Taiwan’s Cybersecurity Regulatory System and the Legislative Purpose
Taiwan faces national-level organised cyber threats due to its special political and economic status. As such, cybersecurity is a key policy focus. In May 2021, the Executive Yuan listed cybersecurity as one of the six core strategic industries meriting special promotion. Accordingly, the primary objective of the Cyber Security Management Act (CSMA) is to “proactively carry out national cyber security policies and accelerate the construction of an environment for national cyber security” to guarantee national security and protect the public interest (Article 1 of the CSMA). In this context, cybersecurity is recognised as a national security priority in Taiwan, and the government is empowered to allocate resources, co-ordinate private sector capabilities and foster the development of professional expertise to achieve these goals.
Recent Amendment of the CSMA and the Relevant Regulations
On 1 December 2025, the Executive Yuan announced the enforcement of amendments to the CSMA. This marks the first revision of the CSMA since its original enactment in 2019, reflecting a response to the growing severity of cyber threats and a commitment to strengthening the industry’s overall cybersecurity posture. Notably, the amendment transfers the authority overseeing the CSMA from the Executive Yuan to the Ministry of Digital Affairs (MODA). It also introduces key provisions, including a clear prohibition on government agencies from downloading, installing or using products that may compromise national cybersecurity. Additionally, the amendment broadens MODA’s audit authority over government agencies, mandates that agencies engaging in outsourcing enter into written contracts and requires their co-operation in cybersecurity drills.
Enactment of the Regulations Governing the Review of Products Endangering National Cybersecurity
As noted in the foregoing, to protect government operations from potential cybersecurity threats, the CSMA expressly prohibits the use of products that could compromise national cybersecurity. Furthermore, pursuant to the authority granted by the amended CSMA, MODA has issued regulations establishing a standardised process for government and specific non-government agencies to report information and communication technology (ICT) products suspected of posing risks to national cybersecurity.
CSMA
The CSMA governs the management of information and communications security by government agencies and certain non-government agencies (ie, critical infrastructure providers, public utilities and government-sponsored foundations). The Enforcement Rules of the CSMA further define and set forth the rules, guidelines and key terms of the CSMA.
The CSMA establishes obligations for two main categories of entities:
At this time, there has been no indication or discussion concerning the application of the CSMA beyond Taiwan’s jurisdiction.
The CSMA establishes the primary legal framework, while concurrently empowering the MODA to promulgate supplemental and technical regulations that delineate the substantive requirements for cybersecurity management. The relevant regulations include but are not limited to the following.
Regulations on Classification of Cybersecurity Responsibility Levels
The Regulations categorise government agencies and specific non-government agencies into levels A–E, primarily based on the sensitivity of the data they handle, such as national secrets; the volume of personal information; and the critical nature of their infrastructure. This includes operations related to foreign affairs, national defence, national security or the management of essential public services and inter-agency shared ICT systems.
Accordingly, the Regulations set forth specific cybersecurity operational standards within the statutory appendices tailored to each classification level. Agencies are required to implement the prescribed administrative, technical and training measures corresponding to their assigned level. These measures are designed to ensure that their information systems meet the stringent control requirements mandated under the CSMA.
Regulations Governing the Review of Products Endangering National Cybersecurity
The Regulations are enacted to establish a clear and consistent framework for government agencies and specific non-government agencies to submit ICT products for review when those products may present risks to national cybersecurity.
Regulations on Audit of Implementation of Cyber Security Maintenance Plan
In accordance with the recent amendment to the CSMA, which grants MODA the authority to audit government agencies, these Regulations set forth the procedures for auditing both government and designated non-government agencies. The Regulations establish clear legal standards for compliance verification and require that competent authorities, either MODA or competent authorities of certain industries, conduct annual, scheduled audits. These audits include on-site inspections to assess the effective implementation of cybersecurity maintenance plans. To ensure impartiality and transparency, audit teams must include representatives from government agencies.
Sectoral Regulations
Although MODA functions as the central competent authority, the direct supervision of the private sector is delegated to the relevant central authorities within specific industries, such as the Financial Supervisory Commission (FSC) and the Ministry of Health and Welfare (MOHW). Under the authorisation of the CSMA, these competent authorities have established their own regulations governing the cybersecurity management practices of the non-governmental entities within their sectors. These regulations address essential requirements, including the development, implementation and auditing of cybersecurity maintenance plans.
The competent authority for the CSMA is MODA. Within MODA, the Administration for Cyber Security works closely with the National Institute of Cyber Security, a non-departmental public body supervised by MODA, to develop and implement national cybersecurity policies. Together, they promote cybersecurity programmes, designate critical infrastructure providers and co-ordinate efforts among the competent authorities across nine key industries. Their collective goal is to strengthen the national cybersecurity defence system, enhance incident reporting and response mechanisms, support agencies in meeting cybersecurity compliance requirements and foster the development of cybersecurity talent while raising awareness nationwide.
For government agencies, the relevant regulator is generally the supervisory agency at a higher level. This supervisory agency oversees the lower-level agency’s establishment, revision and implementation of its cybersecurity maintenance plan.
Regarding the specific non-governmental agencies, the central authority for the industry acts as the regulator. For instance, the FSC acts as the regulator for insurance companies, securities firms and futures commission merchants. This central authority is empowered by the CSMA to establish rules that require companies within the industry to develop, update and enforce their cybersecurity maintenance plans.
As mentioned in the foregoing, the CSMA imposes obligations on two primary categories of entities:
Regarding critical infrastructure providers, the definition remains vague and lacks clear criteria for straightforward identification. Pursuant to Article 20 of the CSMA, the central competent authority responsible for the relevant industries must, after consulting with appropriate government agencies, private organisations and experts, designate critical infrastructure providers. This designation is then submitted to MODA for approval by the Executive Yuan. While designated critical infrastructure providers receive written notification of their status, the designation is treated as confidential and is not disclosed to the public.
