where, for example, they (in the case of financial entities) offer certain financial services in the EU market or (in the case of ICT providers) contract with financial entities that are in scope of DORA.

At the national level, the implementation of all obligations arising from DORA remains ongoing. The competent authorities (Bank of Portugal (BdP), Portuguese Securities Market Commission (CMVM) and Portuguese Insurance and Pension Funds Supervisory Authority (ASF)) are in the process of drafting the regulations that will implement the framework. At this stage, developments have been observed in the following areas:

Regarding risk management associated with information and communication technologies, a significant development is the revision of Bank of Portugal Instruction No 4/2021, which governs the management and reporting of operational and security risks by payment service providers. This revision will eliminate the annual reporting requirement for operational and security risks to prevent redundancy with EBA/GL/2019/04, which may itself be subject to amendment by the European Banking Authority (EBA).

For incident reporting and cyber threats, a transitional arrangement requires severe ICT incidents and voluntary cyber threat notifications to be sent to dorareport@bportugal.pt until a final reporting mechanism is established.

The CMVM, in response to the implementation of DORA in Portugal, has outlined its plans through the Annual Circular on Financial Intermediation and Crowdfunding Services, with the national regulation of DORA set as one of its key objectives for 2025.

In the insurance sector, implementation has been carried out through Regulatory Standard No 9/2024-R, which governs the reporting of severe incidents related to information and communication technologies to the ASF and Regulatory Standard No 7/2024-R, regarding the security and governance of information and communication technologies, and subcontracting to cloud computing service providers within the management of pension funds.

ICT services are defined as digital and data services provided through ICT systems to one or more internal or external users on an ongoing basis, including hardware as a service and hardware services which include the provision of technical support via software or firmware updates by the hardware provider, excluding traditional analogue telephone services (Article 3(20) of DORA).

An ICT service provider is defined as an undertaking providing ICT services (Article 3(19) of DORA).

The DORA Regulation also defines what is considered a critical ICT third-party service provider, namely entities designated as such in line with Article 31 of the Regulation, which considers a series of criteria laid out in said article, such as the systemic impact on stability, continuity or quality of the service or the systemic character or importance of the financial entities that rely on the relevant ICT third-party service provider.

DORA also requires a register of ICT service agreements, reinforcing oversight of third-party dependencies. At the national level, while this overlaps with Bank of Portugal Notice No 8/2023, which governs outsourcing agreements, the annual submission of outsourcing records will continue. Adjustments may follow once the EBA Guidelines on Outsourcing (EBA/GL/2019/02) are revised by late 2025.

For the entities subject to CMVM supervision, the regulation of reporting obligations under DORA is currently underway, in alignment with the content and formats defined by European legislation. Until the required files can be submitted via the Electronic One-Stop Shop (BUE), as part of the ongoing regulatory development, an alternative submission method is via email to cmvm@cmvm.pt.

The main objective of the DORA Regulation is to achieve a high common level of digital operational resilience (Article 1(1)).

For that purpose, the Regulation lays down uniform requirements concerning the security of network and information systems supporting the business process of financial entities, which are as follows:

  • requirements applicable to financial entities in relation to:
    1. information and communication technology (ICT) risk management;
    2. reporting of major ICT-related incidents and notifying, on a voluntary basis, significant cyber threats to the competent authorities;
    3. reporting of major operational or security payment-related incidents to the competent authorities by financial entities;
    4. digital operational resilience testing;
    5. information and intelligence sharing in relation to cyber threats and vulnerabilities; and
    6. measures for the sound management of ICT third-party risk;
  • requirements in relation to the contractual arrangements concluded between ICT third-party service providers and financial entities;
  • rules for the establishment and conduct of the oversight framework for critical ICT third-party service providers when providing services to financial entities; and
  • rules on co-operation among competent authorities, and rules on supervision and enforcement by competent authorities in relation to all matters covered by this Regulation.

Some of the main obligations under the DORA Regulation for financial entities are as follows:

  • implementing an ICT risk management framework, which shall include at least strategies, policies, procedures, ICT protocols and tools necessary to duly and adequately protect all information and ICT assets;
  • using and maintaining updated ICT systems, protocols and tools that are appropriate to the magnitude of operations;
  • continuously monitoring and controlling the security and functioning of ICT systems and tools;
  • having mechanisms in place to promptly detect anomalous activities, including ICT network performance issues and ICT-related incidents, and identifying potential material single points of failure;
  • establishing a comprehensive ICT business continuity policy; and
  • developing and maintaining back-up policies and procedures and restoration and recovery procedures and methods, for the purpose of ensuring the restoration of ICT systems and data with minimum downtime and limited disruption and loss.

