Activity Tracker

The DPA Activity Tracker provides our latest information on developments in legislatures, judiciaries and the executive branches of G20, EU member states and Switzerland.

18 events advancing 17 policy or regulatory changes:

Most active jurisdictions Number of policy changes

Graph

Table

Most active policy areas Number of policy changes
Targeted economic activity Number of policy changes
Reset filters
18 events advancing 17 policy or regulatory changes:
in force

Extended Equipment Online Safety Code (Class 1C and Class 2 Material) under Online Safety Act 2021

Latest event Date: 2026-03-09 order implementation

Equipment Online Safety Code (Class 1C and Class 2 Material) enters into force

On 9 March 2026, the Equipment Online Safety Code (Class 1C and Class 2 Material) under the Online Safety Act 2021 enters into force. The Code applies to hardware intended for Australian end-users and establishes obligations for manufacturers, suppl…

Implementer
Australia
Policy area Content moderation
Policy or regulatory element Content moderation regulation
Economic activity technological consumer goods, infrastructure provider: network hardware and equipment
adopted

Cyber Trust Mark requirements in critical information infrastructure and cybersecurity industries

Latest event Date: 2026-03-02 order adoption

Cyber Security Agency adopted Cyber Trust Mark Level 5 requirement for Critical Information Infrastructure Owners and auditors

On 2 March 2026, the Cyber Security Agency (CSA) adopted a requirement for Critical Information Infrastructure Owners (CIIOs) and CII auditors to obtain the Cyber Trust Mark (CTM) Level 5 certification. The mandate aims to establish a consistent nat…

Implementer
Singapore
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity infrastructure provider: internet and telecom services, ML and AI development, infrastructure provider: cloud computing, storage and databases, infrastructure provider: network hardware and equipment, infrastructure provider: other
adopted

Cybersecurity regulation in Decree No. 1667 on approval of Rules for centralised management of public communications network

Latest event Date: 2026-03-01 order implementation

Rules for centralised management of the public communications network including cybersecurity regulation enter into force

On 1 March 2026, the Rules for centralised management of the public communications network enter into force, establishing cybersecurity regulation for network management. The Rules define threats to the security and functioning of the Internet and t…

Implementer
Russia
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity infrastructure provider: internet and telecom services, infrastructure provider: network hardware and equipment
in force

Government access to data in Decree No. 1667 on approval of Rules for centralised management of public communications network

Latest event Date: 2026-03-01 order implementation

Rules for centralised management of the public communications network including government access to data enter into force

On 1 March 2026, the Rules for centralised management of the public communications network enter into force, granting state authorities operational access for network management. The Rules authorise the Federal Service for Supervision of Communicati…

Implementer
Russia
Policy area Data governance
Policy or regulatory element Government access to data
Economic activity infrastructure provider: internet and telecom services, infrastructure provider: network hardware and equipment
adopted

Organisational requirements in Decree No. 1667 on approval of Rules for centralised management of public communications network

Latest event Date: 2026-03-01 order implementation

Rules for centralised management of public communications network including organisational requirements enter into force

On 1 March 2026, the Rules for centralised management of the public communications network enter into force, establishing mandatory participation conditions for designated entities. The Rules require operators of communications, owners or holders o…

Implementer
Russia
Policy area Other operating conditions
Policy or regulatory element Organisational requirement
Economic activity infrastructure provider: internet and telecom services, infrastructure provider: network hardware and equipment
in force

Dual-use export control restrictions concerning 20 Japanese entities (Announcement No. 12 of 2026)

Latest event Date: 2026-02-24 order implementation

Ministry of Commerce adopted export control concern list including 20 Japanese entities under enhanced dual-use export scrutiny (Announcement No. 12 of 2026)

On 24 February 2026, the Ministry of Commerce (MOFCOM) adopted Announcement No. 12 of 2026, adding 20 Japanese entities to the export control concern list due to the inability to verify the end users and end uses of dual-use items. Listed entities, …

Implementer
China
Policy area International trade
Policy or regulatory element Export licensing requirement
Economic activity semiconductors, infrastructure provider: network hardware and equipment, infrastructure provider: other
in force

Export control order including 20 Japanese entities under dual-use export control restrictions (Announcement No. 11 of 2026)

Latest event Date: 2026-02-24 order implementation

Ministry of Commerce adopted export control order including 20 Japanese entities under dual-use export control restrictions (Announcement No. 11 of 2026)

On 24 February 2026, the Ministry of Commerce (MOFCOM) adopted Announcement No. 11 of 2026, placing 20 Japanese entities on an export control list. The measure prohibits export operators from exporting dual-use items to the listed entities, includin…

Implementer
China
Policy area International trade
Policy or regulatory element Export ban
Economic activity semiconductors, infrastructure provider: network hardware and equipment, infrastructure provider: other
under deliberation

Texas Attorney General lawsuit against TP-Link Systems over alleged deceptive marketing and data security risks

Latest event Date: 2026-02-17 public lawsuit announcement

Office of the Attorney General filed lawsuit against TP-Link Systems over alleged deceptive marketing and data security risks

On 17 February 2026, the Office of the Attorney General filed a lawsuit against TP-Link Systems, alleging deceptive marketing practices and claiming that the company allowed the Chinese Communist Party (CCP) access to consumer devices. The complaint…

Implementer
United States of America
Policy area Consumer protection
Policy or regulatory element Fair marketing and advertising practice requirement
Economic activity infrastructure provider: network hardware and equipment
in consultation

Revised Cybersecurity Trusted Computing Specification Trusted Support Platform for Server (GB/T 36639)

Latest event Date: 2026-02-11 order consultation opened

National Cybersecurity Standardisation Technical Committee opened consultation on draft revised national standard Trusted Computing Specification Trusted Support Platform for Server

On 11 February 2026, the National Cybersecurity Standardisation Technical Committee (TC260) opened a public consultation, until 12 April 2026, on the draft revised national standard GB/T 36639, titled Cybersecurity — Trusted Computing Specification …

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity infrastructure provider: cloud computing, storage and databases, infrastructure provider: network hardware and equipment
processing consultation

TC260 standard security requirements for cryptographic modules

Latest event Date: 2026-02-10 order consultation closed

National Information Security Standardisation Technical Committee closes consultation on standard security requirements for cryptographic modules

On 10 February 2026, the National Information Security Standardisation Technical Committee (TC260) closes a consultation on its consultation on its standard on security requirements for cryptographic modules. The standard sets out security requireme…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software, infrastructure provider: network hardware and equipment
Page
1
2