That being said, in 2024, the Executive Yuan issued the Procedure for the Designation of Critical Infrastructure Providers. This process follows a four-step methodology:
The primary critical domains include energy, water resources, communications and broadcasting, transportation, banking and finance, emergency services and healthcare, government agencies, science parks and industrial parks, and food. Following this, the central competent authorities for the relevant industries are tasked with conducting an inventory of ICT assets currently in use. They must then identify those ICT components essential to maintaining the continuous operation of the core functions of the relevant facilities, which are thereafter designated as critical infrastructure. Finally, the service providers responsible for maintaining this critical infrastructure are likely to be designated as the critical infrastructure providers.
Requirements or Prevailing Norms for Corporate Cybersecurity Governance
Entities subject to the CSMA shall comply with the Regulations on Classification of Cyber Security Responsibility Levels. The entities subject to the CSMA are classified into levels A–E under the Regulations on Classification of Cyber Security Responsibility Levels. Each must meet certain cybersecurity responsibilities at different levels with regard to management, technical measures, and awareness and training.
The information security management system of entities of levels A–C shall be verified by certain standards, with Chinese National Standard (CNS) 27001 or the International Organization for Standardization (ISO) 27001 standard given as examples. Other systems or standards with equal or stronger effect, or other standards developed by the government agency itself and approved by the competent authority, are also acceptable.
Entities at levels A–C are also required to assign dedicated cybersecurity personnel. Moreover, both non-government agency and government agency staff can hold the position of chief information security officer (CISO) under Articles 12 and 23 of the CSMA. Also, entities at every level shall conduct cybersecurity education and training regularly. In addition to the CSMA, entities may have different requirements under other regulations.
Requirements for Conducting Risk Assessment or Specific Cyber-Testing, Scanning and Analysis Operations
For entities subject to the CSMA, the Regulations on Classification of Cyber Security Responsibility Levels provide different levels of entities with technical measures for adoption. For example, for level A entities, security detection, cybersecurity health diagnosis, cybersecurity monitoring management mechanisms, vulnerability management and cybersecurity defence are required.
The specific personal data security maintenance plans stipulated by the competent authorities of certain industries may also demand that entities establish an audit mechanism for the security maintenance of personal data, and designate appropriate personnel to inspect the implementation status of the plan and its process.
Required Standards for Recovery and Resiliency of Business Operations and Necessary Data After Cyber-Attacks
The CSMA does not provides a specific standard for recovery and resiliency after cyber-attacks, providing only general obligations to plan for recovery and resiliency.
Government agencies and private entities subject to the CSMA should comply with the Regulations on Classification of Cyber Security Responsibility Levels.
As explained, the entities are required to file and submit a report on the investigation, response and improvement of cybersecurity under the CSMA after cyber-attacks. Article 12 of the Enforcement Rules of the CSMA explicates the items that should be included in the report, but it specifies no standards for the same.
Under the CSMA, a cybersecurity incident refers to any event where the status of a system, service or network is identified as having a potential violation of the cybersecurity policy, or a failure of protective measures, which affects the functionality of the information and communication system.
Pursuant to the CSMA, government agencies and private entities subject to the CSMA shall report to their supervisory agencies and MODA when they become aware of a cybersecurity incident.
The Regulations for Reporting and Responding Cybersecurity Incidents set forth further details about the reporting of cybersecurity incidents, as required under the CSMA. A specific non-government agency shall report to its regulator at the central government within one hour after it becomes aware of a cybersecurity incident, and the regulator shall respond within two to eight hours depending on the classification of the cybersecurity incident. Meanwhile, the specific non-government agency shall complete damage control or recovery of the system within 36–72 hours.
Responsibilities for Promoting National Cybersecurity Resilience
Pursuant to Article 4 of the CSMA, the government should bolster national cyber resilience by actively integrating private industry capabilities and providing essential resources to safeguard public interests. In this regard, MODA, as the competent authority of the CSMA, is responsible for establishing the National Cyber Security Development Program to advance these objectives. In addition, under Article 6 of the CSMA, MODA is responsible for creating and promoting national cybersecurity policies, advancing cybersecurity technologies, encouraging international co-operation and implementing comprehensive cybersecurity measures. Additionally, MODA must annually publish the National Cyber Security Status Report, and an audit summary report on cybersecurity maintenance plans, to enable all sectors to understand national cybersecurity trends.
Information Exchange
Article 9 of the CSMA dictates that MODA should set up a cybersecurity information sharing mechanism. The Cyber Security Information Sharing Regulations further provide that the competent authorities of the relevant industries should exchange cybersecurity information with the “specific non-government agencies” under their charge (Article 3 of the Regulations).
For individuals, entities and organisations that are not subject to the CSMA, the competent authorities or MODA may also exchange cybersecurity information with them, provided that they have agreed in writing to comply with the requirements under the Regulations (Article 10 of the Regulations).
In implementing the Regulations, and to establish the national-level Information Sharing and Analysis Center, (ISAC), computer emergency response team (CERT) and Information Security Control Center (SOC) in nine critical infrastructure domains, the Administration for Cyber Security under MODA has built a national information security joint defence system, which allows information sharing among governmental agencies and critical infrastructure providers. Additionally, some authorities of the industries, such as the National Communication Commission (NCC), also periodically hold training sessions and seminars to encourage companies to strengthen their information security.
In addition to information sharing, MODA also provides assistance to help agencies cope with cybersecurity incidents and help the competent authority in charge of the relevant industry provide necessary support or assistance to help a “specific non-government agency” report or respond to a cybersecurity incident, according to the Regulations for Reporting and Responding to Cybersecurity Incidents.
