{"id":1030,"date":"2023-05-19T04:35:31","date_gmt":"2023-05-19T04:35:31","guid":{"rendered":"https:\/\/www.cyberresilienceact.eu\/?page_id=1030"},"modified":"2025-01-17T00:56:16","modified_gmt":"2025-01-17T00:56:16","slug":"compliance-matrix","status":"publish","type":"page","link":"https:\/\/www.cyberresilienceact.eu\/ja\/compliance-matrix\/","title":{"rendered":"Compliance matrix"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1030\" class=\"elementor elementor-1030\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69b1475 e-flex e-con-boxed e-con e-parent\" data-id=\"69b1475\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-da5945c e-con-full e-flex e-con e-child\" data-id=\"da5945c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-703dfb8 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"703dfb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30fb\u30c1\u30a7\u30c3\u30af\u30ea\u30b9\u30c8<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e028d7 elementor-widget elementor-widget-text-editor\" data-id=\"3e028d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u30c7\u30fc\u30bf\u3092\u4fdd\u8b77\u3057\u3001\u8106\u5f31\u6027\u3092\u53d6\u308a\u9664\u304d\u3001\u8105\u5a01\u306b\u5099\u3048\u308b\u3002\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5\u6e96\u62e0\u30c1\u30a7\u30c3\u30af\u30ea\u30b9\u30c8\u3067\u3001\u3042\u306a\u305f\u306e\u4f1a\u793e\u3001\u88fd\u54c1\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u304cCRA\u306b\u5bfe\u5fdc\u3057\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3057\u3088\u3046\uff01<\/p><p>\u8fc5\u901f\u306a\u5bfe\u5fdc\u3068\u671f\u9650\u5185\u306e\u6e96\u5099\u306e\u305f\u3081\u306b\u3001\u4e0d\u8db3\u3057\u3066\u3044\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u8981\u4ef6\u3092\u7279\u5b9a\u3059\u308b\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d9d0f9 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"3d9d0f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg\" class=\"attachment-large size-large wp-image-1809\" alt=\"European flag\" srcset=\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg 1024w, https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-300x200.jpg 300w, https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-768x512.jpg 768w, https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1536x1024.jpg 1536w, https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-2048x1365.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fd26aa e-con-full e-flex e-con e-child\" data-id=\"6fd26aa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7755ee elementor-widget elementor-widget-heading\" data-id=\"b7755ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u95a2\u9023\u30ea\u30f3\u30af<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5bb16e elementor-align-left elementor-widget elementor-widget-button\" data-id=\"c5bb16e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-link\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M326.612 185.391c59.747 59.809 58.927 155.698.36 214.59-.11.12-.24.25-.36.37l-67.2 67.2c-59.27 59.27-155.699 59.262-214.96 0-59.27-59.26-59.27-155.7 0-214.96l37.106-37.106c9.84-9.84 26.786-3.3 27.294 10.606.648 17.722 3.826 35.527 9.69 52.721 1.986 5.822.567 12.262-3.783 16.612l-13.087 13.087c-28.026 28.026-28.905 73.66-1.155 101.96 28.024 28.579 74.086 28.749 102.325.51l67.2-67.19c28.191-28.191 28.073-73.757 0-101.83-3.701-3.694-7.429-6.564-10.341-8.569a16.037 16.037 0 0 1-6.947-12.606c-.396-10.567 3.348-21.456 11.698-29.806l21.054-21.055c5.521-5.521 14.182-6.199 20.584-1.731a152.482 152.482 0 0 1 20.522 17.197zM467.547 44.449c-59.261-59.262-155.69-59.27-214.96 0l-67.2 67.2c-.12.12-.25.25-.36.37-58.566 58.892-59.387 154.781.36 214.59a152.454 152.454 0 0 0 20.521 17.196c6.402 4.468 15.064 3.789 20.584-1.731l21.054-21.055c8.35-8.35 12.094-19.239 11.698-29.806a16.037 16.037 0 0 0-6.947-12.606c-2.912-2.005-6.64-4.875-10.341-8.569-28.073-28.073-28.191-73.639 0-101.83l67.2-67.19c28.239-28.239 74.3-28.069 102.325.51 27.75 28.3 26.872 73.934-1.155 101.96l-13.087 13.087c-4.35 4.35-5.769 10.79-3.783 16.612 5.864 17.194 9.042 34.999 9.69 52.721.509 13.906 17.454 20.446 27.294 10.606l37.106-37.106c59.271-59.259 59.271-155.699.001-214.959z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\u6cd5\u5f8b\u3092\u8aad\u3080<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-181447b elementor-align-left elementor-widget elementor-widget-button\" data-id=\"181447b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cra-explained\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-link\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M326.612 185.391c59.747 59.809 58.927 155.698.36 214.59-.11.12-.24.25-.36.37l-67.2 67.2c-59.27 59.27-155.699 59.262-214.96 0-59.27-59.26-59.27-155.7 0-214.96l37.106-37.106c9.84-9.84 26.786-3.3 27.294 10.606.648 17.722 3.826 35.527 9.69 52.721 1.986 5.822.567 12.262-3.783 16.612l-13.087 13.087c-28.026 28.026-28.905 73.66-1.155 101.96 28.024 28.579 74.086 28.749 102.325.51l67.2-67.19c28.191-28.191 28.073-73.757 0-101.83-3.701-3.694-7.429-6.564-10.341-8.569a16.037 16.037 0 0 1-6.947-12.606c-.396-10.567 3.348-21.456 11.698-29.806l21.054-21.055c5.521-5.521 14.182-6.199 20.584-1.731a152.482 152.482 0 0 1 20.522 17.197zM467.547 44.449c-59.261-59.262-155.69-59.27-214.96 0l-67.2 67.2c-.12.12-.25.25-.36.37-58.566 58.892-59.387 154.781.36 214.59a152.454 152.454 0 0 0 20.521 17.196c6.402 4.468 15.064 3.789 20.584-1.731l21.054-21.055c8.35-8.35 12.094-19.239 11.698-29.806a16.037 16.037 0 0 0-6.947-12.606c-2.912-2.005-6.64-4.875-10.341-8.569-28.073-28.073-28.191-73.639 0-101.83l67.2-67.19c28.239-28.239 74.3-28.069 102.325.51 27.75 28.3 26.872 73.934-1.155 101.96l-13.087 13.087c-4.35 4.35-5.769 10.79-3.783 16.612 5.864 17.194 9.042 34.999 9.69 52.721.509 13.906 17.454 20.446 27.294 10.606l37.106-37.106c59.271-59.259 59.271-155.699.001-214.959z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\"><b>CRA \u89e3\u8aac<\/b><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddab10b elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ddab10b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/cyber-resilience-act\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-link\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M326.612 185.391c59.747 59.809 58.927 155.698.36 214.59-.11.12-.24.25-.36.37l-67.2 67.2c-59.27 59.27-155.699 59.262-214.96 0-59.27-59.26-59.27-155.7 0-214.96l37.106-37.106c9.84-9.84 26.786-3.3 27.294 10.606.648 17.722 3.826 35.527 9.69 52.721 1.986 5.822.567 12.262-3.783 16.612l-13.087 13.087c-28.026 28.026-28.905 73.66-1.155 101.96 28.024 28.579 74.086 28.749 102.325.51l67.2-67.19c28.191-28.191 28.073-73.757 0-101.83-3.701-3.694-7.429-6.564-10.341-8.569a16.037 16.037 0 0 1-6.947-12.606c-.396-10.567 3.348-21.456 11.698-29.806l21.054-21.055c5.521-5.521 14.182-6.199 20.584-1.731a152.482 152.482 0 0 1 20.522 17.197zM467.547 44.449c-59.261-59.262-155.69-59.27-214.96 0l-67.2 67.2c-.12.12-.25.25-.36.37-58.566 58.892-59.387 154.781.36 214.59a152.454 152.454 0 0 0 20.521 17.196c6.402 4.468 15.064 3.789 20.584-1.731l21.054-21.055c8.35-8.35 12.094-19.239 11.698-29.806a16.037 16.037 0 0 0-6.947-12.606c-2.912-2.005-6.64-4.875-10.341-8.569-28.073-28.073-28.191-73.639 0-101.83l67.2-67.19c28.239-28.239 74.3-28.069 102.325.51 27.75 28.3 26.872 73.934-1.155 101.96l-13.087 13.087c-4.35 4.35-5.769 10.79-3.783 16.612 5.864 17.194 9.042 34.999 9.69 52.721.509 13.906 17.454 20.446 27.294 10.606l37.106-37.106c59.271-59.259 59.271-155.699.001-214.959z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">EU\u306e\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3078<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-473f210 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"473f210\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInUp&quot;,&quot;animation_delay&quot;:500,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5c6f68a e-con-full e-flex e-con e-child\" data-id=\"5c6f68a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-654cdcf elementor-widget elementor-widget-spacer\" data-id=\"654cdcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d1eaa2b e-flex e-con-boxed e-con e-parent\" data-id=\"d1eaa2b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a1d6aaf e-con-full e-flex e-con e-child\" data-id=\"a1d6aaf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8ef6bb e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"b8ef6bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;tabs_justify_horizontal_mobile&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"193918651\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"hardware\" data-tab-title-id=\"e-n-tab-title-1939186511\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1939186511\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u30fb\u30e1\u30fc\u30ab\u30fc\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"software\" data-tab-title-id=\"e-n-tab-title-1939186512\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1939186512\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a\u8005\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"others\" data-tab-title-id=\"e-n-tab-title-1939186513\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1939186513\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u8f38\u5165\u696d\u8005\u3001\u8ca9\u58f2\u696d\u8005\u3001\u518d\u8ca9\u696d\u8005\u3002\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1939186511\" role=\"tabpanel\" aria-labelledby=\"hardware\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-758f34e e-con-full e-flex e-con e-child\" data-id=\"758f34e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ec820b sticky-cra e-n-tabs-mobile ha-has-bg-overlay elementor-widget elementor-widget-n-tabs\" data-id=\"8ec820b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"149717515\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"non-critical\" data-tab-title-id=\"e-n-tab-title-1497175151\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1497175151\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u91cd\u8981\u3067\u306a\u3044\u88fd\u54c1\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"manu-critical\" data-tab-title-id=\"e-n-tab-title-1497175152\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1497175152\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u91cd\u8981\u304b\u3064\u91cd\u8981\u306a\u88fd\u54c1\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1497175151\" role=\"tabpanel\" aria-labelledby=\"non-critical\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-6a8532a e-con-full e-flex e-con e-child\" data-id=\"6a8532a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-1b3dfb5 e-con-full e-flex e-con e-child\" data-id=\"1b3dfb5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ddc9524 general elementor-widget elementor-widget-heading\" data-id=\"ddc9524\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30e1\u30fc\u30ab\u30fc <u>\u975e\u91cd\u8981<\/u><b> <\/b>\u88fd\u54c1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e51505 elementor-widget elementor-widget-text-editor\" data-id=\"2e51505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u88fd\u54c1\u30e1\u30fc\u30ab\u30fc <span style=\"text-decoration: underline;\">\u306a\u3044 <\/span>\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u88fd\u54c1\u307e\u305f\u306f\u91cd\u8981\u88fd\u54c1\u30af\u30e9\u30b9\u2161\u306b\u5206\u985e\u3055\u308c\u308b\u88fd\u54c1\u306f\u3001CRA\u306e\u8981\u6c42\u4e8b\u9805\u3078\u306e\u6e96\u62e0\u3092\u81ea\u5df1\u8a55\u4fa1\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/strong>.<\/p><p>\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002 <a href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex\/#annexIII\">\u9644\u5c5e\u66f8III<\/a> \u91cd\u8981\u54c1\u76ee\u30ea\u30b9\u30c8\u306b\u3064\u3044\u3066\u306f\u540c\u898f\u5247\u3092\u53c2\u7167\u306e\u3053\u3068\u3002 <a href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex-eu\/#annexIV\">\u9644\u5c5e\u66f8IV<\/a> \u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u88fd\u54c1\u306e\u30ea\u30b9\u30c8\u306f\u3053\u3061\u3089\u3002<\/p><p><strong>Additionally, manufacturers of Important P<u>roducts Class I<\/u>\u00a0who either <\/strong><strong>\u9069\u5408 <u>\u5341\u5206\u306b<\/u> \u8abf\u548c\u3055\u308c\u305f\u57fa\u6e96 <u>\u307e\u305f\u306f<\/u> <\/strong><strong>\u5171\u901a\u4ed5\u69d8\u306b\u6e96\u62e0 <u>\u307e\u305f\u306f<\/u> <\/strong><strong>\u306f\u6b27\u5dde\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u3066\u3044\u308b\u3001 <\/strong><strong><u>can also self-assess<\/u> their compliance with the CRA&#8217;s requirements.<\/strong><\/p><p class=\"LC20lb MBeuO DKV0Md\">\u26a0\ufe0f Manufacturers of Important Products Class I who have not applied or have applied only in part to harmonised standards, common specifications or European cybersecurity certification schemes <strong><u>\u30de\u30b9\u30c8<\/u><i>\u00a0<\/i><\/strong>undergo a third party assessment (see &#8220;Important and Critical Products tab&#8221;).<\/p><p>In any case, manufacturers of non-Important Products may choose to undergo the same assessment process as Important Products, wherein compliance with the CRA is assessed by a notified body. In this case, they will need to select between two main modules, B or H, that are further described in the <strong>\u91cd\u8981\u304b\u3064\u91cd\u8981\u306a\u88fd\u54c1<\/strong> \u30bf\u30d6\u306b\u8868\u793a\u3055\u308c\u3001\u4ee5\u4e0b\u306b\u8aac\u660e\u3059\u308b\u6761\u4ef6\u3068\u306f\u7570\u306a\u308b\u6761\u4ef6\u3092\u6e80\u305f\u3059\u3082\u306e\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0193df3 elementor-widget elementor-widget-menu-anchor\" data-id=\"0193df3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a24495a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a24495a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b788e92 general elementor-widget elementor-widget-heading\" data-id=\"b788e92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff298c8 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"ff298c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"ff298c8\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-ff298c8 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"ff298c8\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the manufacturer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the manufacturer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the manufacturer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>4<\/td><td>The manufacturers shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16d8de6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"16d8de6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc0a297 general elementor-widget elementor-widget-heading\" data-id=\"dc0a297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8620cdd elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"8620cdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"8620cdd\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-8620cdd ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"8620cdd\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless\notherwise agreed between manufacturer and business user in relation to a tailor-made\nproduct with digital elements, including the possibility to reset the product to its\noriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u305f\u3089\u3001\u4fee\u6b63\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u516c\u958b\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u8106\u5f31\u6027\u306e\u8aac\u660e\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6301\u3064\u88fd\u54c1\u3092\u30e6\u30fc\u30b6\u30fc\u304c\u7279\u5b9a\u3067\u304d\u308b\u60c5\u5831\u3001\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3001\u6df1\u523b\u5ea6\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3092\u4fee\u6b63\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u660e\u78ba\u304b\u3064\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u306a\u60c5\u5831\u3092\u542b\u3080\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information,\nincluding on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u696d\u8005\u306f\u3001\u6b21\u306e\u3053\u3068\u3092\u884c\u308f\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex I - Part II<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e058b3e elementor-widget elementor-widget-menu-anchor\" data-id=\"e058b3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"declaration-of-conformity\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fa68c0 elementor-widget elementor-widget-menu-anchor\" data-id=\"3fa68c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general-docu\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-590858c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"590858c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-434ef38 general elementor-widget elementor-widget-heading\" data-id=\"434ef38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><h5 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\" style=\"letter-spacing: normal\">Information and instruction to the users<\/h5><\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41190f8 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"41190f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"41190f8\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-41190f8 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"41190f8\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the manufacturer, and the postal address, the email address or other digital contact as well as, where available, the website at which the manufacturer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the manufacturer\u2019s policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4.