Given that Portugal is still in the implementation phase, there are currently few specific rules governing the obligations related to operational resilience.

The ASF Regulatory Standard No 9/2024-R establishes the information elements, format and deadlines for reporting severe incidents related to ICT, under the information reporting obligation incumbent upon entities supervised by the ASF, in accordance with their supervisory responsibilities.

The ASF Regulatory Standard No 7/2024-R sets the following requirements and general principles concerning the security and governance of ICT, as well as specific requirements regarding subcontracting to cloud computing service providers within the management of pension funds:

  • the definition of general governance requirements for ICT, including the responsibilities of the management body in this area, the obligation for pension fund management companies to have an ICT strategy, the integration of ICT and security-related risks into the company's overall risk management system, and the conduct of periodic audits;
  • the establishment of requirements related to information security, notably that pension fund management companies must have an information security policy and an information security function;
  • the regulation of duties that pension fund management companies must comply with concerning the operational management of ICT;
  • the provision of requirements applicable to business continuity management within the scope of ICT;
  • the definition of general governance requirements for the subcontracting of cloud computing services; and
  • the establishment of requirements prior to entering into a cloud computing service subcontracting agreement, and the regulation of the rights and obligations that must be clearly identified and specified in the written agreement.

It should be noted that insurance companies managing pension funds are already subject to the requirements applicable to the insurance activity under Regulatory Standard No 6/2022-R. However, Regulatory Standard No 7/2024-R further supplements the implementation of provisions related to subcontracting to cloud computing service providers in relation to the pension fund management activities of these companies.

DORA mandates the identification and designation of critical ICT third-party service providers (CTPPs) based on a set of qualitative and quantitative criteria, including the number of financial institutions they serve, the potential systemic impact, continuity of quality of the provision of financial services in the event of a large-scale operational failure and the degree of substitutability of the ICTT (Article 31(2)). 

Once designated as a CTPP, an ICT provider falls under the direct oversight of a Lead Overseer (see Article 33).

The Lead Overseer is vested with broad oversight powers (Article 35 (1)), including:

  • requiring all relevant information and documentation related to ICT risk management frameworks;
  • conducting general investigations and inspections;
  • issuing recommendations to enhance operational resilience measures; and
  • imposing corrective measures in cases of non-compliance, ensuring financial stability and service continuity.

Regulatory enforcement under DORA incorporates a graduated and proportionate approach, balancing oversight with proportionate interventions. 

Nevertheless, the Lead Overseer, before issuing recommendations or imposing a periodic penalty payment, shall give the representatives of the ICTT the opportunity to be heard (Article 35 (3) (11)).

Key enforcement actions include:

  • a periodic penalty payment to compel the ICT third-party service to comply with those measures; this penalty is imposed on a daily basis until compliance is achieved (and for no more than a period of six months), which amounts to 1% of the average daily worldwide turnover of the ICTT in the preceding business year; and
  • possible service restrictions, including potential prohibitions on providing ICT services to financial entities if resilience obligations are not met. 

We are still awaiting the national implementing law for DORA, which may provide further details on sanctioning powers.

At present, the authorities with sectoral competence in supervising and enforcing digital operational resilience requirements are as follows:

  • Bank of Portugal for credit institutions;
  • Portuguese Securities Market Commission (CMVM) for investment firms, market operators, and crowdfunding service providers; and
  • Portuguese Insurance and Pension Funds Supervisory Authority (ASF) for insurance companies.

DORA requires financial institutions to ensure that third-party ICT service providers meet specific requirements in their contractual relationships. These include incorporating certain contractual provisions (Article 30) and assessing whether conditions for supervisory oversight, such as those related to subcontracting, are satisfied (Article 28(4)(b)).

When the service provider is based in a third country (ie, outside the European Union) and is classified as critical, the institution must also ensure compliance with EU data protection rules and verify the effective enforcement of such laws in that country (Article 29(2)).

In this regard, international data transfers between financial institutions and ICT service providers will likely involve the processing of both personal and non-personal data.

On the one hand, financial institutions must ensure that the international transfer of personal data directed to data importers (eg, ICT service providers) located in a third country provides appropriate safeguards to data subjects (ie, banking clients), as outlined in Chapter V of the GDPR.

In particular, financial institutions may transfer personal data to a third country covered by an adequacy decision, which ensures that such a country or region provides an adequate level of protection for data subjects. Currently, the Commission has issued several adequacy decisions, including for Canada, Israel and Japan.

If the third country is not subject to an adequacy decision by the Commission, financial institutions, as data controllers and data exporters, must implement appropriate safeguards, which may take the form of:

  • binding corporate rules;
  • standard data protection clauses adopted by the Commission;
  • standard data protection clauses adopted by a supervisory authority with the approval of the Commission;
  • an approved code of conduct, complemented by binding commitments of the controller or processor in the third country; or
  • an approved certification mechanism, complemented by binding commitments of the controller or processor in the third country.