Previously, the FSC released the Financial Cyber Security Action Plan 1.0 to ensure the uninterrupted operation of financial systems, and Financial Cyber Security Action Plan 2.0 to enhance the financial institutions’ cybersecurity and secure a safe trading environment.
On 30 December 2025, in alignment with the National Cybersecurity Strategy 2025 and to safeguard the continuous operation of financial systems, the FSC announced the Financial Cyber Resilience Development Blueprint. The Blueprint sets forth 29 targeted measures structured around a four-pillar framework: goal-driven governance, ubiquitous protection, ecosystem collaborative defence and robust resilience. Its primary aim is to establish a financial ecosystem that is predictable, defensible and recoverable.
The ten strategic highlights of the Blueprint follow.
Taiwan’s ICT industry includes the following four sectors:
In Taiwan, the term “ICT service providers” primarily refers to enterprises classified under “JC: Computer-related and information services industry” according to the official statistical definitions of the directorate-general of budget, accounting and statistics (DGBAS). This classification encompasses entities engaged in computer programming, system design, consultancy, data processing, information supply and other related information technology services.
Official Classification
The ICT sector in Taiwan is divided into manufacturing and services, with the services segment including:
This classification is consistent with international standards, such as those of the OECD, and covers non-manufacturing ICT activities, including software development and digital services.
The FSC has established a comprehensive regulatory framework governing the outsourcing of services by financial institutions to third-party service providers, such as data processing and cloud service vendors. For instance, under the Regulations Governing Internal Operating Systems and Procedures for the Outsourcing of Financial Institution Operations (Outsourcing Regulations), the scope of permissible outsourcing is clearly defined and includes services related to:
Permissible outsourced activities are limited to certain functions, including but not limited to:
Furthermore, outsourcing arrangements must comply with specific regulatory requirements designed to ensure operational integrity and protect customer information.
The key provisions governing these outsourcing activities include the following.
Contractual requirements
According to Article 10 of the Outsourcing Regulations, the financial institutions should implement outsourcing contracts with the service providers, stating, among other things, that:
Cross-border outsourcing
According to Article 17 of the Outsourcing Regulations, financial institutions, when outsourcing services outside of Taiwan, should follow certain requirements, including:
Critical consumer information system outsourcing
Pursuant to the Outsourcing Regulations, a financial institution must obtain prior approval from the FSC before outsourcing any critical consumer information system to a service provider located outside of Taiwan. This approval is a prerequisite for engaging such service providers to perform outsourcing services. Additionally, the service providers engaged by financial institutions are required to submit all documentation requested by the FSC to facilitate the approval process.
Criteria for critical consumer information system
The FSC has issued explanatory guidance to clarify the application of the Outsourcing Regulations. This guidance outlines key factors that financial institutions should consider when assessing the criticality of an outsourcing arrangement, including but not limited to:
Documents to be submitted to the FSC for approval and financial institutions’ additional obligations
Key documents include, but are not limited to:
Additionally, the financial institution must adhere to further obligations, including performing security examinations of its information systems at prescribed intervals. It should also conduct, or engage qualified third parties to conduct, both general and special examinations annually. Furthermore, outsourcing agreements must clearly outline the responsibilities related to the transition of outsourced services, as well as the penalties applicable in the event of service failures.
In addition to what has been established under the CSMA and its relevant regulations, the FSC, along with the associations of various financial institutions (eg, the Bank Association, the Insurance Association and the Securities Association), has announced several self-regulatory rules and guidelines to maintain the cybersecurity resilience of the financial institutions’ ICT systems. For instance, the Banking Association has stipulated the Resilience Standards for Information Operations of Financial Institutions (Resilience Standards), which have been submitted to the FSC for its reference.
According to the Resilience Standards, financial institutions must establish specific practices. Key provisions include the following.
For incident reporting, the FSC has also stipulated corresponding regulations. For instance, the Reporting Procedures and Other Compliance Matters for Financial Institutions on Material Incidental Events (Reporting Procedures) stipulate that when a bank encounters a material cybersecurity incident (material cybersecurity incident), the bank should, within 30 minutes after confirmation of the incident, notify the FSC through the designated channel. Within seven days upon reporting the incident, the bank should provide detailed information (eg, investigation result, handling and improvement mechanism) to the FSC.
Public information concerning enforcement actions involving critical ICT service providers remains limited. Nonetheless, certain cases addressing operational resilience obligations merit consideration.
Taishin International Bank Fined TWD6 Million for Internal Control Deficiencies in Debt Collection and Credit Card Billing
On 8 May 2025, the FSC fined Taishin International Bank TWD6 million for violations of paragraphs 1 and 3, Article 45-1 of the Banking Act. The penalty was issued following a regulatory investigation into systemic errors that led to incorrect mailing addresses for debt collection letters and the misplacement of credit card billing data.
The FSC stated in its disposition that Taishin Bank had failed to establish an adequate internal control system and had not effectively implemented its operational procedures. The investigation revealed that the bank lacked robust testing and verification mechanisms for information system changes and failed to provide effective oversight of its outsourced service providers. Specifically, in November 2024, an equipment malfunction at an outsourced vendor caused the transaction details of 358 customers to be printed on the wrong billing statements. The FSC found that Taishin Bank had not ensured that the vendor maintained an effective error-verification mechanism prior to mailing.
The FSC imposed the fine and demanded that the bank rectify its internal control and audit systems.
Investigation of the First Commercial Bank Security Breach
In July 2016, the ATM network of First Commercial Bank in Taiwan was hacked, which made selected ATMs spew cash out to 12 waiting “bagmen”. More than USD2.63 million was stolen through the 41 ATMs. While the police department worked on finding the bagmen, the Investigation Bureau, under the Ministry of Justice, which is responsible for investigating computer crimes, handled the digital forensics of the breached ATMs and located the installed malware. After the investigation wrapped up, about USD2.44 million was recovered by the police. Though 22 suspects from nine countries involved, only three were apprehended and indicted for fraud, in September 2016.