\u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u3001\u88fd\u54c1\u306e\u5fc5\u9808\u6a5f\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7279\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. \u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30dd\u30fc\u30c8\u306e\u7a2e\u985e\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u63d0\u4f9b\u3092\u671f\u5f85\u3067\u304d\u308b\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306e\u7d42\u4e86\u65e5\uff1b<\/p><\/td><td>Annex VI, \u00a77<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9.\u88fd\u9020\u8005\u304c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3092\u30e6\u30fc\u30b6\u30fc\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u6c7a\u5b9a\u3057\u305f\u5834\u5408\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u6240\u306b\u95a2\u3059\u308b\u60c5\u5831\u3002<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>17<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1f540e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e1f540e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af88527 general elementor-widget elementor-widget-heading\" data-id=\"af88527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36231e1 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"36231e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"36231e1\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-36231e1 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"36231e1\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30b3\u30e1\u30f3\u30c8<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the manufacturer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of manufacturer] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The manufacturer shall draw up a written EU declaration of conformity for each product with digital elements in accordance with Article 28 and keep it together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The EU declaration of conformity shall identify the product with digital elements for which it has been drawn up. A copy of the EU declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part I, \u00a74.2<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b5c9bd elementor-widget elementor-widget-menu-anchor\" data-id=\"1b5c9bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"technical-documentation\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7341c2a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7341c2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1990ef2 general elementor-widget elementor-widget-heading\" data-id=\"1990ef2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a57d48f elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"a57d48f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"a57d48f\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-a57d48f ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"a57d48f\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30b3\u30e1\u30f3\u30c8<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3001\u8abf\u6574\u3055\u308c\u305f\u8106\u5f31\u6027\u958b\u793a\u65b9\u91dd\u3001\u8106\u5f31\u6027\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306e\u9023\u7d61\u5148\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u8a3c\u62e0\u3001\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5b89\u5168\u306a\u914d\u5e03\u306e\u305f\u3081\u306b\u9078\u629e\u3055\u308c\u305f\u6280\u8853\u7684\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u8aac\u660e\u3092\u542b\u3080\u3001\u88fd\u9020\u8005\u306b\u3088\u3063\u3066\u5b9f\u65bd\u3055\u308c\u305f\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306e\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-935292f elementor-widget elementor-widget-menu-anchor\" data-id=\"935292f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"authorities\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83f8897 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"83f8897\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-005b09b general elementor-widget elementor-widget-heading\" data-id=\"005b09b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Reporting requirements<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c270839 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"c270839\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"c270839\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-c270839 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"c270839\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30b3\u30e1\u30f3\u30c8<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>\u88fd\u9020\u696d\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3001\u304a\u3088\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30ea\u30b9\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>\u88fd\u9020\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3084\u3001\u305d\u306e\u3088\u3046\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u30cb\u30a2\u30df\u30b9\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1497175152\" role=\"tabpanel\" aria-labelledby=\"manu-critical\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-98f8e85 e-con-full e-flex e-con e-child\" data-id=\"98f8e85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e33ed67 general elementor-widget elementor-widget-heading\" data-id=\"e33ed67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30e1\u30fc\u30ab\u30fc <u>\u91cd\u8981<\/u> \u305d\u3057\u3066 <u>\u30af\u30ea\u30c6\u30a3\u30ab\u30eb<\/u> \u88fd\u54c1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ac80e1 elementor-widget elementor-widget-text-editor\" data-id=\"3ac80e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b><span style=\"text-decoration: underline;\">Manufacturers of Important Products Class I<\/span>\u00a0(\u81ea\u793e\u88fd\u54c1\u304c\u306a\u3044\u5834\u5408 <span style=\"text-decoration: underline;\">\u5341\u5206\u306b<\/span> conform to harmonized standards or common specification or have not been certified with a European Cybersecurity Certification), <u>Important Products<\/u><\/b><span style=\"font-weight: bold; color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\"><u>\u00a0Class II\u00a0and Critical Products<\/u> \u30de\u30b9\u30c8<\/span><b style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\">\u00a0undergo an external assessment process conducted by a notified body responsible for verifying the compliance of the products with the requirements of the CRA.<\/b><\/p><p>\u26a0\ufe0f As of November 2024, no notified body has been announced.<\/p><p>\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 <a href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex\/#annexIII\">\u9644\u5c5e\u66f8III<\/a> \u91cd\u8981\u54c1\u76ee\u30ea\u30b9\u30c8\u306b\u3064\u3044\u3066\u306f\u3001\u898f\u5247\u306e\u9805\u3092\u53c2\u7167\u306e\u3053\u3068\u3002<\/p><p><b><span style=\"text-decoration: underline;\">Additionally<\/span><u>,<\/u><span style=\"text-decoration: underline;\"> manufacturers of Critical Products<\/span> \u304c\u5fc5\u8981\u3068\u306a\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002 <em>\u4eca\u5f8c\u00a0<\/em> to obtain a European cybersecurity certificate\u00a0<\/b><span style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\"><b>at assurance level at least \u2018substantial\u2019\u00a0<\/b><\/span><b style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\">instead of undergoing the CRA&#8217;s dedicated assessment modules (see below); this is according to article 27(9). However, as of November 2024, the Commission has not yet adopted delegated acts that are required to determine which products are concerned and what certification scheme must be followed. In the absence of such delegated acts, manufacturers of Critical Products can follow the same certification procedures as Important Products.<\/b><\/p><p>\u26a0\ufe0f Once delegated acts are published and we know more about these certifications schemes, this web page will be updated.<\/p><p>\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 <a href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex\/#annexIV\">\u9644\u5c5e\u66f8IV<\/a> \u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u30fb\u30d7\u30ed\u30c0\u30af\u30c8\u306e\u30ea\u30b9\u30c8\u306b\u3064\u3044\u3066\u306f\u3001\u898f\u5236\u306e\u9805\u3092\u53c2\u7167\u306e\u3053\u3068\u3002<\/p><h6>\u00a0<\/h6><p><strong>What are the paths to third party assessment ?<\/strong><\/p><p>\u91cd\u8981\u30fb\u91cd\u8981\u88fd\u54c1\u306e\u30e1\u30fc\u30ab\u30fc\u306f\u3001\u81ea\u793e\u88fd\u54c1\u306e\u8a55\u4fa1\u306b\u3064\u3044\u3066\u3001\u30e2\u30b8\u30e5\u30fc\u30ebB\uff08\u307e\u305f\u306f\u30e2\u30b8\u30e5\u30fc\u30ebB\uff0b\u30e2\u30b8\u30e5\u30fc\u30ebC\uff09\u3068\u30e2\u30b8\u30e5\u30fc\u30ebH\u306e2\u3064\u306e\u7d4c\u8def\u304b\u3089\u81ea\u7531\u306b\u9078\u629e\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/p><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"130\"><span class=\"ng-star-inserted\" data-start-index=\"130\">Module H: Conformity Based on Full Quality Assurance<\/span><\/div><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"130\"><span class=\"ng-star-inserted\" style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\" data-start-index=\"202\">Module H is a comprehensive assessment path which requires the establishment and maintenance of a robust <u>\u54c1\u8cea\u30b7\u30b9\u30c6\u30e0 <\/u>by the manufacturer. <\/span><span class=\"ng-star-inserted\" style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\" data-start-index=\"382\"><span class=\"ng-star-inserted\" style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\" data-start-index=\"382\">This quality system must include documented policies, procedures, and instructions meticulously outlining every stage of the product lifecycle, from design and development to production and vulnerability handling.<br \/><\/span><\/span><\/div><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"130\"><div data-start-index=\"1003\">\u00a0<\/div><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"1003\"><span class=\"ng-star-inserted\" data-start-index=\"1003\">Module B: EU-Type Examination<\/span><\/div><\/div><div data-start-index=\"130\"><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1032\"><span class=\"ng-star-inserted\" data-start-index=\"1105\">While Module B doesn&#8217;t mandate a full-fledged quality system like Module H, manufacturers are still obligated to demonstrate that their technical design and development processes, along with vulnerability handling procedures, meet the CRA&#8217;s requirements.<\/span><span class=\"ng-star-inserted\" data-start-index=\"1419\">\u00a0<\/span><\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\"><span class=\"ng-star-inserted\" data-start-index=\"1546\"> The primary focus of Module B, though, is the <u>examination of a representative specimen<\/u> (a combination of production and design type) of the product by a notified body. <\/span><span class=\"ng-star-inserted\" data-start-index=\"1705\">This examination aims to verify that the specimen aligns with the technical documentation and adheres to the relevant harmonized standards or technical specifications detailed in the documentation.<\/span><\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\">\u00a0<\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\"><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\">Module B+ Module C<\/span><\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\"><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\">Once a product type is certified under module B, other products of the same type can be certified through module C, which is a certification path that does not require for a new assessment by a notified body, providing that the new product is of the same <\/span><i style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\">type<\/i><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\"> as the one certified via module B.<\/span><\/div><\/div><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"130\"><p>\u00a0<\/p><p><b>\u3057\u305f\u304c\u3063\u3066\u3001\u30e2\u30b8\u30e5\u30fc\u30ebB\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u81ea\u4f53\u306b\u7126\u70b9\u3092\u5f53\u3066\u308b\u306e\u306b\u5bfe\u3057\u3001\u30e2\u30b8\u30e5\u30fc\u30ebH\u306f\u3001CRA\u306b\u6e96\u62e0\u3059\u308b\u305f\u3081\u306e\u57fa\u790e\u3068\u3057\u3066\u3001\u88fd\u9020\u8005\u306e\u30d7\u30ed\u30bb\u30b9\uff08\u3059\u306a\u308f\u3061\u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\uff09\u306b\u6ce8\u76ee\u3059\u308b\u3002<\/b><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97bce7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"97bce7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48a50b0 elementor-widget elementor-widget-heading\" data-id=\"48a50b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u9053\u3092\u9078\u3076<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fcfdff e-n-tabs-mobile ha-has-bg-overlay elementor-widget elementor-widget-n-tabs\" data-id=\"7fcfdff\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"134020607\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1340206071\" data-tab-title-id=\"e-n-tab-title-1340206071\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1340206071\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30e2\u30b8\u30e5\u30fc\u30ebB\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1340206072\" data-tab-title-id=\"e-n-tab-title-1340206072\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1340206072\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30e2\u30b8\u30e5\u30fc\u30ebC\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1340206073\" data-tab-title-id=\"e-n-tab-title-1340206073\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1340206073\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30e2\u30b8\u30e5\u30fc\u30ebH\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1340206071\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1340206071\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-fe859fb e-con-full e-flex e-con e-child\" data-id=\"fe859fb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b98f742 elementor-widget elementor-widget-menu-anchor\" data-id=\"b98f742\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02699be elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"02699be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad1ebd9 general elementor-widget elementor-widget-heading\" data-id=\"ad1ebd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec45dd6 