<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.atlaws.eu/index.php?action=history&amp;feed=atom&amp;title=Translations%3ACyber_Resilience_Act_%28CRA%29%2F3%2Fen</id>
	<title>Translations:Cyber Resilience Act (CRA)/3/en - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.atlaws.eu/index.php?action=history&amp;feed=atom&amp;title=Translations%3ACyber_Resilience_Act_%28CRA%29%2F3%2Fen"/>
	<link rel="alternate" type="text/html" href="https://wiki.atlaws.eu/index.php?title=Translations:Cyber_Resilience_Act_(CRA)/3/en&amp;action=history"/>
	<updated>2026-05-02T03:24:22Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in RI Wiki</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://wiki.atlaws.eu/index.php?title=Translations:Cyber_Resilience_Act_(CRA)/3/en&amp;diff=3179&amp;oldid=prev</id>
		<title>Jhospes: Die Seite wurde neu angelegt: „```wiki {| class=&quot;wikitable&quot; !Goals !Scope !Content&lt;ref&gt;https://www.nis.gv.at/nis-2-richtlinie.html&lt;/ref&gt; !Synergy !Consequences |- |Contain vulnerabilities in products. |Material: Products with digital elements (hardware or software products) whose use includes data connection with a device or network |Appropriate security level of products, absence of known vulnerabilities | |Violation of Art 13 and 14 CRA; up to €15,000,000 or up to 2.5% of the world…“</title>
		<link rel="alternate" type="text/html" href="https://wiki.atlaws.eu/index.php?title=Translations:Cyber_Resilience_Act_(CRA)/3/en&amp;diff=3179&amp;oldid=prev"/>
		<updated>2025-06-03T09:54:50Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „```wiki {| class=&amp;quot;wikitable&amp;quot; !Goals !Scope !Content&amp;lt;ref&amp;gt;https://www.nis.gv.at/nis-2-richtlinie.html&amp;lt;/ref&amp;gt; !Synergy !Consequences |- |Contain vulnerabilities in products. |Material: Products with digital elements (hardware or software products) whose use includes data connection with a device or network |Appropriate security level of products, absence of known vulnerabilities | |Violation of Art 13 and 14 CRA; up to €15,000,000 or up to 2.5% of the world…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;```wiki&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Goals&lt;br /&gt;
!Scope&lt;br /&gt;
!Content&amp;lt;ref&amp;gt;https://www.nis.gv.at/nis-2-richtlinie.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
!Synergy&lt;br /&gt;
!Consequences&lt;br /&gt;
|-&lt;br /&gt;
|Contain vulnerabilities in products.&lt;br /&gt;
|Material: Products with digital elements (hardware or software products) whose use includes data connection with a device or network&lt;br /&gt;
|Appropriate security level of products, absence of known vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
|Violation of Art 13 and 14 CRA; up to €15,000,000 or up to 2.5% of the worldwide annual turnover of the previous year.&lt;br /&gt;
|-&lt;br /&gt;
|Ensure security throughout the entire lifecycle of a product.&lt;br /&gt;
|Personal: Manufacturers, dealers, and importers&lt;br /&gt;
|Restoration to factory condition must (generally) be possible.&lt;br /&gt;
|Security of processing (Art 32 GDPR), data protection by design and by default (Art 25 GDPR)&lt;br /&gt;
|Violation of other obligations; up to €10,000,000 or 2% of the worldwide annual turnover of the previous year.&lt;br /&gt;
|-&lt;br /&gt;
|Create conditions enabling users to consider cybersecurity.&lt;br /&gt;
|&lt;br /&gt;
|Security assessments depending on security class&lt;br /&gt;
|Requirements of the AI Regulation (Art 6 in conjunction with 15) for high-risk AI systems&lt;br /&gt;
|Incomplete information; up to €5,000,000 or 1% of the previous year&amp;#039;s turnover&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
```&lt;/div&gt;</summary>
		<author><name>Jhospes</name></author>
	</entry>
</feed>