The FSC pointed out that First Bank did not provide sufficient cybersecurity protection to its ATMs and network, and thus imposed a TWD10 million fine on the bank and suspended its cardless withdrawal services until it improved its system.
Cathay United Bank Fined TWD12 Million for Repeated Electronic System Breakdowns
On 29 December 2022, Taiwan’s FSC fined Cathay United Bank TWD12 million for breakdowns of its ATM and internet banking electronic systems. The FSC further reduced the salary for the bank’s president Lee Wei-cheng by 30% for a period of three months and is requiring the bank to increase operational risk capital.
The FSC stated in its disposition that Cathay United Bank had not properly prepared an emergency response mechanism in the event of an incident like a breakdown of electronic systems and had not properly established or implemented an internal control system.
Cathay United Bank has previously been fined TWD2 million for four ATM system failures that occurred between 2020 and 2021. The FSC increased the fine to TWD12 million for the current case, which represents the highest penalty ever issued in Taiwan’s history for the breakdown of a bank’s electronic system.
According to Article 17 of the Outsourcing Regulations, financial institutions, when outsourcing services outside of Taiwan, should meet certain requirements. Key provisions include:
At present, there are no legislative frameworks explicitly dedicated to penetration testing. However, publicly available information indicates that the FSC has previously implemented a penetration testing plan as part of its cybersecurity assessment operations for banks’ computer systems. It appears that these penetration testing requirements are grounded in the FSC’s supervisory authority.
The CSMA does not impose the same level of security-by-design obligations for specific ICT products and services as the Cyber Resilience Act (CRA) in the EU. That being said, the competent authorities of specific sectors have issues with product-focused guidelines. Specifically, the FSC has, mostly through co-operating with the financial industry association, announced various cybersecurity rules governing financial institutions’ use of certain products and services.
For instance, the Banking Association has stipulated several product/service-specific regulations, such as e-bank services, electronic signatures, mobile debit cards, internet of things (IoT) products and AI, in the Regulations Governing the Security Control of IoT Equipment Used by Financial Institutions. The Insurance Association and the Security Association have established similar guidelines for various products/services for their members to adopt.
Additionally, pursuant to the authority granted by Article 42 of the Telecommunications Management Act, the NCC has issued the Technical Specifications for Cybersecurity Testing of Critical Telecommunications Infrastructure ICT Equipment, which were subsequently amended by MODA (Cybersecurity Testing of Critical Telecommunications Infrastructure – CTCTI) to outline the technical standards for firewalls, switches and routers with ethernet interfaces installed at critical connection points (ie, those linking various core functions within critical telecommunications infrastructure, and those connecting critical telecommunications infrastructure with other operators’ public telecom networks) within facilities (critical telecommunications infrastructure equipment).
Exhibit 10 of Regulations on Classification of Cyber Security Responsibility Levels provides some requirements for entities subject to the CSMA to ensure the integrity and the availability of their information systems. For example, entities with a defence standard classified as “high” are required to implement at least the following control measures:
Financial Sector
For the financial sector, the regulations issued by the FSC and relevant financial industry associations vary significantly across products and services. This variation reflects the distinct needs of the industry as well as the differing levels of complexity inherent to each product or service. That being said, to ensure that financial institutions maintain a consistent baseline of system security, the Banking Association has promulgated the Measures for Financial Institutions to Conduct Information Security Assessments of Computer Systems (the “Security Assessment Measures”) and the Information Security Standards for Financial Institution Systems (the “Security Standards”). Some of the relevant key requirements are as follows.
Vulnerability management
The Security Assessment Measures establish a three-tiered framework for assessing computer systems based on their criticality – specifically, whether the system provides automatic customer access, requires human intervention or offers no access at all. Systems classified as Level 1 must undergo an annual assessment, Level 2 systems require assessment every two years and Level 3 systems are assessed every five years. Furthermore, the Security Assessment Measures impose specific obligations regarding vulnerability management. Additionally, financial institutions are required to conduct vulnerability scans and remediation for network equipment, servers and terminals, as well as targeted penetration testing for websites.
Patching and updates
According to the Security Assessment Measures, security assessments must include a review of security configurations, which entails verifying the update settings and current patch status of operating systems, antivirus software, office applications and related components. The frequency of these assessments aligns with the tiered schedule described in the foregoing. Notably, if a system experiences a material information security incident, a re-assessment must be completed within three months to address any potential vulnerabilities.
Post-market surveillance of products
The Security Standards mandate that financial institutions implement surveillance systems capable of early detection of anomalies. Additionally, system log data must be retained for a sufficient period to support audit trails and investigations.
Conformity assessment requirements
The Security Assessment Measures require that security assessments verify compliance not only with the Security Standards but also with the Standards for Safety Control of Electronic Banking Business.
Telecommunications
For the telecoms sector, the CTCTI outlines the general technical standards for testing CTI equipment in various respects, such as access control, audit and system vulnerability, as well as specific standards for each category of critical telecommunications infrastructure equipment (CTE) based on the nature of their operation. Key provisions include the following.
Vulnerability management
The CTCTI specifically references the vulnerabilities database provided by the National Institute of Standards and Technology (NIST) and the European Network and Information Security Agency (ENISA) for testing institutions to adopt when conducting vulnerability scanning. Additionally, the CTCTI utilises the common vulnerabilities and exposures (CVE) and common vulnerability scoring system (CVSS) for vulnerability management. For instance, CTE is prohibited from containing known vulnerabilities with a CVSS score of 7.0 or higher.