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"ec45dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"ec45dd6\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-ec45dd6 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"ec45dd6\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the manufacturer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the manufacturer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the manufacturer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>4<\/td><td>The manufacturers shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-907e37e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"907e37e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a9a670 general elementor-widget elementor-widget-heading\" data-id=\"9a9a670\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-559fc11 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"559fc11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"559fc11\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-559fc11 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"559fc11\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless\notherwise agreed between manufacturer and business user in relation to a tailor-made\nproduct with digital elements, including the possibility to reset the product to its\noriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u305f\u3089\u3001\u4fee\u6b63\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u516c\u958b\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u8106\u5f31\u6027\u306e\u8aac\u660e\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6301\u3064\u88fd\u54c1\u3092\u30e6\u30fc\u30b6\u30fc\u304c\u7279\u5b9a\u3067\u304d\u308b\u60c5\u5831\u3001\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3001\u6df1\u523b\u5ea6\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3092\u4fee\u6b63\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u660e\u78ba\u304b\u3064\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u306a\u60c5\u5831\u3092\u542b\u3080\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information,\nincluding on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u696d\u8005\u306f\u3001\u6b21\u306e\u3053\u3068\u3092\u884c\u308f\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex I - Part II<\/td><td><\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b2abb8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2b2abb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e612952 general elementor-widget elementor-widget-heading\" data-id=\"e612952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Information and instruction to the users<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eabcdb5 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"eabcdb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"eabcdb5\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-eabcdb5 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"eabcdb5\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the manufacturer, and the postal address, the email address or other digital contact as well as, where available, the website at which the manufacturer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the manufacturer\u2019s policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4.\u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u3001\u88fd\u54c1\u306e\u5fc5\u9808\u6a5f\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7279\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. \u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30dd\u30fc\u30c8\u306e\u7a2e\u985e\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u63d0\u4f9b\u3092\u671f\u5f85\u3067\u304d\u308b\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306e\u7d42\u4e86\u65e5\uff1b<\/p><\/td><td>Annex VI, \u00a77<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9.\u88fd\u9020\u8005\u304c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3092\u30e6\u30fc\u30b6\u30fc\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u6c7a\u5b9a\u3057\u305f\u5834\u5408\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u6240\u306b\u95a2\u3059\u308b\u60c5\u5831\u3002<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>49<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>'-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-019c28e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"019c28e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3a5a6a general elementor-widget elementor-widget-heading\" data-id=\"f3a5a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b4597 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"28b4597\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"28b4597\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-28b4597 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"28b4597\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the manufacturer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>mandatory<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of manufacturer] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The manufacturer shall draw up a written EU declaration of conformity for each product with digital elements and keep it together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The EU declaration of conformity shall identify the product with digital elements for which it has been drawn up. A copy of the EU declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part II, \u00a710 and Part III, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab3bc2c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ab3bc2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8809098 general elementor-widget elementor-widget-heading\" data-id=\"8809098\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7174693 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"7174693\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"7174693\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-7174693 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"7174693\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3001\u8abf\u6574\u3055\u308c\u305f\u8106\u5f31\u6027\u958b\u793a\u65b9\u91dd\u3001\u8106\u5f31\u6027\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306e\u9023\u7d61\u5148\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u8a3c\u62e0\u3001\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5b89\u5168\u306a\u914d\u5e03\u306e\u305f\u3081\u306b\u9078\u629e\u3055\u308c\u305f\u6280\u8853\u7684\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u8aac\u660e\u3092\u542b\u3080\u3001\u88fd\u9020\u8005\u306b\u3088\u3063\u3066\u5b9f\u65bd\u3055\u308c\u305f\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306e\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>self-Assessed by notified body<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9f75f6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f9f75f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0be44e5 general elementor-widget elementor-widget-heading\" data-id=\"0be44e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Reporting requirements\u200b<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9daeba1 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"9daeba1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"9daeba1\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-9daeba1 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"9daeba1\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>\u88fd\u9020\u696d\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3001\u304a\u3088\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30ea\u30b9\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>\u88fd\u9020\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3084\u3001\u305d\u306e\u3088\u3046\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u30cb\u30a2\u30df\u30b9\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d848d76 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d848d76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a59f2b8 general elementor-widget elementor-widget-heading\" data-id=\"a59f2b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u8a8d\u8a3c\u7533\u8acb\u66f8\u306e\u63d0\u51fa<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6cf697 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"e6cf697\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"e6cf697\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-e6cf697 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"e6cf697\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>3<\/td><td>The manufacturer shall lodge an application for assessment of its quality system with the notified body of its choice, for the products with digital elements concerned. The application shall include:<\/td><td>Annex VIII, Part II, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> the name and address of the manufacturer and, if the application is lodged by the authorised representative, the name and address of that authorised representative;<\/p><\/td><td>Annex VIII, Part II, \u00a73.1<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> a written declaration that the same application has not been lodged with any other notified body;<\/p><\/td><td>Annex VIII, Part II, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">the technical documentation, which shall make it possible to assess the conformity of the product with digital elements with the applicable essential cybersecurity requirements as set out in Part I of Annex I and the manufacturer\u2019s vulnerability handling processes set out in Part II of Annex I and shall include an adequate analysis and assessment of the risks. The technical documentation shall specify the applicable requirements and cover, as far as relevant for the assessment, the design, manufacture and operation of the product with digital elements. The technical documentation shall contain, wherever applicable, at least the elements set out in Annex VII;<\/p><\/td><td>Annex VIII, Part II, \u00a73.3<\/td><td>-<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> the supporting evidence for the adequacy of the technical design and development solutions and vulnerability handling processes. This supporting evidence shall mention any documents that have been used, in particular where the relevant harmonised standards or technical specifications have not been applied in full. The supporting evidence shall include, where necessary, the results of tests carried out by the appropriate laboratory of the manufacturer, or by another testing laboratory on its behalf and under its responsibility.<\/p><\/td><td>Annex VIII, Part II, \u00a73.4<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td>The manufacturer shall inform the notified body that holds the technical documentation relating to the EU-type examination certificate of all modifications to the approved type and the vulnerability handling processes that may affect the conformity with the essential cybersecurity requirements set out in Annex I, or the conditions for validity of the certificate. Such modifications shall require additional approval in the form of an addition to the original EU-type examination certificate.<\/td><td>Annex VIII, Part II, \u00a77<\/td><td>-<\/td><td><\/td><\/tr><tr><td>9<\/td><td>The manufacturer shall keep a copy of the EU-type examination certificate, its annexes and additions together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer.<\/td><td>Annex VIII, Part II, \u00a710<\/td><td>-<\/td><td><\/td><\/tr><tr><td>1<\/td><td>EU-type examination is the part of a conformity assessment procedure in which a notified body examines the technical design and development of a product with digital elements and the vulnerability handling processes put in place by the manufacturer, and attests that a product with digital elements meets the essential cybersecurity requirements set out in Part I of Annex I and that the manufacturer meets the essential cybersecurity requirements set out in Part II of Annex I.<\/td><td>Annex VIII, Part II, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td>EU-type examination shall be carried out by assessing the adequacy of the technical design and development of the product with digital elements through the examination of the technical documentation and supporting evidence referred to in point 3, and the examination of specimens of one or more critical parts of the product (combination of production type and design type).<\/td><td>Annex VIII, Part II, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1340206072\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1340206072\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-348fa96 e-con-full e-flex e-con e-child\" data-id=\"348fa96\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-757c21e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"757c21e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e8abf8 general elementor-widget elementor-widget-heading\" data-id=\"5e8abf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f87a3b3 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"f87a3b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"f87a3b3\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-f87a3b3 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"f87a3b3\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the manufacturer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the manufacturer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the manufacturer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>4<\/td><td>The manufacturers shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2a9b41 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c2a9b41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbbe7ac general elementor-widget elementor-widget-heading\" data-id=\"dbbe7ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d03dda9 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"d03dda9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"d03dda9\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-d03dda9 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"d03dda9\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless\notherwise agreed between manufacturer and business user in relation to a tailor-made\nproduct with digital elements, including the possibility to reset the product to its\noriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u305f\u3089\u3001\u4fee\u6b63\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u516c\u958b\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u8106\u5f31\u6027\u306e\u8aac\u660e\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6301\u3064\u88fd\u54c1\u3092\u30e6\u30fc\u30b6\u30fc\u304c\u7279\u5b9a\u3067\u304d\u308b\u60c5\u5831\u3001\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3001\u6df1\u523b\u5ea6\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3092\u4fee\u6b63\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u660e\u78ba\u304b\u3064\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u306a\u60c5\u5831\u3092\u542b\u3080\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information,\nincluding on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>16<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u696d\u8005\u306f\u3001\u6b21\u306e\u3053\u3068\u3092\u884c\u308f\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex I - Part II<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4440e5b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4440e5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4e1812 general elementor-widget elementor-widget-heading\" data-id=\"d4e1812\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><h5 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\" style=\"letter-spacing: normal\">Information and instruction to the users<\/h5><\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6a25b7 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"c6a25b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"c6a25b7\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-c6a25b7 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"c6a25b7\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the manufacturer, and the postal address, the email address or other digital contact as well as, where available, the website at which the manufacturer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the manufacturer\u2019s policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4.