The GDPR provides additional exceptions that may legitimise international data transfer in the absence of an adequacy decision or the implementation of appropriate safeguards. In the context of financial institutions as data controllers, the explicit and informed consent of data subjects may be an appropriate legal basis for the transfer. Other exceptions may be relevant for this purpose, such as the exercise or defence of legal claims (Article 49 GDPR).

Non-personal data, on the other hand, is not covered by the GDPR and is therefore not subject to any specific restrictions on international data transfers. Nevertheless, Article 32 of the Data Act (Regulation (EU) 2023/2854) provides that customers of cloud service providers who store their non-personal data in the EU are entitled to protection against international and third-country governmental access and transfer of data. Providers of data processing services must therefore take appropriate measures to prevent such unlawful access and transfer.

Ultimately, financial institutions are required to ensure that the contractual provisions established with third-party ICT service providers located in a third country meet both the requirements of DORA and the appropriate safeguards described in the GDPR.

Financial entities (with some exceptions) under the DORA Regulation shall carry out, at least every three years, advanced testing by means of threat-led penetration testing (TLPT). This TLPT shall cover several or all critical or important functions of a financial entity, and shall be performed on live production systems supporting such functions.

At the end of the testing, after reports and remediation plans have been agreed, the financial entity and, where applicable, the external testers, shall provide to the competent authority a summary of the relevant findings, the remediation plans and the documentation demonstrating that the TLPT has been conducted in accordance with the requirements.

Financial entities must contract testers for the purposes of undertaking TLPT in line with the DORA Regulation. Whenever financial entities use internal testers for the purpose of undertaking the TLPT, they shall contract external testers every three tests.

Financial entities shall only use testers for the carrying out of the TLPT that:

  • are of the highest suitability and reputability;
  • possess technical and organisational capabilities and demonstrate specific expertise in threat intelligence, penetration testing and red team testing;
  • are certified by an accreditation body in a member state or adhere to formal codes of conduct or ethical frameworks;
  • provide an independent assurance, or an audit report, in relation to the sound management of risks associated with the carrying out of TLPT, including the due protection of the financial entity’s confidential information and redress for the business risks of the financial entity; and
  • are duly and fully covered by relevant professional indemnity insurances, including against risks of misconduct and negligence.

When using internal testers, financial entities shall ensure that, in addition to the above-mentioned requirements, (i) such use has been approved by the relevant competent authority designated in line with applicable law; (ii) the relevant competent authority has verified that the financial entity has sufficient dedicated resources and ensured conflicts of interest are avoided throughout the design and execution phases of the test; and (iii) the threat intelligence provider is external to the financial entity.

At the national level, the TIBER-PT framework for resilience testing will be updated in line with TIBER-EU, expected by mid-2025. The Bank of Portugal will continue to use this framework to certify digital resilience testing under DORA.

In October 2024, the EU introduced the Cyber Resilience Act, a regulation that harmonises security requirements for products with digital elements, ensuring a consistently high level of cybersecurity.

This Regulation is directly applicable in Portugal and requires the adoption of national implementing legislation only for specific provisions that empower the national legislature (eg, provisions on penalties).

Due to its limited material scope, other legislations, such as Regulation (EU) 2023/988 on general product safety requirements, apply to products with digital elements that pose safety risks not covered by the Cyber Resilience Act. Additionally, this regulation does not affect the health and safety requirements established in Regulation (EU) 2023/1230, when applicable.

As a result, since the first provisions of the Cyber Resilience Act will only be applicable in September 2026 (see Article 71), Portugal currently relies on the general cybersecurity legal framework indicated in 1.2 Cybersecurity Laws and detailed in 2 Critical Infrastructure Cybersecurity. Furthermore, there is not yet a proposal of a draft law for the implementation of the Regulation.

The Cyber Resilience Act provides a robust level of cybersecurity for products with digital elements to be placed on the internal market.

At the outset, it is essential to clarify that the Regulation identifies three categories of products with digital elements:

  • products with digital elements not classified as important or critical;
  • important products with digital elements, which possess the core functionality of a product category outlined in Annex III, further subclassified into Class I and Class II; and
  • critical products with digital elements, which possess the core functionality of a product category outlined in Annex IV.

Although the level of compliance varies, products with digital elements that are subject to this Regulation must comply with the key obligations outlined below.

