Welcome to the latest, bumper, edition of the Stephenson Harwood Data and Cyber Update, covering the key developments in data protection and cyber security law during both December 2025 and January 2026.
In data regulation news, the European Commission and Brazil adopt mutual adequacy decisions; the UK Information Commissioner’s Office (“ICO”) provides a series of updates for the year ahead; and new Commencement Regulations set the commencement date for Section 138 of the Data (Use and Access) Act 2025 (the “DUAA”).
In cybersecurity news, the European Commission defines “important” and “critical” products under the EU Cyber Resilience Act and publishes a new Cybersecurity Package; and the ICO publishes its response to the UK Cyber Security and Resilience (Network and Information Systems) Bill.
In our enforcement and civil litigation update, the Court of Justice of the European Union (“CJEU”) rules that an online marketplace is a data controller for personal data in user ads on its platform; the Single Resolution Board (“SRB”) withdraws its appeal against the European Data Protection Supervisor (“EDPS”) from the EU General Court; and the European Commission issues its first major fine under the Digital Services Act.
On 27 January, the European Commission (the “Commission”) and Brazil adopted mutual adequacy decisions, confirming that Brazil’s data protection framework offers a level of protection essentially equivalent to the EU GDPR (“GDPR”). Now in effect, this decision allows for the free flow of personal data between the European Union (“EU”) and Brazil without the need for additional safeguards under Article 45 GDPR. Practical implications of this decision include greater legal certainty, reduced costs and a boost to digital trade between the two regions.
This decision was initiated by the draft adequacy decision published by the Commission on 5 September 2025, which we covered in our September 2025 update here. Before finalisation, the decision received an opinion by the European Data Protection Board (“EDPB”), which acknowledged the alignment between Brazil and Europe’s data protection frameworks. The decision also received approval by the EU Member States prior to finalisation.
The start of 2026 has seen a series of developments from the ICO, with the publication of updated guidance and government collaboration. Organisations are encouraged to review these developments to ensure ongoing compliance and readiness for future changes.
Updated guidance on right of access and international transfers
The ICO has revised its guidance on the right of access in response to the DUAA. The update clarifies what constitutes a “manifestly unfounded” subject access request (“DSAR”), confirming that organisations should take a reasonable and proportionate approach when responding; a requirement that has been codified under the DUAA. The guidance also confirms the (not yet in-force) DUAA amendment that organisations can “stop the clock” when responding to a DSAR if they require clarification from the requester, provided this is “reasonably required” to fulfil the DSAR.
The ICO has also made important updates to its guidance on international data transfers under the UK General Data Protection Regulation (“UK GDPR”). The updates focus on clarifying and simplifying the guidance, with the introduction of quick reference FAQs, a glossary of terms and examples to support understanding and compliance. The updated guidance includes a practical three-step test to help organisations to determine if they are making a restricted transfer:
Our key takeaways from the updated guidance are as follows:
Consultation on early settlement of enforcement actions
The ICO recently closed its public consultation on its approach to early settlement in enforcement actions, which ran from 31 October 2025 to 23 January 2026. The consultation sought feedback on proposed discounts for fines where organisations settle early in the enforcement process. The draft guidance proposes a tiered discount structure:
The final version of the guidance will be published in due course and will reflect responses from this consultation. The ICO Executive Director of Regulatory Supervision describes the guidance as “significantly more detailed than previous guidance on their approach to investigation and enforcement”.
Memorandum of Understanding with the UK Government
On 8 January, the ICO and the UK Government signed a Memorandum of Understanding (“MoU”) to enhance cooperation on data security. The MoU establishes a framework for collaboration while maintaining the ICO’s independence and the government’s statutory obligations. Its aims include leveraging new technologies to improve public services, fostering economic growth, and ensuring public trust in the use of personal data.
Key actions under the MoU include annual assurance statements on data safety, learning from data breaches, and appointing a Chief Data Officer to oversee cross-government data protection. The ICO will continue to provide guidance, share risk insights, and support government compliance, with a focus on high standards and transparency.