\u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u3001\u88fd\u54c1\u306e\u5fc5\u9808\u6a5f\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7279\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. \u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30dd\u30fc\u30c8\u306e\u7a2e\u985e\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u63d0\u4f9b\u3092\u671f\u5f85\u3067\u304d\u308b\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306e\u7d42\u4e86\u65e5\uff1b<\/p><\/td><td>Annex VI, \u00a77<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>Self-written, based on a previously received EU-type certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9.\u88fd\u9020\u8005\u304c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3092\u30e6\u30fc\u30b6\u30fc\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u6c7a\u5b9a\u3057\u305f\u5834\u5408\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u6240\u306b\u95a2\u3059\u308b\u60c5\u5831\u3002<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>17<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac07958 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ac07958\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa81dc9 general elementor-widget elementor-widget-heading\" data-id=\"fa81dc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a919966 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"a919966\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"a919966\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-a919966 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"a919966\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the manufacturer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>mandatory<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of manufacturer] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The manufacturer shall draw up a written EU declaration of conformity for each product with digital elements and keep it together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The EU declaration of conformity shall identify the product with digital elements for which it has been drawn up. A copy of the EU declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part II, \u00a710 and Part III, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17fa747 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"17fa747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2084ce6 general elementor-widget elementor-widget-heading\" data-id=\"2084ce6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d6bce elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"41d6bce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"41d6bce\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-41d6bce ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"41d6bce\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3001\u8abf\u6574\u3055\u308c\u305f\u8106\u5f31\u6027\u958b\u793a\u65b9\u91dd\u3001\u8106\u5f31\u6027\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306e\u9023\u7d61\u5148\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u8a3c\u62e0\u3001\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5b89\u5168\u306a\u914d\u5e03\u306e\u305f\u3081\u306b\u9078\u629e\u3055\u308c\u305f\u6280\u8853\u7684\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u8aac\u660e\u3092\u542b\u3080\u3001\u88fd\u9020\u8005\u306b\u3088\u3063\u3066\u5b9f\u65bd\u3055\u308c\u305f\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306e\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>Self-written, based on a previously received EU-type examination certificate for the same type of product (module B)<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69e6af2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"69e6af2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7da34ec general elementor-widget elementor-widget-heading\" data-id=\"7da34ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Reporting requirements\u200b<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-850a481 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"850a481\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"850a481\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-850a481 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"850a481\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>\u88fd\u9020\u696d\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3001\u304a\u3088\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30ea\u30b9\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>\u88fd\u9020\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3084\u3001\u305d\u306e\u3088\u3046\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u30cb\u30a2\u30df\u30b9\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1340206073\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1340206073\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-bed330e e-con-full e-flex e-con e-child\" data-id=\"bed330e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0eaf0c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c0eaf0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e55021 general elementor-widget elementor-widget-heading\" data-id=\"5e55021\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f3af77 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"1f3af77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"1f3af77\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-1f3af77 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"1f3af77\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the manufacturer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the manufacturer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the manufacturer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>4<\/td><td>The manufacturers shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29b90c0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"29b90c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-586db66 general elementor-widget elementor-widget-heading\" data-id=\"586db66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af25c6 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"6af25c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"6af25c6\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-6af25c6 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"6af25c6\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless\notherwise agreed between manufacturer and business user in relation to a tailor-made\nproduct with digital elements, including the possibility to reset the product to its\noriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>Self-Assessed by notified body - must be justified by clear written policies, procedures and instructions, with regards to quality system.assessment<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u305f\u3089\u3001\u4fee\u6b63\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u516c\u958b\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u8106\u5f31\u6027\u306e\u8aac\u660e\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6301\u3064\u88fd\u54c1\u3092\u30e6\u30fc\u30b6\u30fc\u304c\u7279\u5b9a\u3067\u304d\u308b\u60c5\u5831\u3001\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3001\u6df1\u523b\u5ea6\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3092\u4fee\u6b63\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u660e\u78ba\u304b\u3064\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u306a\u60c5\u5831\u3092\u542b\u3080\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information,\nincluding on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>16<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u696d\u8005\u306f\u3001\u6b21\u306e\u3053\u3068\u3092\u884c\u308f\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex I - Part II<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b65f8ef elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b65f8ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbad80b general elementor-widget elementor-widget-heading\" data-id=\"bbad80b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><span style=\"color: var( --e-global-color-primary );font-size: 2vw;text-align: var(--text-align);background-color: var( --e-global-color-2b4a467 )\">Information and instruction to the users<\/span><\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c1a903 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"3c1a903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"3c1a903\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-3c1a903 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"3c1a903\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the manufacturer, and the postal address, the email address or other digital contact as well as, where available, the website at which the manufacturer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the manufacturer\u2019s policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4.\u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u3001\u88fd\u54c1\u306e\u5fc5\u9808\u6a5f\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7279\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. \u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30dd\u30fc\u30c8\u306e\u7a2e\u985e\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u63d0\u4f9b\u3092\u671f\u5f85\u3067\u304d\u308b\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306e\u7d42\u4e86\u65e5\uff1b<\/p><\/td><td>Annex VI, \u00a77<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9.\u88fd\u9020\u8005\u304c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3092\u30e6\u30fc\u30b6\u30fc\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u6c7a\u5b9a\u3057\u305f\u5834\u5408\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u6240\u306b\u95a2\u3059\u308b\u60c5\u5831\u3002<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>49<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>'-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35fba69 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"35fba69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2291490 general elementor-widget elementor-widget-heading\" data-id=\"2291490\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fd24e4 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"8fd24e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"8fd24e4\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-8fd24e4 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"8fd24e4\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the manufacturer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>mandatory<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of manufacturer] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The manufacturer shall draw up a written EU declaration of conformity for each product with digital elements and keep it together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The EU declaration of conformity shall identify the product with digital elements for which it has been drawn up. A copy of the EU declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part II, \u00a710 and Part III, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2474d1e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2474d1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13b8383 general elementor-widget elementor-widget-heading\" data-id=\"13b8383\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfd329e elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"cfd329e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"cfd329e\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-cfd329e ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"cfd329e\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3001\u8abf\u6574\u3055\u308c\u305f\u8106\u5f31\u6027\u958b\u793a\u65b9\u91dd\u3001\u8106\u5f31\u6027\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306e\u9023\u7d61\u5148\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u8a3c\u62e0\u3001\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5b89\u5168\u306a\u914d\u5e03\u306e\u305f\u3081\u306b\u9078\u629e\u3055\u308c\u305f\u6280\u8853\u7684\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u8aac\u660e\u3092\u542b\u3080\u3001\u88fd\u9020\u8005\u306b\u3088\u3063\u3066\u5b9f\u65bd\u3055\u308c\u305f\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306e\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>self-Assessed by notified body<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab85b8b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ab85b8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03fb463 general elementor-widget elementor-widget-heading\" data-id=\"03fb463\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Reporting requirements\u200b<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-599af54 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"599af54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"599af54\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-599af54 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"599af54\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>\u88fd\u9020\u696d\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3001\u304a\u3088\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30ea\u30b9\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>\u88fd\u9020\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3084\u3001\u305d\u306e\u3088\u3046\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u30cb\u30a2\u30df\u30b9\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f51546a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f51546a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66a55c2 general elementor-widget elementor-widget-heading\" data-id=\"66a55c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u8a8d\u8a3c\u7533\u8acb<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d46917b elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"d46917b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"d46917b\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-d46917b ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"d46917b\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>3<\/td><td>The manufacturer shall lodge an application for assessment of its quality system with the notified body of its choice, for the products with digital elements concerned. The application shall include:<\/td><td>Annex VIII, Part IV, \u00a73.1 <\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (a) the name and address of the manufacturer and, if the application is lodged by the authorised representative, the name and address of that authorised representative; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (a)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (b) the technical documentation for one model of each category of products with digital elements intended to be manufactured or developed. The technical documentation shall, wherever applicable, contain at least the elements as set out in Annex VII; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (b)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (c) the documentation concerning the quality system; and <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (c)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (d) a written declaration that the same application has not been lodged with any other notified body. <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (d)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td>The quality system shall ensure compliance of the products with digital elements with the essential cybersecurity requirements set out in Part I of Annex I and compliance of the vulnerability handling processes put in place by the manufacturer with the requirements set out in Part II of Annex I. All the elements, requirements and provisions adopted by the manufacturer shall be documented in a systematic and orderly manner in the form of written policies, procedures and instructions. That quality system documentation shall permit a consistent interpretation of