|
Cybersecurity Law No. 7545 Entered into Force on 19 March 2025. The Law Contains Regulations Regarding the Prevention of Cyber Threats and the Protection of Critical Infrastructures 1. Cybersecurity Directorate The Cybersecurity Directorate (“Directorate”) was established by Presidential Decree No. 177, which was published in the Official Gazette on 8 January 2025. With the enactment of the Law, the scope of duties, responsibilities, and powers of the Directorate have been defined. Cybersecurity Audit and Incident Response Mechanisms to be Carried Out by the Directorate:
2. Service Providers Within the Scope of the Law The Law also defines the scope of duties and responsibilities of those who provide services, collect or process data, and carry out similar activities through the use of information systems:
3. Cybersecurity Council The Law provides a detailed regulation of the establishment, structure and powers of the Cybersecurity Council (“Council”). Composed of the President, relevant ministers, and senior officials, the Council undertakes key responsibilities such as determining cybersecurity policies, formulating strategies and action plans, identifying critical infrastructure sectors, and planning sector-specific incentives. In addition, the Council may establish commissions and working groups when necessary to carry out technical-level studies and involve relevant experts in the process. 4. Criminal Provisions and Sanctions The Cybersecurity Law includes criminal sanctions aimed at enhancing deterrence against cyber threats. Accordingly:
5. Regulations on Cybersecurity Products and Companies The Law subjects the export of cybersecurity products, software, and services to specific rules. The export process must be conducted in accordance with the procedures and principles determined by the Directorate, and Directorate approval must be obtained for products subject to authorization. Additionally, companies operating in the field of cybersecurity are required to notify the Directorate of any mergers, demergers, share transfers, and sales transactions. If such transactions result in a change of direct or indirect control over the company, the change shall be subject to the approval of the Directorate. Transactions carried out without such approval shall be deemed null and void. 6. Compliance and Transition Process The Law provides for specific transition processes to ensure that existing cybersecurity systems align with the new regulations.
The Law defines the duties and responsibilities of the Directorate and relevant institutions, regulating mechanisms for risk analysis, intelligence, and oversight against cyber threats. Furthermore, it establishes the scope of cybersecurity regulations, ensuring that institutions take necessary precautions and that a coordinated structure is formed to counter digital threats. You may access the relevant Law through this link (only avaliable in Turkish). |