Lawful interception under EECC
Article 40 EECC plus national implementation. Capacity, audit, transparency reports and judicial oversight.
NIS2, GDPR, ePrivacy for telecom operators, ISPs, and network infrastructure
One business day reply. Clear next steps and indicative pricing.
From national MNOs to MVNOs, ISPs, satellite and number-independent communications. Each profile triggers a different EECC and NIS2 scope.
Spectrum licensing, numbering, lawful interception, BEREC reporting.
Wholesale contracts, switching, end-user rights, billing transparency.
Net neutrality, traffic management transparency, USO, complaint handling.
WhatsApp-style services. ePrivacy and CSAM obligations expanded to NIICS.
Audiovisual media, geo-blocking, content moderation, NIS2 essential entity.
Co-location, dark fibre, supply-chain assurance, NCCS.
Multiple regimes interlock. We sequence them around your operating cadence.
Authorisation, universal service, end-user rights, interoperability, BEREC oversight.
Risk management, 24h/72h reporting, supply-chain assurance, board accountability.
Confidentiality of communications, traffic and location data, cookies, unsolicited marketing.
Roam-Like-At-Home, wholesale caps, quality-of-service transparency to end users.
Stricter consent for cookies and electronic communications. Extends to NIICS providers.
Network optimisation, fraud detection, customer service AI as high-risk where applicable.
Detection orders, reporting and removal obligations. Significant impact on encrypted services.
If you host third-party content or run an online intermediary, DSA Articles 16 and 30 apply.
Article 40 EECC plus national implementation. Capacity, audit, transparency reports and judicial oversight.
ePrivacy Article 5 plus national retention regimes. CJEU has limited bulk retention; targeted retention remains.
WhatsApp-style services pulled into ePrivacy. Encryption versus detection orders an open battleground.
Most-fined GDPR area for telcos. Consent management platforms still mis-implementing across the EU.
Network equipment vendors must be assessed. Some Member States have country-specific bans on high-risk vendors.
BEREC zero-rating decisions reshape commercial offers. Transparency reports must be published annually.
General and individual authorisation, end-user terms, USO calculation, BEREC annual reports.
Entity classification, ISMS aligned with ISO 27001 and IEC 62443, incident reporting, supply-chain due diligence.
Consent management platform, traffic and location data lawful basis, cookie register, marketing automation review.
Capacity build, judicial oversight, transparency reporting, technical audit support.
Subscriber data minimisation, retention, CDR governance, customer rights workflow, breach response.
Network optimisation, fraud detection, customer-service AI: conformity, human oversight, post-market monitoring.
Notice-and-action, trader verification, statement-of-reasons for online intermediary services run by telcos.
Detection orders, reporting flows, age verification, balancing encryption and child protection.
Senior advisor with telco experience, regulator liaison, board reporting, programme stewardship.
Eight questions about your authorisation, network footprint and services. Get an indicative obligations map across EECC, NIS2, ePrivacy, AI Act and DSA.
Run obligations mapper~ 4 MINTelecommunications providers are listed in NIS2 Annex I as essential entities (digital infrastructure sub-sector). Risk management, 24h/72h reporting and board accountability apply regardless of size for this category.
ePrivacy is lex specialis for electronic communications. It governs traffic and location data, cookies, and unsolicited marketing. GDPR applies in parallel for personal data not specifically covered by ePrivacy.
It replaces the 2002 Directive with a regulation that applies directly in all Member States. Stricter consent for cookies, expanded scope to NIICS providers, and harmonised enforcement. Application targeted for 2026.
Yes. The EECC and ePrivacy now cover NIICS. CSAM Regulation extends detection obligations. We help NIICS providers map obligations across the four regimes.
Article 40 EECC plus national implementation governs lawful interception. We help build the technical and procedural capacity, document judicial oversight, and produce transparency reports.
Telcos at scale almost always need a DPO under GDPR Article 37. We provide a senior DPO with telecom-specific experience, named to your national DPA, with retainer-based programme support.
Network optimisation, fraud detection and customer-service AI may fall under Annex III high-risk categories. Conformity assessment, human oversight and post-market monitoring obligations apply.
Yes. We prepare the BEREC reports (transparency, traffic management, end-user rights, USO), coordinate with the national regulator, and align with the BEREC opinion calendar.
Scoping, ISMS, supply-chain and incident reporting for essential entities.
Open practice →GDPR and ePrivacy programme for subscriber data, cookies and marketing.
Open practice →ISMS, ISO 27001, IEC 62443 and OT security for network infrastructure.
Open practice →Typical outcomes: NIS2 essential entity roadmap, ePrivacy gaps closed, CERT reporting procedures.