Presentation of the CE Marking

It shall be mandatory for products with digital elements covered by this Regulation to bear the CE marking as the visible proof for users of conformity with the essential cybersecurity requirements set out in Annex I. Prior to applying the CE marking, a conformity assessment procedure, harmonised by the Regulation, must be conducted.

Conformity Assessments Procedure

The conformity assessment of products with digital elements, which are not listed as important or critical products with digital elements in this Regulation, can be carried out by the manufacturers themselves, according to the procedure laid down in Decision No 768/2008/EC.

However, due to the high impact of products with digital elements classified as “important”, they are subject to different procedures:

  • For Important Class I Products: Manufacturers can assess these products themselves, provided that they adhere to harmonised standards, common specifications or comply with a European cybersecurity certification. If the manufacturer chooses not to apply the above security measures, it must undergo a third-party conformity assessment.
  • For Important Class II Products: The conformity assessment must always involve a third party.

For critical products with digital elements, and in accordance with their importance for society, it is mandatory that they have a certification under the European Cybersecurity Certification Scheme with a minimum level of “substantial”. If this condition is not met, critical products are subject to the conformity assessment defined for Class II important products.

Assessment of the Cybersecurity Risks

Manufacturers of products with digital elements must carry out and document an assessment of the cybersecurity risks of the product, and demonstrate that it complies with the essential cybersecurity requirements listed in Annex I. This assessment shall be integrated into the technical documentation of the product.

Reporting Obligations

The Regulation mandates that manufacturers of products with digital elements must report to both the designated Computer Security Incident Response Team (CSIRT) and ENISA, via a single platform to be established by the latter authority. The reporting comprises a notification on (i) actively exploited vulnerabilities in their products and (ii) serious incidents impacting the security of these products.

The law also sets out different obligations for the different actors in the supply chain (ie, manufacturers, importers and distributors) to ensure that the essential requirements for cybersecurity are met from the manufacturing stage onwards. This aligns with the primary aim of the Cyber Resilience Act, which is to establish essential cybersecurity requirements for the design, development, and manufacture of products with digital elements, as well as their monitoring once they are available on the market.

The Cybersecurity Act (Regulation (EU) 2019/881) establishes the “European cybersecurity certification framework” and provides a harmonised standard for cybersecurity certification across the EU. The European Commission has adopted an implementing act for the voluntary European Common Criteria-based cybersecurity certification scheme (EUCC) (Commission Implementing Regulation (EU) 2024/482, of 31 January 2024).

Portugal has designated the CNCS as the National Cybersecurity Certification Authority (ANCC), responsible for implementing a national cybersecurity certification framework. In this context, the CNCS has developed the EC QNRCS certification, based on European schemes.

The EC QNRCS certification scheme has been designed for central and local administration organisations, operators of critical infrastructure, essential and important service providers, digital service providers, and other private and non-governmental organisations, whether for profit or not. The CNCS manages and supervises this national certification scheme in co-operation with the Portuguese Quality Institute (IPQ) and the Portuguese Accreditation Institute (IPAC).

The cornerstone of data protection in the EU, and consequently in Portugal, is the General Data Protection Regulation (Regulation (EU) 2016/679 – GDPR).

One of the main principles of the GDPR is the  integrity and confidentiality principle, established in Article 5(1)(f), which provides that personal data “shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures (‘integrity and confidentiality’)”.

This principle is materialised by Article 32 (security of processing) and Articles 33 and 34, which relate to notification and communication obligations in the event of a personal data breach.

In light of this legal framework, Controllers and Processors are required to adopt “appropriate” technical and organisational measures to ensure a level of security that is appropriate to the potential risks. The adjective “appropriate” allows for a risk-based approach regarding the controls that should be implemented, taking into account the state of the art. For this purpose, the Article lists some controls that represent the professional consensus on security controls for processing, such as encryption and pseudonimisation. When assessing the adequacy of the technical and operational measures to be implemented, the Controller or Processor concerned may take into consideration the cost of implementation, the risks associated with the processing activities and their severity for the rights and freedoms of data subjects.

However, it is mandatory that Controllers and Processors have in place adequate mechanisms for detecting personal data breaches, which corresponds to a breach of security resulting in the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of or access to personal data transmitted, stored or otherwise processed (see Article 4(12)).

When the Controller becomes aware of such a breach, it must consider the obligation to notify the supervisory authority without undue delay where there is a foreseeable risk to the rights and freedoms of natural persons. If the Controller or the supervisory authority subsequently concludes that there is a high risk to the rights of data subjects, it is obliged to communicate the personal data breach to the data subjects without undue delay and in accordance with the provisions of Article 34.