The Data (Use and Access) Act 2025 (Commencement No.5) Regulations 2026 were made on 15 January, bringing section 138 of the DUAA into force on 6 February 2026. Section 138 of the DUAA amends the Sexual Offences Act 2003 to criminalise creating, or requesting the creation of, a “purported intimate image” of an adult without their consent. As we reported in our January 2026 edition of the Neural Network, this action by the UK government is in response to serious concerns about the use of X’s AI chatbot Grok to generate harmful content.
Our DUAA implementation tracker follows all existing and upcoming changes introduced by the DUAA, along with the ICO’s progress in updating its guidance to reflect these changes.
On 1 December 2025, the Commission published Implementing Regulation (EU) 2025/2392 (the “Implementing Regulation”), clarifying which digital products are considered “important” or “critical” under the EU Cyber Resilience Act (Regulation (EU) 2024/2847) (“CRA”).
As a reminder, the CRA will be fully applicable from 11 December 2027, but is being implemented in phases. Two key obligations take effect this year. Firstly, by 11 June 2026 EU Member States must have their notifying authority arrangements in place, and the framework for notifying conformity assessment bodies will start to apply on the same date, enabling the third party assessment procedure under the CRA to operate. Secondly, the obligations for the reporting of exploited vulnerability and severe incidents will apply from 11 September 2026, which is particularly important for all products with digital elements that are already placed on the EU market before 11 December 2027.
The Commission sought feedback on its draft technical descriptions for important and critical products with digital elements at the beginning of last year (see our March bulletin), to support the identification of products that may be subject to more stringent conformity assessment procedures than other products with digital elements.
The Implementing Regulation defines two classes of “important” products. Class I includes identity management systems, VPNs and smart home assistants. Class II covers firewalls, intrusion detection/prevention systems and tamper-resistant microprocessors. “Critical” products, subject to more rigorous oversight, include hardware devices with security boxes, smart meter gateways, and smartcards or similar devices.
The Implementing Regulation clarifies that only products whose “core functionality” matches these definitions will be subject to the CRA’s enhanced cybersecurity requirements and stricter conformity assessments - including mandatory third-party assessments for “important” products of class II and “critical” products.
Ahead of entry into force of the obligations, businesses should review their product portfolios to determine if they are likely to fall within these categories, determine the applicable conformity assessment procedure, and prepare for any compliance or reporting obligations. The publication of the Implementing Regulation marks a significant step in strengthening the EU’s digital security framework and raising standards for products with substantial security implications.
On 20 January 2026, the Commission proposed a new cybersecurity package aimed at updating and strengthening cybersecurity resilience and capabilities in the EU. The package includes a proposal for a revised Cybersecurity Act and targeted amendments to the NIS2 Directive.
The Commission’s initiative reflects a commitment to support businesses in a complex digital landscape, where cybersecurity threats are increasingly prevalent and sophisticated. The amendments are designed to address the need for clearer, more streamlined cybersecurity obligations for companies operating in the EU that are commensurate to the risks posed by cyber threats. By simplifying risk-management requirements and making compliance more accessible, especially for smaller enterprises, the EU hopes to strengthen the overall resilience of its digital infrastructure.
Changes to the Cybersecurity Act include proposals to:
The proposal attempts to harmonise requirements and obligations (such as incident notification procedures) across a regulatory framework that includes the Cybersecurity Act, the NIS2 Directive, the Cyber Resilience Act, the EU GDPR as well as other sector specific regulations. This approach complements the single-entry point for incident reporting proposed in the Digital Omnibus. Under the expanded voluntary certification framework, entities will be able to certify their overall organisation-wide ‘cyber posture’, in addition to their ICT products, services, processes and managed security services, and use this certification to obtain a presumption of conformity with the NIS2 Directive and other EU legislation.
The proposed amendments to the NIS2 Directive represent a targeted effort to ease compliance and address certain sector-specific requirements. This includes introducing a new category for small mid-cap enterprises, to reduce compliance costs and simplify compliance requirements for these entities. Measures have also been introduced to streamline the collection of data on ransomware attacks and require Member States to adopt policies for the migration to post-quantum cryptography as part of their national cybersecurity strategy.
