Activity Tracker

The DPA Activity Tracker provides our latest information on developments in legislatures, judiciaries and the executive branches of G20, EU member states and Switzerland.

31 events advancing 31 policy or regulatory changes:

Most active jurisdictions Number of policy changes

Graph

Table

Most active policy areas Number of policy changes
Targeted economic activity Number of policy changes
Reset filters
31 events advancing 31 policy or regulatory changes:
in consultation

Measures for Network Data Security Risk Assessment

Latest event Date: 2025-12-06 order consultation opened

Cyberspace Administration of China opened consultation on draft measures for network data security risk assessments

On 6 December 2025, the Cyberspace Administration of China (CAC) opened a consultation on the draft measures for network data security risk assessments until 5 January 2026. The draft regulation defines the scope and procedures for conducting networ…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity cross-cutting
adopted

TC260 Standard Data Security Technology - Security Requirements for Data Transaction Services (GB/T 37932-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard on security requirements for data transaction services

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the Standard Data Security Technology-Security Requirements for Data Transaction Services (GB/T 37932-2025). The standard sets out security req…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity cross-cutting
adopted

TC260 Standard Information Technology Security Technology - Cybersecurity Part 7: Network Virtualization Security (GB/T 25068.7-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard cybersecurity part 7: network virtualization security

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the Standard Information Technology Security Technology - Cybersecurity Part 7: Network Virtualization Security (GB/T 25068.7-2025). The standa…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity cross-cutting
adopted

TC260 Standard Information Technology Security Technology - Network Security Part 6: Wireless Network Access Security (GB/T 25068.6-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard on network security part 6: wireless network access security

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the Standard Information Technology Security Technology - Network Security Part 6: Wireless Network Access Security (GB/T 25068.6-2025). The st…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity cross-cutting
adopted

TC260 Standard Network Security Technology - Network Security Test Platform Architecture (GB/T 46820-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard on network security test platform architecture

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the Standard Network Security Technology - Network Security Test Platform Architecture (GB/T 46820-2025). The standard sets out the system arch…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity cross-cutting
adopted

National Cybersecurity Standardisation Technical Committee Framework for Public Key Cryptography Application Technology in Network Security (GB/T 46795-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted framework for public key cryptography application technology in network security

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the Framework for Public Key Cryptography Application Technology in Network Security (GB/T 46795-2025). The standard applies to all public-key …

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
adopted

TC260 standard data interface security risk monitoring methods (GB/T 46796-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard data interface security risk monitoring methods

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the standard data interface security risk monitoring methods (GB/T 46796-2025). The standard sets out security risk monitoring methods in relat…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity cross-cutting
adopted

TC260 standard cybersecurity product interconnectivity -part 3: alarm information format (GB/T 44886.3-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard cybersecurity product interconnectivity -part 3: alarm information format

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the standard cybersecurity product interconnectivity-part 3: alarm information format (GB/T 44886.3-2025). The standard applies to interconnect…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
adopted

TC260 standard cybersecurity product interconnectivity-part 2: asset information format (GB/T 44886.2-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted standard cybersecurity product interconnectivity - part 2: asset information format

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the standard cybersecurity product interconnectivity - part 2: asset information format (GB/T 44886.2-2025). The standard applies to cybersecur…

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
adopted

TC260 technical requirements for cryptography and related security of identity-based cryptographic authentication system (GB/T 46798-2025)

Latest event Date: 2025-12-02 order adoption

National Information Security Standardisation Technical Committee adopted technical requirements for cryptography and related security of identity-based cryptographic authentication system

On 2 December 2025, the National Information Security Standardisation Technical Committee (TC260) adopted the technical requirements for cryptography and related security of identity-based cryptographic authentication systems (GB/T 46798-2025). The …

Implementer
China
Policy area Data governance
Policy or regulatory element Cybersecurity regulation
Economic activity software provider: other software
Page
1
2
3
4