The national law implementing the GDPR (Law No 58/2019) does not provide any further specifications regarding the security of processing. Nevertheless, it is worth noting that the Portuguese data protection authority (Comissão Nacional de Proteção de Dados, or CNPD) has issued guidelines (Diretriz/2023/1, CNPD, available in Portuguese here) proposing indicative security measures to be implemented by data Controllers. In terms of organisational measures, the CNPD suggests that Controllers and Processors consider implementing analysis procedures for monitoring network flows and carrying out periodic IT security audits and vulnerability assessments. With regard to technical measures, the CNPD suggests, inter alia, increasing the robustness of servers.

Given the synergies between cybersecurity and the protection of personal data, the CNCS acts in collaboration with the CNPD whenever a cybersecurity incident involves a breach of personal data.

As artificial intelligence systems are composed of digital components, they are particularly vulnerable to cyber-attacks and cybersecurity incidents. These incidents can impact not only the AI system’s performance but also its end users. For instance, a cybersecurity breach affecting the algorithm or training data of a credit scoring AI system could have severe consequences for users seeking to obtain credit.

Therefore, the Artificial Intelligence Regulation (Regulation (EU) 2024/1689) emphasises the necessity for high-risk AI systems to maintain a high level of accuracy, robustness, and cybersecurity (see Article 15). AI systems with a high risk for individuals’ rights and freedoms must be resistant to unauthorised access and equipped with adequate measures for detecting, preventing, and responding to cybersecurity incidents.

For this purpose, providers of high-risk AI systems can seek cybersecurity certification under Regulation (EU) 2019/881. In such a case, Article 43 of the AI Regulation established a presumption of compliance with the cybersecurity requirements outlined in Article 15. Additionally, the cybersecurity measures implemented by the provider must be included in the technical documentation accompanying the system.

When the AI Regulation was approved, there was not yet a final agreement from European legislative bodies on the Cyber Resilience Act. Nonetheless, the AI Regulation’s recitals mention the co-ordination between the two laws. Recitals 77 onwards of the AI Regulation are mirrored in Recital 51 and Article 12 of the Cyber Resilience Act, which presumes compliance with Article 15 of the AI Regulation when the high-risk AI system meets the essential cybersecurity requirements in Annex I of the Cyber Resilience Regulation.

Furthermore, the procedure for assessing compliance with the essential cybersecurity requirements for a product with digital elements that is simultaneously classified as a high-risk AI system will follow the provisions of Article 43 of Regulation (EU) 2024/1689. However, in the event that the application of this provision would lead to a reduction in the level of security required for critical or important products with digital elements, the conformity assessment procedure provided for in the Cyber Resilience Regulation with regard to the essential cybersecurity requirements should apply by way of derogation from this rule.

Entities operating in the healthcare sector are considered essential, especially if they fall under and meet the requirements of the NIS 2 Directive, making them subject to the cybersecurity framework for essential entities.

Their value and impact on basic societal functions make them prime targets for cyber-attacks, often aimed at compromising health data and the safety of individuals.

As such, Regulations (EU) 745/2017 and 746/2017 on medical devices and in vitro diagnostic medical devices have introduced cybersecurity concerns. These regulations ensure that devices placed on the EU market are equipped to address new technological challenges related to cybersecurity risks.

The Medical Devices Regulation (MDR) requires medical devices with electronic programmable systems and software to meet minimum cybersecurity requirements. This includes devices such as pacemakers and insulin pumps. Consequently, these requirements cover hardware, IT network characteristics and IT security measures, including protection against unauthorised access, to ensure that the software works as intended. 

According to the guidance on cybersecurity for medical devices (MDCG 2019-16 Rev.1, December 2019, available here), manufacturers must implement state-of-the-art cybersecurity measures. This guidance is intended to help manufacturers comply with the essential cybersecurity requirements outlined in Annex I of the MDR and the In Vitro Diagnostic Medical Devices Regulation.

The MDR does not define “IT security”, so the Medical Device Coordination Group document refers to the definition provided by ENISA. “IT security” is thus defined as the protection against threats to the technical infrastructure of a cyber system that could change its characteristics to perform unintended activities (Definition of Cybersecurity – Gaps and overlaps in standardisation, December 2015, available here). The same applies to the definitions of operational security and information security.

In Portugal, Decree-Law No 29/2024 ensures the national implementation of the MDR and provides that healthcare entities deploying a medical device must report to the competent authority (ie, INFARMED, I.P) all security measures implemented and their performance.

Also at the national level, Order No 8877/2017 establishes the governance model to be followed by the Shared Services of the Ministry of Health (Serviços Partilhados do Ministério da Saúde, E. P. E., or SPMS), in conjunction with the National Security Office and the CNCS. The same Order requires all health entities of the national health service to adopt a cybersecurity policy and a contingency plan for cybersecurity incidents.