Patching and updates
For certified equipment, if a new vulnerability with a CVSS score of 7.0 or higher is later discovered, the manufacturer, importer, reseller or agent should submit a patch test report within 90 days of the disclosure of the said vulnerability.
Conformity assessment requirements
The CTCTI requires the external assessment to be conducted and tested by the accredited laboratories. The scope of testing covers a range of technical standards, including, but not limited to, the level of access control, the required components of security logs, encryption standards such as TLS 1.2 and AES-128 or above, as well as performance stability during an eight-hour anomalous traffic stress test (for firewall and router systems).
For government agencies and specific non-government agencies that are subject to the CSMA, the Regulations on Classification of Cyber Security Responsibility Levels classify their responsibilities into five levels (A–E) and prescribe the security requirements for each level in terms of management, technical measures, and awareness and training.
For government agencies and “specific non-government agencies”, each of the competent authorities for those agencies has issued guidelines in which ISO27001 is referred to and recommended. However, there is no reference to specific cybersecurity obligations that shall be imposed on government agencies or specific non-government agencies.
The specific cybersecurity obligations vary among industries. For instance, operators in the telecommunications industry are required to obtain ISO/IEC 27001 and ISO/IEC 27011 certifications, while financial institutions are required to meet the security standards stipulated by the relevant competent authorities.
According to Article 11 of the CSMA, the information security responsibility levels are classified into Level A, Level B and Level C agencies, which should respectively allocate at least four, two and one dedicated information security personnel. Each personnel must hold at least one professional information security certification. The Administration for Cyber Security has continuously updated a list of recognised information security certification on their website.
Data Breach Notification
According to the Personal Data Protection Act (PDPA), if personal data is involved in a data breach incident, either a public agency or a non-public agency shall inform the affected data subjects of the incident as soon as it investigates the same. In the notice to the data subjects, the relevant facts concerning the incident, such as what data was stolen, when the incident happened, the potential suspects with regard to the breach and the remedial actions that have been taken, shall be described. The PDPA does not set forth any threshold for the notification to the affected data subjects.
Technical and Organisational Measures (Including Data Breach Report)
The Taiwanese government has implemented a decentralised approach to supervise compliance with the PDPA. Under this approach, central government authorities in various industries, as well as local governments, are granted supervisory power to enforce specific provisions outlined in the PDPA, such as stipulating rules with regard to technical and organisational matters for the industry sectors under their purview, as well as requiring data controllers to report data security incidents to them via a designated form (normally within 72 hours).
Under the designated form, the report should normally include the following information:
Currently, the threshold for reporting a data breach varies across different industry sectors. Depending on the rules imposed by the competent authorities, some sectors do not have any threshold, while others may base reporting requirements on the incident’s severity or the number of affected data subjects.
Amendments to the PDPA and the Establishment of the PDPC
On 11 November 2025, the PDPA underwent another round of amendments, with the effective date to be set by the Executive Yuan. The amended PDPA mainly addresses the responsibilities of the soon-to-be-established Personal Data Protection Commission (PDPC) and its succession of power from other government authorities, becoming the only competent authority under the PDPA. According to the amended PDPA, the PDPC, after its establishment, will introduce a new rule regarding technical and organisational matters, including certain cybersecurity requirements relevant to personal data protection, which generally applies to all entities subject to the PDPA.
On 14 January 2026, the Artificial Intelligence Basic Act (the “AI Basic Act”) was formally promulgated and took effect. While the AI Basic Act is primarily principle-based and does not impose specific mandatory requirements, it establishes a foundational legal framework empowering government authorities to develop further regulations. For instance, under the AI Basic Act, government authorities should enhance data governance by minimising unnecessary collection, processing or use of personal data, while integrating data protection principles into the design of AI systems. Moreover, throughout the research, development and deployment of AI, appropriate cybersecurity measures must be implemented to guard against security threats and attacks, thereby ensuring the integrity and safety of AI systems. Furthermore, MODA is tasked with adopting international standards to create an AI risk classification framework and supporting competent authorities of various industries in establishing risk-based management rules.
In addition to the AI Basic Act, certain sectors have guidelines for implementing AI technology. Key guidelines are as follows.
The FSC and relevant financial industry associations have issued guidelines governing the use of AI in the financial sector. Notably, the Operational Guidelines for Financial Institutions Using Artificial Intelligence Technology (the “FSC AI Guidelines”), published by the Banking Association, require financial institutions to uphold the principle of fair treatment throughout all stages of AI algorithm development and deployment in financial services. Furthermore, during the AI model training phase, institutions must safeguard the integrity and security of AI models and algorithms by implementing robust measures such as data quality control, model validation and ongoing monitoring. The FSC AI Guidelines align with existing cybersecurity and data protection requirements, while also introducing specific obligations tailored to the responsible use of AI technology in the financial industry.
The Executive Yuan has promulgated the Guidelines for the Application of Artificial Intelligence in National Critical Infrastructure (the “CI AI Guidelines”), which are designed specifically for the competent authorities overseeing industry sectors and the critical infrastructure providers under their supervision.
The CI AI Guidelines establish recommended risk categories for the deployment of AI technologies and require the adoption of appropriate mitigation measures. In cases where no effective measures exist, the use of AI may be prohibited. Additionally, the CI AI Guidelines enhance the obligations set forth by the CSMA and the relevant regulations regarding the implementation of AI. For instance, regulated entities should incorporate safety design principles during the design phase of the product development life cycle. For incident reporting, the CI AI Guidelines adhere to the Regulations on the Notification and Response of Cyber Security Incident, mandating that incidents be reported within one hour of discovery. Similar to the FSC AI Guidelines, the CI AI Guidelines align with existing cybersecurity and data protection requirements.