the quality programmes, plans, manuals and records. It shall, in particular, contain an adequate description of:<\/td><td>Annex VIII, Part IV, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (a) the quality objectives and the organisational structure, responsibilities and powers of the management with regard to design, development, product quality and vulnerability handling;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (a)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (b) the technical design and development specifications, including standards, that will be applied and, where the relevant harmonised standards or technical specifications will not be applied in full, the means that will be used to ensure that the essential cybersecurity requirements set out in Part I of Annex I that apply to the products with digital elements will be met; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (b)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (c) the procedural specifications, including standards, that will be applied and, where the relevant harmonised standards or technical specifications will not be applied in full, the means that will be used to ensure that the essential cybersecurity requirements set out in Part II of Annex I that apply to the manufacturer will be met;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (c)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\"> (d) the design and development control, as well as design and development verification techniques, processes and systematic actions that will be used when designing and developing the products with digital elements pertaining to the product category covered;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (d)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (e) the corresponding production, quality control and quality assurance techniques, processes and systematic actions that will be used;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (e)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\"> (f) the examinations and tests that will be carried out before, during and after production, and the frequency with which they will be carried out;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (f)<\/td><td><\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (g) the quality records, such as inspection reports and test data, calibration data and qualification reports on the personnel concerned; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (g)<\/td><td><\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\"> (h) the means of monitoring the achievement of the required design and product quality and the effective operation of the quality system.<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (h)<\/td><td><\/td><td><\/td><\/tr><tr><td>17<\/td><td>\u88fd\u9020\u8005\u306f\u3001\u627f\u8a8d\u3055\u308c\u305f\u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u304b\u3089\u751f\u3058\u308b\u7fa9\u52d9\u3092\u5c65\u884c\u3057\u3001\u305d\u308c\u304c\u9069\u5207\u304b\u3064\u52b9\u7387\u7684\u3067\u3042\u308a\u7d9a\u3051\u308b\u3088\u3046\u306b\u7dad\u6301\u3059\u308b\u3053\u3068\u3092\u7d04\u675f\u3059\u308b\u3082\u306e\u3068\u3059\u308b\u3002<\/td><td>Annex VIII, Part IV, \u00a73.4<\/td><td><\/td><td><\/td><\/tr><tr><td>18<\/td><td>The manufacturer shall keep the notified body that has approved the quality system informed of any intended change to the quality system.<\/td><td>Annex VIII, Part IV, \u00a73.5<\/td><td><\/td><td><\/td><\/tr><tr><td>19<\/td><td>Surveillance under the responsibility of the notified body: The manufacturer shall, for assessment purposes, allow the notified body access to the design, development, production, inspection, testing and storage sites, and shall provide it with all necessary information, in particular:<\/td><td>Annex VIII, Part IV, \u00a74.2<\/td><td><\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (a) the quality system documentation;.<\/p><\/td><td>Annex VIII, Part IV, \u00a74.2 (a)<\/td><td><\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (b) the quality records as provided for by the design part of the quality system, such as results of analyses, calculations and tests;<\/p><\/td><td>Annex VIII, Part IV, \u00a74.2 (b)<\/td><td><\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (c) the quality records as provided for by the manufacturing part of the quality system, such as inspection reports and test data, calibration data and qualification reports on the personnel concerned.<\/p><\/td><td>Annex VIII, Part IV, \u00a74.2 (c)<\/td><td><\/td><td><\/td><\/tr><tr><td>1<\/td><td>Conformity based on full quality assurance is the conformity assessment procedure whereby the manufacturer fulfils the obligations set out in points 2 and 5 of this Part, and ensures and declares on its sole responsibility that the products with digital elements or product categories concerned satisfy the essential cybersecurity requirements set out in Part I of Annex I and that the vulnerability handling processes put in place by the manufacturer meet the requirements set out in Part II of Annex I.<\/td><td>Annex VIII, Part IV, \u00a71<\/td><td><\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u88fd\u9020\u8005\u306f\u3001\u5f53\u8a72\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u6700\u7d42\u88fd\u54c1\u691c\u67fb\u304a\u3088\u3073\u8a66\u9a13\u3001\u306a\u3089\u3073\u306b\u8106\u5f31\u6027\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066\u3001\u30dd\u30a4\u30f3\u30c83\u306b\u898f\u5b9a\u3055\u308c\u308b\u627f\u8a8d\u3055\u308c\u305f\u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u3092\u904b\u7528\u3057\u3001\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u3092\u901a\u3058\u3066\u305d\u306e\u6709\u52b9\u6027\u3092\u7dad\u6301\u3057\u3001\u30dd\u30a4\u30f3\u30c84\u306b\u898f\u5b9a\u3055\u308c\u308b\u30b5\u30fc\u30d9\u30a4\u30e9\u30f3\u30b9\u3092\u53d7\u3051\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td>Annex VIII, Part IV, \u00a72<\/td><td><\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1939186512\" role=\"tabpanel\" aria-labelledby=\"software\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-27c6bbd e-con-full e-flex e-con e-child\" data-id=\"27c6bbd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb6eca0 sticky-cra e-n-tabs-mobile ha-has-bg-overlay elementor-widget elementor-widget-n-tabs\" data-id=\"eb6eca0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"246869152\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"non-critical\" data-tab-title-id=\"e-n-tab-title-2468691521\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2468691521\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u91cd\u8981\u3067\u306a\u3044\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"manu-critical\" data-tab-title-id=\"e-n-tab-title-2468691522\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2468691522\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u91cd\u8981\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2468691523\" data-tab-title-id=\"e-n-tab-title-2468691523\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2468691523\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tOpen-source Stewards\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2468691521\" role=\"tabpanel\" aria-labelledby=\"non-critical\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-80bf1c9 e-con-full e-flex e-con e-child\" data-id=\"80bf1c9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-9fec3de e-con-full e-flex e-con e-child\" data-id=\"9fec3de\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-115de41 general elementor-widget elementor-widget-heading\" data-id=\"115de41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u306e\u958b\u767a\u8005 <u>\u975e\u91cd\u8981<\/u> \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afbbdc4 elementor-widget elementor-widget-text-editor\" data-id=\"afbbdc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a\u4f01\u696d <span class=\"darkmysite_style_txt_border darkmysite_processed\" style=\"text-decoration: underline;\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u306a\u3044<\/span> \u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u88fd\u54c1\u307e\u305f\u306f\u91cd\u8981\u88fd\u54c1\u30af\u30e9\u30b9\u2161\u306b\u5206\u985e\u3055\u308c\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306f\u3001CRA\u306e\u8981\u6c42\u4e8b\u9805\u3078\u306e\u9069\u5408\u6027\u3092\u81ea\u5df1\u8a55\u4fa1\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/strong>.<\/p><p class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002 <a class=\"darkmysite_style_txt_border darkmysite_style_link darkmysite_processed\" href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex\/#annexIII\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u9644\u5c5e\u66f8III<\/a> \u91cd\u8981\u54c1\u76ee\u30ea\u30b9\u30c8\u306b\u3064\u3044\u3066\u306f\u540c\u898f\u5247\u3092\u53c2\u7167\u306e\u3053\u3068\u3002 <a class=\"darkmysite_style_txt_border darkmysite_style_link darkmysite_processed\" href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex-eu\/#annexIV\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u9644\u5c5e\u66f8IV<\/a> \u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u88fd\u54c1\u306e\u30ea\u30b9\u30c8\u306f\u3053\u3061\u3089\u3002<\/p><p class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u91cd\u8981\u88fd\u54c1\u7b2c\u4e00\u7a2e\u306b\u5206\u985e\u3055\u308c\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u958b\u767a\u3059\u308b\u4f01\u696d\u3067\u3001\u4ee5\u4e0b\u306e\u3044\u305a\u308c\u304b\u306b\u8a72\u5f53\u3059\u308b\u4f01\u696d <\/strong><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u9069\u5408 <span class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><u>\u5341\u5206\u306b<\/u><\/span>\u00a0 \u8abf\u548c\u3055\u308c\u305f\u57fa\u6e96 <span class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><u>\u307e\u305f\u306f<\/u><\/span><em class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u00a0\u00a0<\/em><\/strong><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u9069\u5408 <u>\u5341\u5206\u306b<\/u><em>\u00a0<\/em> \u5171\u901a\u4ed5\u69d8 <span class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><u>\u307e\u305f\u306f<\/u><\/span><em class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u00a0 <\/em><\/strong><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u306f\u6b27\u5dde\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u3066\u3044\u308b\u3001 <\/strong><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u307e\u305f\u3001CRA\u306e\u8981\u6c42\u4e8b\u9805\u3078\u306e\u6e96\u62e0\u3092\u81ea\u5df1\u8a55\u4fa1\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u308b\u3002<\/strong><\/p><p class=\"LC20lb MBeuO DKV0Md darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u26a0\ufe0f Software developers of Important Products Class I who have not applied or have applied only in part harmonised standards, common specifications or European cybersecurity certification schemes <span class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><u>\u30de\u30b9\u30c8<\/u><i>\u00a0<\/i><\/strong><\/span>\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u306e\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u3092\u53d7\u3051\u308b\uff08\u300c\u91cd\u8981\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u300d\u30bf\u30d6\u3092\u53c2\u7167\uff09<\/p><p class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u3044\u305a\u308c\u306b\u305b\u3088\u3001\u975e\u91cd\u8981\u88fd\u54c1\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a\u8005\u306f\u3001\u91cd\u8981\u88fd\u54c1\u304a\u3088\u3073\u91cd\u8981\u88fd\u54c1\u3068\u540c\u3058\u8a55\u4fa1\u30d7\u30ed\u30bb\u30b9\u3092\u9078\u629e\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002\u00a0<\/p><p class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\"><strong class=\"darkmysite_style_txt_border darkmysite_processed\" data-darkmysite_alpha_bg=\"rgba(0, 0, 0, 0)\">\u91cd\u8981\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3068\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u30c1\u30a7\u30c3\u30af\u3059\u308b<\/strong> tab to read more on third-party assessment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20b5153 elementor-widget elementor-widget-menu-anchor\" data-id=\"20b5153\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f76f60f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f76f60f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a0b71d general elementor-widget elementor-widget-heading\" data-id=\"7a0b71d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e57924 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"6e57924\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"6e57924\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-6e57924 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"6e57924\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\"><\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Software developers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the software developer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the software developer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the software developer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><tr><td>4<\/td><td>The software developer shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a38afb2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a38afb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d07a91 general elementor-widget elementor-widget-heading\" data-id=\"5d07a91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12e7417 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"12e7417\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"12e7417\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-12e7417 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"12e7417\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless\notherwise agreed between manufacturer and business user in relation to a tailor-made\nproduct with digital elements, including the possibility to reset the product to its\noriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) once a security update has been made available, share and publicly disclose information about fixed vulnerabilities, including a description of the vulnerabilities, information allowing users to identify the product with digital elements affected, the impacts of the vulnerabilities, their severity and clear and accessible information helping users to remediate the vulnerabilities; in duly justified cases, where software developers consider the security risks of publication to outweigh the security benefits, they may delay making public information regarding a fixed vulnerability until after users have been given the possibility to apply the relevant patch; <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between the software developer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u81ea\u5df1\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td>Developers of software with digital elements shall:<\/td><td>Annex I - Part II<\/td><td>'-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0a4e91 elementor-widget elementor-widget-menu-anchor\" data-id=\"c0a4e91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"declaration-of-conformity\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab8738f elementor-widget elementor-widget-menu-anchor\" data-id=\"ab8738f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general-docu\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ccb89c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8ccb89c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca74a9d general elementor-widget elementor-widget-heading\" data-id=\"ca74a9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Information and instructions to the user<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d896e9 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"0d896e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"0d896e9\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-0d896e9 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"0d896e9\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30b3\u30e1\u30f3\u30c8<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the software developer, and the postal address, the email address or other digital contact as well as, where available, the website at which the software developer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the software developer's policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4. the intended purpose of the product with digital elements, including the security environment provided by the software developer , as well as the product\u2019s essential functionalities and information about the security properties;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. the type of technical security support offered by the software developer and the end-date of the support period during which users can expect vulnerabilities to be handled and to receive security updates;<\/p><\/td><td>Annex VI, \u00a77<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9. If the software developer decides to make available the software bill of materials to the user, information on where the software bill of materials can be accessed.