Overall, the health sector is covered by the general legal framework for cybersecurity as discussed in this chapter.

Abreu Advogados

Av. Infante Dom Henrique 26
1149-09
Lisbon
Portugal

(+351) 217 231 800

(+351) 217 231 899

lisboa@abreuadvogados.com abreuadvogados.com/en/
Author Business Card

Trends and Developments


Authors



Abreu Advogados is a big four independent law firm with over 30 years of experience in the Portuguese market, navigating in tomorrow’s sectors and industries. The firm continuously attracts strategic opportunities for its clients in key areas such as finance, corporate and M&A, tax, litigation, and competition, among others. The firm invests in multidisciplinary teams that tackle increasingly complex transactions with cost-effective solutions and anticipate clients’ needs with a business-oriented vision. Either from Portugal or internationally, Abreu is chosen to provide legal advice in international transactions across Portuguese-speaking countries, particularly Angola, Mozambique and Timor-Leste. Abreu Advogados partnered with FBL Advogados in 2007 and with JLA Advogados in 2010 to meet clients’ interests in the Angolan, Mozambican and Portuguese markets while benefitting from an international decision-making process when presenting innovative legal solutions to its clients.

Eyes Wide Open: The Portuguese Cybersecurity Agency Dives Deeper into Market Practices

Introduction: NIS 2 transposition

The growing importance of cybersecurity for businesses is undeniable. Consequentially, EU institutions revisited the NIS Directive (Directive (EU) 2016/1148) in 2022 and issued a new regulation – known as NIS 2 Directive (Directive (EU) 2022/2555) – the transposition of which is expected to both extend and develop already applicable cybersecurity regulations in Portugal, complementing, in particular, Regulation (EU) 2022/2554 (known as the Digital Operational Resilience Act or DORA Regulation), which requires specific cybersecurity measures to be adopted by banking and financial institutions.

While the deadline for EU member states to transpose the NIS 2 Directive into national law was 17 October 2024, Portugal is still in the process of doing so. Following a public consultation on the draft legislation, which ran from late November to late December 2024 and garnered over 140 contributions, the government has been analysing these submissions before presenting its proposal to Parliament for approval. If the transposition statute is approved, it will come into effect 120 days after its publication.

Although the process of transposition is still ongoing, and despite the period between publication and implementation, we have already noticed market actors’ interest in the Directive, and its transposition process. We have received multiple requests to assess the subjective scope of the new NIS 2 Directive – ie, whether a certain company is, or is not, subject to those new norms – and several requests to keep our clients posted regarding the process of elaboration and approval of the NIS 2 transposition law.

This concern is perfectly understandable. Among the specific features of the Portuguese transposition (such as a clearer definition of the functions and competences of the Cybersecurity Officer, affording greater certainty to market actors, or the qualification of the temporary banning of administrators as an ancillary sanction only) the most recent version of the transposition statute, in discussion before Parliament, provides for fines of up to EUR200,000 for individual members of management bodies.

Given the upcoming transposition of Directive (EU) 2022/2555 (Directive NIS 2) in Portugal – and especially of the personal and individual liability for administrators for the breach of cybersecurity regulations as outlined above – market actors in those sectors should be keen on ensuring compliance. Compliance with cybersecurity requires great investment on the part of undertakings – both financially and in terms of human resources. This includes purchasing and implementing antivirus software, setting up multi-factor authentication, developing plans, policies and procedures, and allocating additional resources, such as time, to adhere to these policies. Not to mention the costs associated with staff training, software updates, and the increasing marginal costs as the volume of protected information grows.

However, the potential penalties can be even more costly. In addition to fines of up to EUR200,000 for individual administrators specific to the Portuguese jurisdiction, the NIS 2 Directive already provides for fines as high as EUR10 million for breaching companies and entities.

The oversight by the CNCS

The Portuguese National Cybersecurity Agency (Centro Nacional de Cibersegurança, or CNCS) is the agency responsible for the oversight and enforcement of cybersecurity legislation in Portugal (including the future NIS 2 Directive transposition statute).

Up to now, the CNCS has largely adopted a proactive, supportive approach. Their core principle revolves around educating and mitigating the risks of breaches and damage by fostering a strong culture of compliance with legal requirements. This is evidenced by the relatively infrequent use of sanctions for breaches of cybersecurity statutes. The CNCS has been notably active, but their focus has primarily been on organising talks, conferences and newsletters, and developing best practice codes and standards to cultivate a culture of legal compliance within the Portuguese market.

Very recently, in fact, the CNCS published a series of reports on market cybersecurity conditions and practices. While these reports do not represent legal enforcement actions in themselves, their creation signifies preparatory steps towards such actions. And the publication of these reports – containing a framework of analyses, a comparative baseline, international standards and recommendations – may inspire other jurisdictions to also pay closer attention to market practices. 