The MOHW, under the authorisation of the CSMA, has issued the Regulations for Information Security Management of Specific Non-Government Agencies under the MOHW (the “MOHW Regulations”). The MOHW Regulations set forth clear and detailed requirements that designated non-government agencies must follow when developing and executing their cybersecurity maintenance plans.
In addition, on 19 December 2025, the Regulation on Management of National Health Insurance Data (the “NHI Data Regulation”) was formally promulgated, with its effective date to be determined by the Executive Yuan. The Regulation establishes comprehensive standards governing the collection, processing and use of National Health Insurance (NHI) data. From a cybersecurity standpoint, the NHI Data Regulation mandates that applicants seeking access to NHI data implement specific cybersecurity measures and comply with the directives issued by the MOHW and the National Health Insurance Administration (NHIA). Additional requirements are expected to be issued by the MOHW in due course.
For hospitals, the MOHW has promulgated the Guideline for Cybersecurity Protection in Primary Healthcare Facilities. This guideline outlines various recommendations for healthcare institutions, specifically primary care clinics and regional hospitals with limited budgets and awareness of cybersecurity, with respect to the implementation of certain measures for protecting patient data and operations. Key recommendations include immediate incident reporting for threats, requiring a security clause in procurement contracts and proof of vendor cybersecurity certification or training.
For medical devices, the MOHW has published two guidelines concerning security requirements.
Both guidelines will be updated from time to time to adapt to technological advances.
8F, No 555
Sec 4
Zhongxiao E Rd
Taipei 11072
Taiwan
+886 2 2763 8000
+886 2 2766 5566
attorneys@leeandli.com www.leeandli.com
Supply Chain Cybersecurity Risk in Taiwan: Legal Obligations and Contracting Strategies for 2025
Introduction
Taiwan, home to Taiwan Semiconductor Manufacturing Company (TSMC) and other major tech manufacturers, occupies a uniquely strategic position in the global technology landscape. It serves as a hub for advanced semiconductor manufacturing and plays an integral role in the burgeoning AI-driven economy. In 2023, the Hague Centre for Strategic Studies published an article highlighting Taiwan’s pivotal position in the technology supply chain. The article notes that Taiwan produces over 60% of advanced chips (under 7 nm) and underscores the country’s critical role in powering the next generation of technologies, including 5G telecommunications, advanced military systems and AI. Beyond chip production, Taiwan’s robust industrial clusters provide a comprehensive ecosystem that supports essential upstream and downstream activities in the global technology manufacturing environment. This ecosystem covers a wide array of services, including AI server manufacturing, semiconductor packaging and testing, power management solutions and advanced cooling technologies. Furthermore, Taiwan’s supply chain is not confined to domestic enterprises. Leading global technology corporations, such as AWS, Google, Microsoft and Meta, have established or announced plans to establish AI data centres in Taiwan, reflecting a growing recognition of Taiwan’s strategic value as a technologically advanced location for supporting the growing demand for AI-driven services and infrastructure.
However, despite its reputation as the “silicon shield”, Taiwan is not immune to cyber threats. In fact, recent intelligence and cybersecurity assessments demonstrate that the threat landscape in Taiwan is escalating and becoming more complex. Taiwan’s National Security Bureau’s recent annual report emphasises the intensifying cyber threat environment faced by critical infrastructure sectors. In 2025, Taiwan’s critical infrastructure reportedly endured an average of 2.63 million cyber-intrusion attempts daily, marking a 6% increase from the previous year.
For decades, companies have invested and implemented robust internal defences, such as sophisticated firewalls, intrusion detection systems and endpoint protection, to safeguard their digital assets. However, threat actors have adapted their tactics, shifting from direct attacks on these fortified systems to exploiting less monitored and more vulnerable entry points. One of the most significant vulnerabilities lies within the supply chain, which is a complex network of third-party vendors, contractors, open-source software components and service providers that modern enterprises increasingly depend on. These external partners often have varying levels of cybersecurity investment and capability, creating potential weak links in the overall security posture.
To address this vulnerability, both global regulatory bodies and Taiwanese authorities have enacted targeted measures to strengthen cybersecurity defences across the supply chain. This article provides an overview of Taiwan’s evolving cybersecurity regulatory landscape and critically examines areas where enhancements are warranted. Additionally, it explores best practices from jurisdictions recognised for their advanced cybersecurity efforts, offering Taiwanese regulators insights to enhance the current regulatory landscape. Through this analysis, the article aims to inform stakeholders, including legal practitioners, corporate compliance officers and policymakers, about the evolving obligations and strategic considerations that are essential for navigating Taiwan’s cybersecurity environment.
Regulatory expectations
Regulatory expectations in Taiwan increasingly emphasise cybersecurity and national security considerations in vendor and supply chain management, particularly for suppliers participating in government, critical infrastructure and financial-sector procurement projects. Under the Cybersecurity Management Act (CMA), government agencies, critical infrastructures and critical infrastructure providers are required, in principle, to avoid or restrict from procuring or using information and communications technology (ICT) products that are deemed to endanger national cybersecurity. In practice, ICT products formally identified as endangering national cybersecurity are predominantly those originating from, manufactured by or substantially involving elements from China (PRC). Consequently, suppliers are expected to proactively reduce or eliminate PRC-related elements throughout their supply chains, including hardware components, embedded software, firmware, cloud services, technical support and maintenance services. This expectation extends beyond first-tier vendors to upstream suppliers and subcontractors, requiring comprehensive supply chain due diligence, transparent disclosure of product origin and contractual commitments to maintain a PRC-free or PRC-reduced supply chain. Vendors are further expected to implement internal governance mechanisms, such as periodic risk assessments, supplier qualification reviews and change-management procedures, to ensure that subsequent modifications to product design, sourcing strategies or ownership structures do not undermine compliance or introduce new security risks.