<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>17<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0519c38 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0519c38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6140d5 general elementor-widget elementor-widget-heading\" data-id=\"a6140d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a592800 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"a592800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"a592800\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-a592800 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"a592800\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30b3\u30e1\u30f3\u30c8<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the software developer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of software developer ] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The software developer  shall draw up a written EU declaration of conformity for each product with digital elements in accordance with Article 28 and keep it together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The EU declaration of conformity shall identify the product with digital elements for which it has been drawn up. A copy of the EU declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part I, \u00a74.2<\/td><td>'-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a26b894 elementor-widget elementor-widget-menu-anchor\" data-id=\"a26b894\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"technical-documentation\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c077478 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c077478\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c13c234 general elementor-widget elementor-widget-heading\" data-id=\"c13c234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ffee6b elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"5ffee6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"5ffee6b\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-5ffee6b ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"5ffee6b\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30b3\u30e1\u30f3\u30c8<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) necessary information and specifications of the vulnerability handling processes put in place by the software developer, including the software bill of materials, the coordinated vulnerability disclosure policy, evidence of the provision of a contact address for the reporting of the vulnerabilities and a description of the technical solutions chosen for the secure distribution of updates;<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b436b6 elementor-widget elementor-widget-menu-anchor\" data-id=\"2b436b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"authorities\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cceb997 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cceb997\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e5642f general elementor-widget elementor-widget-heading\" data-id=\"9e5642f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5831\u544a\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9c9a9d elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"b9c9a9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"b9c9a9d\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-b9c9a9d ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"b9c9a9d\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30b3\u30e1\u30f3\u30c8<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A software developer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The software developer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>For the purposes of the notification referred to in paragraph 1, the software developer shall submit:<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of an actively exploited vulnerability, without undue delay and in any event within 24 hours of the software developer becoming aware of it, indicating, where applicable, the Member States on the territory of which the software developer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the software developer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the software developer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A software developer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The software developer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>For the purposes of the notification referred to in paragraph 3, the software developer shall submit:<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the software developer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the software developer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the software developer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the software developer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the software developer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the software developer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>Software developers as well as other natural or legal persons may notify any vulnerability contained in a product with digital elements as well as cyber threats that could affect the risk profile of a product with digital elements on a voluntary basis to a CSIRT designated as coordinator or ENISA.<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>Software developers as well as other natural or legal persons may notify any incident having an impact on the security of the product with digital elements as well as near misses that could have resulted in such an incident on a voluntary basis to a CSIRT designated as coordinator or ENISA.<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2468691522\" role=\"tabpanel\" aria-labelledby=\"manu-critical\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-5a2524f e-con-full e-flex e-con e-child\" data-id=\"5a2524f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee372c1 general elementor-widget elementor-widget-heading\" data-id=\"ee372c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u306e\u958b\u767a\u8005 <u>\u91cd\u8981<\/u> \u305d\u3057\u3066 <u>\u30af\u30ea\u30c6\u30a3\u30ab\u30eb<\/u> \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3067\u3042\u308b\u3002<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24d48f2 elementor-widget elementor-widget-text-editor\" data-id=\"24d48f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b><span style=\"text-decoration: underline;\">Companies developing software products classified as\u00a0Important Products Class I<\/span> (if their software products do not <span style=\"text-decoration: underline;\">\u5341\u5206\u306b<\/span> conform to harmonized standards or common specification or have not been certified with a European Cybersecurity Certification), <u>Important Products<\/u><\/b><span style=\"font-weight: bold; color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\"><u>\u00a0Class II\u00a0and Critical Products<\/u> \u30de\u30b9\u30c8<\/span><b style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\"> undergo an external assessment process conducted by a notified body responsible for verifying the compliance of the software products with the requirements of the CRA.<\/b><\/p><p>\u26a0\ufe0f As of November 2024, no notified body has been announced.<\/p><p>\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 <a href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex\/#annexIII\">\u9644\u5c5e\u66f8III<\/a> \u91cd\u8981\u54c1\u76ee\u30ea\u30b9\u30c8\u306b\u3064\u3044\u3066\u306f\u3001\u898f\u5247\u306e\u9805\u3092\u53c2\u7167\u306e\u3053\u3068\u3002<\/p><p><b><span style=\"text-decoration: underline;\">Additionally<\/span><u>,<\/u><span style=\"text-decoration: underline;\"> companies developing software products classified as Critical Products<\/span> \u304c\u5fc5\u8981\u3068\u306a\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002 <em>\u4eca\u5f8c\u00a0<\/em> to obtain a European cybersecurity certificate\u00a0<\/b><span style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\"><b>at assurance level at least \u2018substantial\u2019\u00a0<\/b><\/span><b style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\">instead of undergoing the CRA&#8217;s dedicated assessment modules (see below); this is according to article 27(9). However, as of November 2024, the Commission has not yet adopted delegated acts that are required to determine which products are concerned and what certification scheme must be followed. In the absence of such delegated acts, manufacturers of Critical Products can follow the same certification procedures as Important Products.<\/b><\/p><p>\u26a0\ufe0f Once delegated acts are published and we know more about these certifications schemes, this web page will be updated.<\/p><p>\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 <a href=\"https:\/\/www.cyberresilienceact.eu\/ja\/the-cyber-resilience-act-annex\/#annexIV\">\u9644\u5c5e\u66f8IV<\/a> \u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u30fb\u30d7\u30ed\u30c0\u30af\u30c8\u306e\u30ea\u30b9\u30c8\u306b\u3064\u3044\u3066\u306f\u3001\u898f\u5236\u306e\u9805\u3092\u53c2\u7167\u306e\u3053\u3068\u3002<\/p><h6>\u00a0<\/h6><p><strong>What are the paths to third party assessment ?<\/strong><\/p><p>Companies developing software products classified as Important and Critical Products can freely choose among two paths for the assessment of their software products: module B (or module B + module C) and module H.<\/p><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"130\"><span class=\"ng-star-inserted\" data-start-index=\"130\">Module H: Conformity Based on Full Quality Assurance<\/span><\/div><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"130\"><span class=\"ng-star-inserted\" style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\" data-start-index=\"202\">Module H is a comprehensive assessment path which requires the establishment and maintenance of a robust <u>\u54c1\u8cea\u30b7\u30b9\u30c6\u30e0<\/u>. <\/span><span class=\"ng-star-inserted\" style=\"color: var( --e-global-color-text ); word-spacing: 0em; text-align: var(--text-align);\" data-start-index=\"382\">This quality system must include documented policies, procedures, and instructions meticulously outlining every stage of the product lifecycle, from design and development to production and vulnerability handling.<br \/><\/span><\/div><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"130\"><div data-start-index=\"1003\">\u00a0<\/div><div class=\"paragraph heading3 ng-star-inserted\" data-start-index=\"1003\"><span class=\"ng-star-inserted\" data-start-index=\"1003\">Module B: EU-Type Examination<\/span><\/div><\/div><div data-start-index=\"130\"><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1032\"><span class=\"ng-star-inserted\" data-start-index=\"1105\">While Module B doesn&#8217;t mandate a full-fledged quality system like Module H, manufacturers are still obligated to demonstrate that their technical design and development processes, along with vulnerability handling procedures, meet the CRA&#8217;s requirements.<\/span><span class=\"ng-star-inserted\" data-start-index=\"1419\">\u00a0<\/span><\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\"><span class=\"ng-star-inserted\" data-start-index=\"1546\"> The primary focus of Module B, though, is the <u>examination of a representative specimen<\/u>\u00a0of the product by a notified body. <\/span><span class=\"ng-star-inserted\" data-start-index=\"1705\">This examination aims to verify that the specimen aligns with the technical documentation and adheres to the relevant harmonized standards or technical specifications detailed in the documentation.<\/span><\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\"><span class=\"ng-star-inserted\" data-start-index=\"1705\">\u00a0<\/span><\/div><div data-start-index=\"1525\">Important: The requirement for a <span style=\"text-decoration: underline;\">specimen<\/span> <span style=\"text-decoration: underline;\">examination<\/span> in Module B doesn&#8217;t automatically exclude software, as the CRA defines &#8220;specimen&#8221; as a combination of &#8220;production type and design type,&#8221; which could be interpreted to include representative samples of software code or functionalities.<\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\">\u00a0<\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\"><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\">Module B+ Module C<\/span><\/div><div class=\"paragraph normal ng-star-inserted\" data-start-index=\"1525\"><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\">Once a software product type is certified under module B, other products of the same type can be certified through module C, which is a certification path that does not require for a new assessment by a notified body, providing that the new product is of the same <\/span><i style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\">type<\/i><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); word-spacing: 0em;\"> as the one certified via module B.