Within these reports, the CNCS identified significant disparities in cybersecurity practices and the level of protection afforded to information stored in digital systems across various sectors, despite the widespread use of digital tools. We have compiled some of the data from these reports below to enable a comparison between sectors, with the aim of gleaning insights and recommendations.

Market state and sector practices

  • Regarding policies for staff training, and cybersecurity managers, despite the obligations provided in the NIS 2 Directive, Law No 46/2018, of 13 August, and Decree-Law No 65/2021 of 30 July:
    1. Digital infrastructure providers have the worst results of all the sectors analysed by CNCS. 33% have untrained cybersecurity managers, and 74% of companies in the Portuguese digital infrastructure sector have less than 25% of staff trained to even a basic level. 58% of companies do not even offer training in cybersecurity.
    2. 20% of companies in the Portuguese energy sector, in turn, have untrained cybersecurity managers, and nearly half (45%) have less than 25% of staff trained to even a basic level. 33% of companies do not even offer training in cybersecurity, despite the legal mandate, and, of those that do, half offer it on an optional basis.
    3. Similarly, in the transport sector, 19% of companies in the Portuguese transport sector have untrained cybersecurity managers, and over half (57%) have less than 50% of staff trained to even a basic level.
    4. Healthcare providers report better scores. 36% have untrained cybersecurity managers, and 60% of companies in the Portuguese healthcare sector have less than 50% of staff trained to even a basic level. 
    5. Banking and financial institutions are overall the best prepared. All claim to have duly trained cybersecurity managers, despite 25% of companies in the Portuguese banking admitting to having less than 50% of staff trained to even a basic level.
  • Regarding cybersecurity documentation, in particular, regarding the preparation and implementation of cybersecurity plans, incident response plans and report obligations – all of which, again, were already mandated under Law No 46/2018 and Decree-Law No 6572021, and are further detailed in the NIS 2 Directive and its transposition statute, the situation is quite similar:
    1. As for providers of digital infrastructure, there is a clear disconnect between the acknowledged importance of data security and actual practice. 54% concede they lack both a cybersecurity plan and an incident response plan. Furthermore, 4% failed to submit their mandatory annual reports to the CNCS in 2023.
    2. In the energy sector, 33% admit to not having a cybersecurity plan implemented at all, 20% admit to not having an incident response plan, and 10% have not submitted their mandatory annual reports to CNCS in 2023.
    3. In the transport sector, the figures are 35%, 48% and 12%, respectively.
    4. Among healthcare providers, 54% admit to not having a cybersecurity plan, 38% admit to not having an incident response plan, and 13% have not submitted their mandatory annual reports to CNCS in 2023 – despite the sensitivity of the data they manage on a daily basis.
    5. And, lastly, again, the banking and financial institutions sector shows greater compliance, with only 13% admitting to not having a cybersecurity plan implemented at all.
  • Finally, regarding statutorily required good cybersecurity practices, the numbers are telling:
    1. Only 23% of healthcare providers regularly conduct risk analysis assessments, as compared to 36% of the providers of digital infrastructure, 50% in the energy and transport sector, and, again, being the best prepared sectors overall, 75% of companies in banking and financial institutions.
    2. Regarding the maintenance of logs for post-incident reconstruction and analyses, 50% of companies in the Portuguese transport and healthcare sector do not keep logs for this purpose; neither do 48% of companies in the digital infrastructure sector; 30% in the energy sector; and, lastly, 23% among financial institutions.
    3. Regarding the undertaking of vulnerability checks and vulnerability management policies, only 20% of companies in the digital infrastructure sector undertake them regularly, compared to 70% of companies in the energy and transport sectors. Notably, the banking and financial institutions sector reports complete adherence, with all companies claiming to conduct these checks.

The implications of the aforementioned statistics become increasingly concerning when considered alongside the pervasive reliance on digital tools and devices within these sectors:

  • 56% of companies in the Portuguese energy sector report that between 75% and 100% of their workforce utilise digital devices and tools for their daily tasks. Conversely, only 10% of these companies indicate that less than 25% of their staff engage in such usage.
  • In the banking and financial market institutions sectors, 100% of companies report that virtually all their employees access and manage digital devices and tools to perform their work.
  • Lastly, in the Portuguese digital infrastructure sector, 58% of companies state that over 50% of their staff utilise digital devices and tools, compared to only 14% of companies in the Portuguese healthcare sector.

