Activity Tracker

The DPA Activity Tracker provides our latest information on developments in legislatures, judiciaries and the executive branches of G20, EU member states and Switzerland.

14 events advancing 14 policy or regulatory changes:

Most active jurisdictions Number of policy changes

Graph

Table

Most active policy areas Number of policy changes
Targeted economic activity Number of policy changes
Reset filters
14 events advancing 14 policy or regulatory changes:
in force

Revised licensing framework for cybersecurity service providers

Latest event Date: 2026-03-13 order implementation

Cyber Security Authority (CSA) updated licensing framework for cybersecurity service providers enters into force

On 13 March 2026, the updated Licensing Framework for Cybersecurity Service Providers issued by the Cyber Security Agency of Singapore (CSA) entered into force, following the publication of the closing note to the public consultation on 13 February …

Implementer
Singapore
Policy area Authorisation, registration and licensing
Policy or regulatory element Operational license requirement
Economic activity software provider: other software
in consultation

Recommendation on session replay tools

Latest event Date: 2026-02-25 outline consultation opened

National Commission on Informatics and Liberty opened consultation on draft recommendation on session replay tools

On 25 February 2026, the National Commission on Informatics and Liberty (CNIL) closes the consultation on its draft recommendation on session replay tools. The draft recommendation is addressed to session replay tool providers and website and mobile…

Implementer
France
Policy area Data governance
Policy or regulatory element Data protection regulation
Economic activity platform intermediary: user-generated content, software provider: other software
adopted

National Cybersecurity Standardisation Technical Committee Framework for Public Key Cryptography Application Technology in Network Security (GB/T 46795-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted framework for public key cryptography application technology in network security

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the Framework for Public Key Cryptography Application Technology in Network Security (GB/T 46795-2025). The standard applies to all public-key …

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
adopted

TC260 standard cybersecurity product interconnectivity -part 3: alarm information format (GB/T 44886.3-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard cybersecurity product interconnectivity -part 3: alarm information format

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the standard cybersecurity product interconnectivity-part 3: alarm information format (GB/T 44886.3-2025). The standard applies to interconnect…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
adopted

TC260 standard cybersecurity product interconnectivity-part 2: asset information format (GB/T 44886.2-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard cybersecurity product interconnectivity - part 2: asset information format

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the standard cybersecurity product interconnectivity - part 2: asset information format (GB/T 44886.2-2025). The standard applies to cybersecur…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
adopted

TC260 technical requirements for cryptography and related security of identity-based cryptographic authentication system (GB/T 46798-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted technical requirements for cryptography and related security of identity-based cryptographic authentication system

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the technical requirements for cryptography and related security of identity-based cryptographic authentication systems (GB/T 46798-2025). The …

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
adopted

Content moderation authority governance in Law for the protection of children and adolescents in digital environments (Bill 2628/22)

Latest event Date: 2025-09-17 law signing

President signed Bill on protection of children and adolescents in digital environments, including content moderation authority governance (Law No. 15,211)

On 17 September 2025, the President signed the Bill on the protection of children and adolescents in digital environments into Law No. 15,211. The Law establishes an autonomous administrative authority responsible for supervising compliance with its…

Implementer
Brazil
Policy area Content moderation
Policy or regulatory element Content moderation authority governance
Economic activity platform intermediary: user-generated content, technological consumer goods, software provider: other software
adopted

Obligation to appoint legal representative in Law for the protection of children and adolescents in digital environments (Bill 2628/22)

Latest event Date: 2025-09-17 law signing

President signed Bill on protection of children and adolescents in digital environments, including obligation to appoint legal representative (Law No. 15,211)

On 17 September 2025, the President signed the Bill on the protection of children and adolescents in digital environments into Law No. 15,211. The Law requires providers of digital products and services covered by the Bill to maintain a legal repres…

Implementer
Brazil
Policy area Other operating conditions
Policy or regulatory element Local operations requirement
Economic activity platform intermediary: user-generated content, technological consumer goods, software provider: other software
adopted

Obligations for electronic games in Law for the protection of children and adolescents in digital environments (Bill 2628/22)

Latest event Date: 2025-09-17 law signing

President signed Bill on protection of children and adolescents in digital environments, including obligations for electronic games (Law No. 15,211)

On 17 September 2025, the President signed the Bill on the protection of children and adolescents in digital environments into Law No. 15,211. The Law regulates the use of loot boxes in electronic games accessible to children and adolescents. It req…

Implementer
Brazil
Policy area Other operating conditions
Policy or regulatory element Prohibition of goods and services
Economic activity software provider: other software
adopted

Data protection regulation in Age-Appropriate Design Code Act (SB 69)

Latest event Date: 2025-06-12 law signing

Age-Appropriate Design Code Act (S. 69) was signed by Governor

On 12 June 2025, the Vermont Governor signed the Age-Appropriate Design Code Act (S. 69) into law. The Act stipulates that violations of its provisions will be treated as unfair and deceptive acts in commerce, with enforcement overseen by the Attorn…

Implementer
United States of America
Policy area Data governance
Policy or regulatory element Data protection regulation
Economic activity online advertising provider, platform intermediary: user-generated content, streaming service provider, software provider: other software, platform intermediary: other
Page
1
2