Furthermore, standard government procurement templates impose strict information security obligations on suppliers, requiring full compliance with the CMA and its subordinate regulations, the Classified National Security Information Protection Act, the Personal Data Protection Act (PDPA), the Copyright Act and all cybersecurity standards and policies promulgated by the Executive Yuan. In the event that a supplier violates the requirements and causes harm to the rights or interests of others due to its negligence, the supplier shall bear legal liabilities and is required to fully co-operate in the subsequent remediation measures, including incident investigation, containment, notification, evidence preservation and corrective actions. If such violations result in losses to the procuring agency, the supplier is also liable for damages. Furthermore, government agencies have the right to conduct cybersecurity audits, supervision, document reviews or other appropriate verification measures, which reinforces the principle that suppliers are subject to continuous oversight throughout the entire contract life cycle rather than only at the procurement stage.
Similar regulatory logic applies within the financial industry under the oversight of the Financial Supervisory Commission (FSC), which imposes stringent outsourcing rules to safeguard the security, confidentiality and operational resilience of financial information systems. Financial institutions are generally prohibited from engaging outsourcing vendors with PRC capital backgrounds, and outsourced systems, platforms or products must not be manufactured in PRC, reflecting heightened concerns regarding data leakage, systemic risk, cross-border data access and potential foreign influence over critical financial infrastructure. In addition to binding regulatory requirements, Taiwan’s Bankers Association has established self-regulatory guidelines governing information system outsourcing, further strengthening expectations for vendor risk assessment, contractual safeguards, service continuity planning and ongoing supervision. These guidelines require financial institutions to retain audit rights over outsourced vendors, enabling on-site inspections, documentation reviews, security testing, source-code or architecture assessments where appropriate, and incident response drills to ensure continued compliance.
Government procurement cybersecurity requirements similarly emphasise supplier accountability, auditability, timely incident reporting and strict adherence to national cybersecurity laws and standards, while treating PRC-related ownership, manufacturing or technological dependencies as material risk factors in vendor selection, contract renewal, scope adjustment and termination decisions. Taken together, these regulatory regimes demonstrate a consistent and increasingly rigorous policy direction in which suppliers are no longer evaluated solely on cost, efficiency or technical performance, but also on their ability to:
Common gaps in Taiwanese enterprises
Amid growing regulatory and operational risks, Taiwanese companies – particularly those in the technology manufacturing, finance, telecommunications and healthcare industries – face a new challenge: attacks are increasingly aimed at supply chains rather than individual companies.
While Taiwan’s cybersecurity regulatory regime is still developing, enforcement patterns and incident investigations suggest that similar weaknesses exist in third-party and vendor-related cyber risk management.
The three primary areas of weakness are:
If ignored, these vulnerabilities could expose companies to regulatory fines, civil lawsuits and significant reputational damage.
Insufficient vendor due diligence
A prevalent and impactful deficit among Taiwanese businesses is the failure to intensify cybersecurity due diligence when selecting vendors. In many organisations, the priority when selecting vendors, cloud providers, system integrators and managed service providers, among other things, remains cost, delivery timeline or technical expertise, rather than cybersecurity preparedness.
From a legal and regulatory standpoint, this is no longer acceptable. The CMA, together with a plethora of sector-specific regulations – most notably those concerning financial institutions, critical infrastructure providers and government contractors – imposes an obligation on regulated entities to ensure that third parties handling systems or data meet certain minimum cybersecurity standards.
However, vendor assessment often amounts to high-level questionnaires or generic self-attestations, lacking substantive technical or governance analysis. Common weaknesses include not evaluating whether vendors:
These weaknesses are particularly concerning given Taiwan’s role as a global supply chain hub. A flaw in an upstream supplier or managed service vendor can quickly propagate and impact countless downstream customers.
Regulators are increasingly treating these failures not as isolated vendor problems but as shortcomings in the enterprise’s own risk management duties. For boards and senior management, poor vendor due diligence may therefore translate into governance and oversight concerns – particularly if cyber-incidents cause service interruptions or data breaches.
Inadequate contractual cybersecurity protections
Vendor agreements too often fail to adequately address basic cybersecurity expectations, leaving organisations dangerously exposed to potential data loss. Without explicit provisions, organisations have difficulty enforcing standards or seeking damages in the wake of a violation.
Common contractual impediments include:
Even if the cause of a breach is traced back to a vendor, enterprises are in many cases left “holding the bag” under the PDPA. It is difficult to recoup losses from a vendor without strong contracts.
In 2026, best practices dictate a risk-based approach where contracts are tailored to the sensitivity of the service. Cybersecurity clauses are now essential risk allocation tools, not merely boilerplate
Absence of continuous monitoring mechanisms
Many Taiwanese enterprises appear to consider vendor risk assessment as a one-time process during onboarding, barring major incidents. This static approach is increasingly at odds with the dynamic nature of cyber threats. In fact, a vendor’s cybersecurity posture may decline over time due to staff turnover, system upgrades, financial strain or outsourcing decisions. Enterprises risk being unaware of new vulnerabilities until they are exploited if they do not have an effective monitoring system in place.
Typical deficiencies observed in this area include:
Supervisory authorities are increasingly adopting a continuous assurance model. Drafting contractual terms is not sufficient – organisations must demonstrate active enforcement. Regular reporting of vendor risk metrics is necessary for directors to meet their fiduciary responsibilities and avoid accusations of neglect in risk oversight.
Contracting strategies
One of the important tools to tackle cybersecurity risk is to include cybersecurity-related clauses in contracts to be signed with the supply chain partners. In addition, as said, government procurement contracts in Taiwan usually include provisions requiring the suppliers to comply with the same cybersecurity obligations that the procuring agencies are subject to under Taiwan law. To ensure compliance, suppliers may need to consider including the same obligations in the agreements with its upstream partners. The following are some of the clauses that companies may consider adopting in their contracts.