<\/span><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efe2123 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"efe2123\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a7cdc9 elementor-widget elementor-widget-heading\" data-id=\"8a7cdc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u9053\u3092\u9078\u3076<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a7900d e-n-tabs-mobile ha-has-bg-overlay elementor-widget elementor-widget-n-tabs\" data-id=\"7a7900d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"128421901\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1284219011\" data-tab-title-id=\"e-n-tab-title-1284219011\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1284219011\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30e2\u30b8\u30e5\u30fc\u30ebB\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1284219012\" data-tab-title-id=\"e-n-tab-title-1284219012\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1284219012\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30e2\u30b8\u30e5\u30fc\u30ebC\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1284219013\" data-tab-title-id=\"e-n-tab-title-1284219013\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1284219013\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u30e2\u30b8\u30e5\u30fc\u30ebH\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1284219011\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1284219011\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-0da0d1b e-con-full e-flex e-con e-child\" data-id=\"0da0d1b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fd0be5 elementor-widget elementor-widget-menu-anchor\" data-id=\"5fd0be5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16af728 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"16af728\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63aebe5 general elementor-widget elementor-widget-heading\" data-id=\"63aebe5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-091492f elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"091492f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"091492f\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-091492f ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"091492f\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\"><\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Software developers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the software developer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the software developer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the software developer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><tr><td>4<\/td><td>The software developer shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td>\u25a2<\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a154c59 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a154c59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da0f3ae general elementor-widget elementor-widget-heading\" data-id=\"da0f3ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-563c7a5 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"563c7a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"563c7a5\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-563c7a5 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"563c7a5\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless otherwise agreed between the software developer and business user in relation to a tailor-made product with digital elements, including the possibility to reset the product to itsoriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) once a security update has been made available, share and publicly disclose information about fixed vulnerabilities, including a description of the vulnerabilities, information allowing users to identify the product with digital elements affected, the impacts of the vulnerabilities, their severity and clear and accessible information helping users to remediate the vulnerabilities; in duly justified cases, where software developers consider the security risks of publication to outweigh the security benefits, they may delay making public information regarding a fixed vulnerability until after users have been given the possibility to apply the relevant patch; <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a software developer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td>Software developers of products with digital elements shall:<\/td><td>Annex I - Part II<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3f0245 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a3f0245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e9648f general elementor-widget elementor-widget-heading\" data-id=\"8e9648f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3fe339 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"e3fe339\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"e3fe339\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-e3fe339 ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"e3fe339\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the manufacturer, and the postal address, the email address or other digital contact as well as, where available, the website at which the manufacturer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the manufacturer\u2019s policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4.\u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u3001\u88fd\u54c1\u306e\u5fc5\u9808\u6a5f\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7279\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. \u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30dd\u30fc\u30c8\u306e\u7a2e\u985e\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u63d0\u4f9b\u3092\u671f\u5f85\u3067\u304d\u308b\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306e\u7d42\u4e86\u65e5\uff1b<\/p><\/td><td>Annex VI, \u00a77<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9.\u88fd\u9020\u8005\u304c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3092\u30e6\u30fc\u30b6\u30fc\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u6c7a\u5b9a\u3057\u305f\u5834\u5408\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u6240\u306b\u95a2\u3059\u308b\u60c5\u5831\u3002<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>49<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>'-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8077d7d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8077d7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c3a543 general elementor-widget elementor-widget-heading\" data-id=\"7c3a543\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1418dbd elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"1418dbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"1418dbd\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-1418dbd ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"1418dbd\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the manufacturer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of manufacturer] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The manufacturer shall draw up a written EU declaration of conformity for each product with digital elements in accordance with Article 28 and keep it together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The EU declaration of conformity shall identify the product with digital elements for which it has been drawn up. A copy of the EU declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part I, \u00a74.2<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-927d39f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"927d39f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cac52e9 general elementor-widget elementor-widget-heading\" data-id=\"cac52e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-908ca8d elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"908ca8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"908ca8d\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-908ca8d ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"908ca8d\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3001\u8abf\u6574\u3055\u308c\u305f\u8106\u5f31\u6027\u958b\u793a\u65b9\u91dd\u3001\u8106\u5f31\u6027\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306e\u9023\u7d61\u5148\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u8a3c\u62e0\u3001\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5b89\u5168\u306a\u914d\u5e03\u306e\u305f\u3081\u306b\u9078\u629e\u3055\u308c\u305f\u6280\u8853\u7684\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u8aac\u660e\u3092\u542b\u3080\u3001\u88fd\u9020\u8005\u306b\u3088\u3063\u3066\u5b9f\u65bd\u3055\u308c\u305f\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306e\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>self-Assessed by notified body<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eea38ac elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"eea38ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a0430c general elementor-widget elementor-widget-heading\" data-id=\"1a0430c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5f53\u5c40\u3068\u306e\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fac21d elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"1fac21d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"1fac21d\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-1fac21d ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"1fac21d\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>\u88fd\u9020\u696d\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3001\u304a\u3088\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30ea\u30b9\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>\u88fd\u9020\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3084\u3001\u305d\u306e\u3088\u3046\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u30cb\u30a2\u30df\u30b9\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-767b68e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"767b68e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0057b9 general elementor-widget elementor-widget-heading\" data-id=\"a0057b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u8a8d\u8a3c\u7533\u8acb\u66f8\u306e\u63d0\u51fa<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-863132a elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"863132a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"863132a\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-863132a ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"863132a\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>3<\/td><td>The manufacturer shall lodge an application for assessment of its quality system with the notified body of its choice, for the products with digital elements concerned. The application shall include:<\/td><td>Annex VIII, Part II, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> the name and address of the manufacturer and, if the application is lodged by the authorised representative, the name and address of that authorised representative;<\/p><\/td><td>Annex VIII, Part II, \u00a73.1<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> a written declaration that the same application has not been lodged with any other notified body;<\/p><\/td><td>Annex VIII, Part II, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">the technical documentation, which shall make it possible to assess the conformity of the product with digital elements with the applicable essential cybersecurity requirements as set out in Part I of Annex I and the manufacturer\u2019s vulnerability handling processes set out in Part II of Annex I and shall include an adequate analysis and assessment of the risks. The technical documentation shall specify the applicable requirements and cover, as far as relevant for the assessment, the design, manufacture and operation of the product with digital elements. The technical documentation shall contain, wherever applicable, at least the elements set out in Annex VII;<\/p><\/td><td>Annex VIII, Part II, \u00a73.3<\/td><td>-<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> the supporting evidence for the adequacy of the technical design and development solutions and vulnerability handling processes. This supporting evidence shall mention any documents that have been used, in particular where the relevant harmonised standards or technical specifications have not been applied in full. The supporting evidence shall include, where necessary, the results of tests carried out by the appropriate laboratory of the manufacturer, or by another testing laboratory on its behalf and under its responsibility.<\/p><\/td><td>Annex VIII, Part II, \u00a73.4<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td>The manufacturer shall inform the notified body that holds the technical documentation relating to the EU-type examination certificate of all modifications to the approved type and the vulnerability handling processes that may affect the conformity with the essential cybersecurity requirements set out in Annex I, or the conditions for validity of the certificate. Such modifications shall require additional approval in the form of an addition to the original EU-type examination certificate.<\/td><td>Annex VIII, Part II, \u00a77<\/td><td>-<\/td><td><\/td><\/tr><tr><td>9<\/td><td>The manufacturer shall keep a copy of the EU-type examination certificate, its annexes and additions together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer.<\/td><td>Annex VIII, Part II, \u00a710<\/td><td>-<\/td><td><\/td><\/tr><tr><td>1<\/td><td>EU-type examination is the part of a conformity assessment procedure in which a notified body examines the technical design and development of a product with digital elements and the vulnerability handling processes put in place by the manufacturer, and attests that a product with digital elements meets the essential cybersecurity requirements set out in Part I of Annex I and that the manufacturer meets the essential cybersecurity requirements set out in Part II of Annex I.<\/td><td>Annex VIII, Part II, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td>EU-type examination shall be carried out by assessing the adequacy of the technical design and development of the product with digital elements through the examination of the technical documentation and supporting evidence referred to in point 3, and the examination of specimens of one or more critical parts of the product (combination of production type and design type).<\/td><td>Annex VIII, Part II, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1284219012\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1284219012\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-50c072e e-con-full e-flex e-con e-child\" data-id=\"50c072e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41c64f2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"41c64f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2345646 general elementor-widget elementor-widget-heading\" data-id=\"2345646\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce7c435 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"ce7c435\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"ce7c435\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-ce7c435 ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"ce7c435\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the manufacturer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the manufacturer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the manufacturer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>4<\/td><td>The manufacturers shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f68b50 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6f68b50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebe1fe9 general elementor-widget elementor-widget-heading\" data-id=\"ebe1fe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b1a313 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"1b1a313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"1b1a313\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-1b1a313 ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"1b1a313\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless\notherwise agreed between manufacturer and business user in relation to a tailor-made\nproduct with digital elements, including the possibility to reset the product to its\noriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u305f\u3089\u3001\u4fee\u6b63\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u516c\u958b\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u8106\u5f31\u6027\u306e\u8aac\u660e\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6301\u3064\u88fd\u54c1\u3092\u30e6\u30fc\u30b6\u30fc\u304c\u7279\u5b9a\u3067\u304d\u308b\u60c5\u5831\u3001\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3001\u6df1\u523b\u5ea6\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3092\u4fee\u6b63\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u660e\u78ba\u304b\u3064\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u306a\u60c5\u5831\u3092\u542b\u3080\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information,\nincluding on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u540c\u7a2e\u306e\u88fd\u54c1\u306b\u3064\u3044\u3066\u904e\u53bb\u306b\u53d6\u5f97\u3057\u305fEU\u578b\u5be9\u67fb\u8a3c\u660e\u66f8\u306b\u57fa\u3065\u304f\u81ea\u5df1\u8a55\u4fa1\uff08\u30e2\u30b8\u30e5\u30fc\u30ebB\uff09<\/td><td><\/td><\/tr><tr><td>16<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u696d\u8005\u306f\u3001\u6b21\u306e\u3053\u3068\u3092\u884c\u308f\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex I - Part II<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7543250 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7543250\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bbf6cc general elementor-widget elementor-widget-heading\" data-id=\"0bbf6cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb2ee92 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"eb2ee92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"eb2ee92\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-eb2ee92 ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"eb2ee92\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the manufacturer, and the postal address, the email address or other digital contact as well as, where available, the website at which the manufacturer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the manufacturer\u2019s policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4.