The changes support the EU’s broader goal of a more competitive digital single market while maintaining high cybersecurity standards. Changes to the Cybersecurity Act will be applicable immediately after approval by the European Parliament and the Council of the EU. Whereas changes to the NIS2 Directive will need to be implemented by Member States within one year of receiving approval by the same institutions.
The ICO has published its response to the UK Government’s proposed Cyber Security and Resilience (Network and Information Systems) Bill (the “Bill”), which passed its second reading in the House of Commons on 6 January 2026. The ICO welcomes the Bill’s aim to strengthen the UK’s cyber resilience and recognises the importance of robust data protection for all organisations, but calls for practical guidance to help small and medium-sized businesses implement the new requirements. In its response, the ICO highlights the need for clear alignment with existing data protection laws, such as the UK GDPR, to prevent duplication and confusion, and offers to work with the government to ensure cyber security measures enhance both data protection and public trust.
Importantly, the ICO urges transparency and consultation regarding secondary legislation, which will set out many of the Bill’s detailed requirements, emphasising its desire for these regulations to be proportionate and not create unnecessary burdens.
On 2 December 2025, the CJEU delivered a landmark judgment in Case C-492/23 (X v Russmedia Digital and Inform Media Press SRL), clarifying the responsibilities of certain online marketplace operators under the EU General Data Protection Regulation (“GDPR”) when user-generated advertisements contain personal data.
The case arose after an unidentified user posted an advertisement on Russmedia Digital’s platform, which contained photographs of the applicant and her telephone number without her consent. The advertisement was subsequently copied to other websites. The applicant sought damages, arguing that the marketplace operator had failed to protect her data.
The CJEU ruled that the operator of the online marketplace was to be considered a controller of the personal data contained in the advertisements published on its platform, even though the content was provided by a user. It found the marketplace operator was not merely a passive host, but played an active role in making the personal data accessible online.
Crucially, the CJEU held that the operator must implement robust technical and organisational measures to identify advertisements containing “sensitive data” or special category data, before publication. It must verify the identity of the advertiser and confirm whether the individual whose data is being published has given explicit consent. If such consent is not obtained, or another GDPR exception does not apply, the advertisement must not be published.
The judgment also makes clear that the online marketplace could not rely on the liability exemptions for hosting providers under the e-Commerce Directive to avoid its GDPR obligations. Furthermore, the operator must take reasonable steps to prevent the unlawful copying and further publication of sensitive data from its platform.
This decision potentially significantly raises the bar for data protection compliance by online marketplaces and platforms for user-generated content, potentially requiring operators to proactively safeguard personal data and ensure that posted content does not infringe individuals’ privacy rights.
SRB has withdrawn its appeal at the EU General Court against the EDPS, ending a long-running dispute over the transfer of pseudonymised data during a winding-up procedure. The withdrawal follows an important ruling by the CJEU in September 2025, which clarified that pseudonymised data may not always be personal data. The CJEU’s decision stands as the current key authority guiding EU regulators on pseudonymised data.
For further background on this case and its implications, see our previous article here.
On 5 December 2025, the Commission issued its first fine under the Digital Services Act (“DSA”). X was fined €120 million for breaching its transparency obligations. The Commission identified infringements in three areas: deceptive design practices with the use of its “blue checkmark” verification system, transparency and accessibility shortcomings in its advertising repository, and failure to provide researcher access to public data. The fine amount took into account the nature and duration of the infringements and the extent of their impact on EU users.
X permits anyone to pay for a “verified” status without conducting meaningful verification checks, making it difficult for users to judge the authenticity of accounts and potentially exposing users to scams. The DSA prohibits online platforms from falsely representing users as verified, when no such verification has occurred. Additionally, X’s ads repository was considered to be missing critical information, and to include access barriers that undermine the purpose of such a repository, and the platform’s terms of service prohibit eligible researchers from independently accessing its public data in contravention of the DSA.
X is required to report within 60 business days on how it intends to address concerns with its verification scheme and, within 90 days, to present measures on remedying the advertising repository and researcher data access.
The decision highlights the potential for significant EU fines in the complex digital landscape, contrasting with the more hands off approach taken to date in other jurisdictions.