Minimum-security baselines
While there is no universally adopted or official definition for a “minimum-security baseline”, several authoritative organisations have published standards and certifications that serve this purpose. In Taiwan, for instance, all public companies are required to obtain cybersecurity management compliance certifications, including the CNS 27001 national standard or the international ISO/IEC 27001 standard. This requirement extends to certain sectors, such as telecommunications.
To meet these compliance standards, many companies impose contractual obligations on their supply chain partners to maintain a cybersecurity baseline as well as take specific actions. These often involve security assessments and cybersecurity health checks, such as vulnerability scans and checks for malicious activity, conducted at least once every two years. Additionally, companies may mandate the implementation of cybersecurity defences and the regular updating or upgrading of relevant software and hardware.
Incident report and response co-operation clauses
Under the CMA, whenever there is a cybersecurity incident, government agencies and certain other businesses must notify the competent authority within one hour of discovery thereof and complete system damage control or recovery of the system within 36–72 hours, depending on the severity. Additionally, public companies are also obligated to disclose such incidents when they become material. Given these time-sensitive requirements, in practice, government agencies and the relevant companies expect their supply chain contractors to promptly provide information about any cybersecurity incidents affecting the organisation.
Meanwhile, as well as for the purpose of complying with the incident reporting requirements, it is very important for a company to be alerted when its supply chain partner is being attacked, so that the company can take proper action to protect itself from cyber-attacks. Hence, it is important to include an incident reporting and response co-operation clause in the agreement with supply chain partners.
In practice, to mitigate supply chain risks, these requirements are often passed down to contractors through “flow-down” clauses in their contracts, ensuring compliance with regulations. Contractors are then obligated to report any cybersecurity information to the agency they work with. Many contracts also include the obligation to take proper security measures to tackle a cybersecurity incident or attack.
Audit right
To ensure compliance with cybersecurity obligations, government agencies and certain private businesses will be periodically audited by the authority. In practice, the regulator may also require a private supplier to audit its sub-contractor or supply chain partners. As a result, it is advisable to include audit rights in the relevant agreements.
With regard to auditing, the competent authority may perform regular or unscheduled audits of cybersecurity maintenance plans, which, according to enforcement rules, must align with cybersecurity policies and objectives. Therefore, in practice, agencies frequently require their supply chain contractors to avoid actions that contradict these policies. Furthermore, to ensure compliance and effective enforcement of the contract, agencies may also include audit clauses in their contracts with contractors.
Liability allocation and cyber-insurance integration
The CMA imposes administrative fines on private businesses that are designed as critical infrastructure providers. Those who fail to comply may face several consequences. The competent authority can order them to rectify the issue within a specific timeframe; failure to do so can result in a fine ranging from TWD100,000 to TWD5 million. For reporting violations, the fine increases to between TWD300,000 and TWD10 million. As a result, it is likely that such businesses will include indemnification clauses in contracts, holding supply chain contractors responsible for claims, losses, penalties and expenses arising from the contractor’s failure to comply with its obligations under the contract.
While not legally required, the FSC encourages companies to purchase cybersecurity insurance due to rising cyber threats. In practice, to allocate the risks, companies are often encouraged to acquire cyber-insurance that covers the property losses caused by cyber-attacks, computer extortion or the insured’s mismanagement, as well as liability for third-party compensation.
International best practices
NIST SP 800-161
National Institute of Standards and Technology (NIST) Special Publication 800-161, Revision 1 (the “NIST Framework”) incorporates existing NIST standards and international frameworks. It offers a comprehensive blueprint for managing the complex risks inherent in the global supply chain ecosystem for ICT and operational technology (OT), while helping enterprises understand and implement effective cybersecurity supply chain risk management (C-SCRM) practices. Some of the key provisions are as below:
In general, the NIST Framework is mandatory for US federal agencies. For private sector entities and other non-governmental organisations, however, the Framework is applicable on a voluntary basis.
EU NIS2
Directive (EU) 2022/2555, known as NIS2, builds upon the original NIS framework and, together with related regulations – including the NIS2 Implementing Regulations, international standards and national frameworks – creates a comprehensive legal structure. This framework applies to essential and important entities (regulated entities) and is designed to bolster the security of network and information systems across the EU.
Article 21 of NIS2 outlines ten essential measures that regulated entities must implement. Among these measures is a specific mention of supply chain security, encompassing the relationship between entities and their direct suppliers or service providers. The NIS2 recital further emphasises that regulated entities should integrate cybersecurity risk management into their contracts with direct suppliers and service providers while also considering risks that may arise from other tiers within the supply chain.
Additionally, the later-published guidance of the European Network and Information Security Agency (ENISA) outlines key requirements for ensuring supply chain security, including the following.
Unlike the NIST Framework, NIS2 imposes legally binding requirements on both public and private entities, provided certain conditions are met. However, as a directive, NIS2 only establishes a baseline framework allowing member states to enforce more stringent cybersecurity requirements. Additionally, the NIS2 Implementing Regulations have been adopted to impose further enhances and rigorous security measures on certain critical entities, such as Domain Name System (DNS) providers, cloud providers and data centres.
Conclusion
As Taiwan’s cybersecurity legal framework continues to mature, enterprises should view supply chain cybersecurity not merely as an IT or procurement issue, but as a core legal and governance responsibility. Addressing common gaps, and adopting contracting strategies and international best practices, will be essential for meeting regulatory expectations in 2026 and beyond – and for building resilient, trustworthy supply chains in an increasingly interconnected digital economy.
8F, No 555
Sec 4
Zhongxiao E Rd
Taipei 11072
Taiwan
+886 2 2763 8000
+886 2 2766 5566
attorneys@leeandli.com www.leeandli.com