The combination of less than 25% of staff receiving basic cybersecurity training, the lack of dedicated cybersecurity officers, the absence of log records, and the deficiency of cybersecurity plans highlights the urgent need for companies to reflect on and adapt to new regulations. This is particularly critical when, for a significant majority (well over 50%) of these companies, at least 50% of their staff rely on digital devices and tools for their daily work.

While the banking and financial institutions sector demonstrates better compliance compared to others, it is important to acknowledge that this sector is subject to specific, stringent cybersecurity regulations, such as the DORA regulation. This explains their significantly higher compliance levels. However, it also underscores that they operate under stricter norms and standards. Therefore, their relative success should not lead to complacency among their administrators.

The data concerning energy, digital infrastructure and healthcare is particularly concerning: all three are designated as essential services, critical to the maintenance of a modern workable society – and yet all three show significant deficiencies in their cybersecurity actions and policies.

Recommendations

Having now comprehensively examined technological specificities and threats, capacity building, identifiable investment in cybersecurity, applicable standards and good practices, and market shortcomings, the CNCS is now far better positioned to determine the legal compliance status of providers and other market participants. This enhanced insight allows them to hold both these entities and, crucially, their administrators personally accountable for breaches of cybersecurity norms.

The data presented above unequivocally demonstrates that staff training must be a priority for providers across all sectors subject to cybersecurity requirements, including public administration entities, postal services, and food production and distribution, not just the previously mentioned sectors. These training programmes should encompass both basic cybersecurity practices – such as strong password adoption, the avoidance of sharing personal or sensitive information online, and screen locking – and more advanced topics like incident response protocols and reporting obligations. A robust enterprise cybersecurity strategy must focus on both incident prevention and effective response to safeguard digital infrastructure and sensitive data.

Equally important is the implementation of legally mandated good practices. Regular risk assessments, vulnerability checks, and the maintenance of comprehensive log-in and log-out records are essential for demonstrating clear compliance. Crucially, the production of thorough documentation proving adherence to cybersecurity requirements is paramount. Companies and cybersecurity managers are accountable for maintaining legally required documentation. The absence of such documentation constitutes a breach in itself and will lead to the presumption that the underlying obligation, which should have been evidenced by the documentation, has also been unmet.

Beyond these reports, which, again, are more akin to an enforcement tool than to an act of enforcement, the CNCS, in collaboration with ANACOM (the Portuguese National Authority for Telecommunications), has been developing statutorily mandated enforcement tools, such as the ANACOM-CSIRT (“computer security incident response team”). This suggests a shift towards a more reactive and less pedagogical stance as the competent supervisory authority.

In conclusion, the CNCS has got its eyes wide open. To avoid falling under its scrutiny, companies, particularly those that have not yet begun preparations for implementing the acts and procedures required by Directive NIS 2, should urgently analyse the new proposals to ascertain the extent to which organisational adaptations are necessary.

Abreu Advogados

Av. Infante Dom Henrique 26
1149-096
Lisbon
Portugal

(+351) 217 231 800

(+351) 217 231 899

lisboa@abreuadvogados.com abreuadvogados.com/en/
Author Business Card

Law and Practice

Authors



Abreu Advogados is a big four independent law firm with over 30 years of experience in the Portuguese market, navigating in tomorrow’s sectors and industries. The firm continuously attracts strategic opportunities for its clients in key areas such as finance, corporate and M&A, tax, litigation, and competition, among others. The firm invests in multidisciplinary teams that tackle increasingly complex transactions with cost-effective solutions and anticipate clients’ needs with a business-oriented vision. Either from Portugal or internationally, Abreu is chosen to provide legal advice in international transactions across Portuguese-speaking countries, particularly Angola, Mozambique and Timor-Leste. Abreu Advogados partnered with FBL Advogados in 2007 and with JLA Advogados in 2010 to meet clients’ interests in the Angolan, Mozambican and Portuguese markets while benefitting from an international decision-making process when presenting innovative legal solutions to its clients.

Trends and Developments

Authors



Abreu Advogados is a big four independent law firm with over 30 years of experience in the Portuguese market, navigating in tomorrow’s sectors and industries. The firm continuously attracts strategic opportunities for its clients in key areas such as finance, corporate and M&A, tax, litigation, and competition, among others. The firm invests in multidisciplinary teams that tackle increasingly complex transactions with cost-effective solutions and anticipate clients’ needs with a business-oriented vision. Either from Portugal or internationally, Abreu is chosen to provide legal advice in international transactions across Portuguese-speaking countries, particularly Angola, Mozambique and Timor-Leste. Abreu Advogados partnered with FBL Advogados in 2007 and with JLA Advogados in 2010 to meet clients’ interests in the Angolan, Mozambican and Portuguese markets while benefitting from an international decision-making process when presenting innovative legal solutions to its clients.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.