\u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u3001\u88fd\u54c1\u306e\u5fc5\u9808\u6a5f\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7279\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. \u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30dd\u30fc\u30c8\u306e\u7a2e\u985e\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u63d0\u4f9b\u3092\u671f\u5f85\u3067\u304d\u308b\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306e\u7d42\u4e86\u65e5\uff1b<\/p><\/td><td>Annex VI, \u00a77<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9.\u88fd\u9020\u8005\u304c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3092\u30e6\u30fc\u30b6\u30fc\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u6c7a\u5b9a\u3057\u305f\u5834\u5408\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u6240\u306b\u95a2\u3059\u308b\u60c5\u5831\u3002<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>17<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcd6dc7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"dcd6dc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83cba56 general elementor-widget elementor-widget-heading\" data-id=\"83cba56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d812fa elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"8d812fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"8d812fa\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-8d812fa ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"8d812fa\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the manufacturer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>mandatory<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of manufacturer] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The manufacturer shall draw up a written EU declaration of conformity for each product with digital elements and keep it together with the technical documentation at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The EU declaration of conformity shall identify the product with digital elements for which it has been drawn up. A copy of the EU declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part II, \u00a710 and Part III, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b7fa80 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0b7fa80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f8519b general elementor-widget elementor-widget-heading\" data-id=\"5f8519b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-306374c elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"306374c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"306374c\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-306374c ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"306374c\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3001\u8abf\u6574\u3055\u308c\u305f\u8106\u5f31\u6027\u958b\u793a\u65b9\u91dd\u3001\u8106\u5f31\u6027\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306e\u9023\u7d61\u5148\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u8a3c\u62e0\u3001\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5b89\u5168\u306a\u914d\u5e03\u306e\u305f\u3081\u306b\u9078\u629e\u3055\u308c\u305f\u6280\u8853\u7684\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u8aac\u660e\u3092\u542b\u3080\u3001\u88fd\u9020\u8005\u306b\u3088\u3063\u3066\u5b9f\u65bd\u3055\u308c\u305f\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306e\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2bfe75 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c2bfe75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-283db7b general elementor-widget elementor-widget-heading\" data-id=\"283db7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5f53\u5c40\u3068\u306e\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d0adae elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"9d0adae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"9d0adae\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-9d0adae ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"9d0adae\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>\u88fd\u9020\u696d\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3001\u304a\u3088\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30ea\u30b9\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>\u88fd\u9020\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3084\u3001\u305d\u306e\u3088\u3046\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u30cb\u30a2\u30df\u30b9\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1284219013\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1284219013\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-3071b70 e-con-full e-flex e-con e-child\" data-id=\"3071b70\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2787271 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2787271\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dd458d general elementor-widget elementor-widget-heading\" data-id=\"7dd458d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u8a55\u4fa1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fca17b4 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"fca17b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"fca17b4\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-fca17b4 ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"fca17b4\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.<\/td><td>article 13(2) <\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>2<\/td><td>The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment. It shall also indicate how the manufacturer is to apply Part I, point (1), of Annex I and the vulnerability handling requirements set out in Part II of Annex I.<\/td><td>Article 13(3)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>3<\/td><td>When placing a product with digital elements on the market, the manufacturer shall<b> include the cybersecurity risk assessment in the technical documentation<\/b>. For products with digital elements which are also subject to other Union legal acts, the cybersecurity risk assessment may be part of the risk assessment required by those Union legal acts. Where certain essential cybersecurity requirements are not applicable to the product with digital elements, the manufacturer shall include a clear justification to that effect in that technical documentation.<\/td><td>Article 13(4)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><tr><td>4<\/td><td>The manufacturers shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects concerning the products with digital elements, including vulnerabilities of which they become aware and any relevant information provided by third parties, and shall, where applicable, update the cybersecurity risk assessment of the products<\/td><td>Article 13(7)<\/td><td>self-written - to be reviewed by notified body for critical and important products<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d3b21f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7d3b21f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5fb4cc general elementor-widget elementor-widget-heading\" data-id=\"e5fb4cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e37346f elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"e37346f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"e37346f\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-e37346f ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"e37346f\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where\napplicable, products with digital elements shall:<\/td><td>Annex I, Part 1 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a)\u60aa\u7528\u53ef\u80fd\u306a\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u306a\u3044\u72b6\u614b\u3067\u5e02\u5834\u306b\u63d0\u4f9b\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72a<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) be made available on the market with a secure by default configuration, unless\notherwise agreed between manufacturer and business user in relation to a tailor-made\nproduct with digital elements, including the possibility to reset the product to its\noriginal state; <\/p><\/td><td>Annex I, Part 1 \u00a72b<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-\nout mechanism, through the notification of available updates to users, and the option to temporarily postpone them; <\/p><\/td><td>Annex 1, Part 1 \u00a72c <\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (d) \u8a8d\u8a3c\u3001ID \u307e\u305f\u306f\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u542b\u3080\u304c\u3053\u308c\u306b\u9650\u5b9a\u3055\u308c\u306a\u3044\u3001\u9069\u5207\u306a\u7ba1\u7406\u30e1\u30ab\u30cb\u30ba \u30e0\u306b\u3088\u308a\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u304b\u3089\u306e\u4fdd\u8b77\u3092\u78ba\u4fdd\u3057\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72d<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">(e) protect the confidentiality of stored, transmitted or otherwise processed data,\npersonal or other, such as by encrypting relevant data at rest or in transit by state of\nthe art mechanisms, and by using other technical means; <\/p><\/td><td>Annex I, Part 1 \u00a72e<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (f)\u4fdd\u5b58\u3001\u9001\u4fe1\u3001\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u65b9\u6cd5\u3067\u51e6\u7406\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u500b\u4eba\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u30c7\u30fc\u30bf\u3001\u30b3\u30de\u30f3\u30c9\u3001\u30d7\u30ed\u30b0\u30e9\u30e0\u3001\u304a\u3088\u3073\u8a2d\u5b9a\u306e\u5b8c\u5168\u6027\u3092\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u3088\u3063\u3066\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u64cd\u4f5c\u307e\u305f\u306f\u5909\u66f4\u304b\u3089\u4fdd\u8b77\u3057\u3001\u7834\u640d\u306b\u3064\u3044\u3066\u5831\u544a\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72f<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">(g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); <\/p><\/td><td>Annex I, Part 1 \u00a72g<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;<\/p><\/td><td>Annex I, Part 1 \u00a72h<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (i)\u88fd\u54c1\u81ea\u4f53\u307e\u305f\u306f\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u304c\u3001\u4ed6\u306e\u30c7\u30d0\u30a4\u30b9\u307e\u305f\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u63d0\u4f9b\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u53ef\u7528\u6027\u306b\u4e0e\u3048\u308b\u60aa\u5f71\u97ff\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72i<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(j) \u5916\u90e8\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3092\u542b\u3080\u653b\u6483\u9762\u3092\u5236\u9650\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72j<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (k)\u9069\u5207\u306a\u643e\u53d6\u7de9\u548c\u306e\u4ed5\u7d44\u307f\u3068\u6280\u8853\u3092\u7528\u3044\u3066\u3001\u4e8b\u6545\u306e\u5f71\u97ff\u3092\u8efd\u6e1b\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3001\u958b\u767a\u3001\u88fd\u9020\u3055\u308c\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 1 \u00a72k<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">(l) \u30c7\u30fc\u30bf\u3001\u30b5\u30fc\u30d3\u30b9\u307e\u305f\u306f\u6a5f\u80fd\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u305f\u306f\u5909\u66f4\u3092\u542b\u3080\u3001\u95a2\u9023\u3059\u308b\u5185\u90e8\u6d3b\u52d5\u3092\u8a18\u9332\u304a\u3088\u3073\u76e3\u8996\u3059\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u60c5\u5831\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b <\/p><\/td><td>Annex I, Part 1 \u00a72l<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (m) \u5229\u7528\u8005\u304c\u3059\u3079\u3066\u306e\u30c7\u30fc\u30bf\u304a\u3088\u3073\u8a2d\u5b9a\u3092\u5b89\u5168\u304b\u3064\u5bb9\u6613\u306b\u6c38\u7d9a\u7684\u306b\u524a\u9664\u3067\u304d\u308b\u53ef\u80fd\u6027\u3092\u63d0\u4f9b\u3057\u3001\u305d\u306e\u3088\u3046\u306a\u30c7\u30fc\u30bf\u304c\u4ed6\u306e\u88fd\u54c1\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u306b\u8ee2\u9001\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u304c\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u884c\u308f\u308c\u308b\u3053\u3068\u3092\u4fdd\u8a3c\u3059\u308b\u3053\u3068\u3002 <\/p><\/td><td>Annex I, Part 1 \u00a72m<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>18<\/td><td><p style=\"margin-left:40px\"> (2) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306b\u3082\u305f\u3089\u3055\u308c\u308b\u30ea\u30b9\u30af\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u542b\u3081\u3001\u8106\u5f31\u6027\u306b\u9045\u6ede\u306a\u304f\u5bfe\u51e6\u3057\u3001\u662f\u6b63\u3059\u308b\u3053\u3068\u3002\u6280\u8853\u7684\u306b\u53ef\u80fd\u306a\u5834\u5408\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u306f\u3001\u6a5f\u80fd\u306e\u66f4\u65b0\u3068\u306f\u5225\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>17<\/td><td><p style=\"margin-left:40px\">(1) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3068\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3092\u7279\u5b9a\u3057\u3001\u6587\u66f8\u5316\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u5c11\u306a\u304f\u3068\u3082\u88fd\u54c1\u306e\u30c8\u30c3\u30d7\u30ec\u30d9\u30eb\u306e\u4f9d\u5b58\u95a2\u4fc2\u3092\u7db2\u7f85\u3059\u308b\u3001\u4e00\u822c\u7684\u306b\u4f7f\u7528\u3055\u308c\u6a5f\u68b0\u3067\u8aad\u307f\u53d6\u308a\u53ef\u80fd\u306a\u5f62\u5f0f\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>19<\/td><td><p style=\"margin-left:40px\"> (3) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001\u52b9\u679c\u7684\u304b\u3064\u5b9a\u671f\u7684\u306a\u30c6\u30b9\u30c8\u3068\u30ec\u30d3\u30e5\u30fc\u3092\u9069\u7528\u3059\u308b\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a73<\/td><td>Self-Assessed by notified body - must be justified by clear written policies, procedures and instructions, with regards to quality system.assessment<\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (4) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u305f\u3089\u3001\u4fee\u6b63\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u516c\u958b\u3059\u308b\u3002\u3053\u308c\u306b\u306f\u3001\u8106\u5f31\u6027\u306e\u8aac\u660e\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6301\u3064\u88fd\u54c1\u3092\u30e6\u30fc\u30b6\u30fc\u304c\u7279\u5b9a\u3067\u304d\u308b\u60c5\u5831\u3001\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3001\u6df1\u523b\u5ea6\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3092\u4fee\u6b63\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u660e\u78ba\u304b\u3064\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u306a\u60c5\u5831\u3092\u542b\u3080\uff1b <\/p><\/td><td>Annex I, Part 2 \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (5) \u5354\u8abf\u7684\u306a\u8106\u5f31\u6027\u958b\u793a\u306b\u95a2\u3059\u308b\u30dd\u30ea\u30b7\u30fc\u3092\u5c0e\u5165\u3057\u3001\u5b9f\u65bd\u3059\u308b\uff1b<\/p><\/td><td>Annex I, Part 2 \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements;<\/p><\/td><td>Annex I, Part 2 \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>23<\/td><td><p style=\"margin-left:40px\"> (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner;<\/p><\/td><td>Annex I, Part 2 \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>24<\/td><td><p style=\"margin-left:40px\"> (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information,\nincluding on potential action to be taken.<\/p><\/td><td>Annex I, Part 2 \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Products with digital elements shall <span style=\"color:#262624\">be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.<\/span><\/td><td>Annex I, Part 1 \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1 - \u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u306b\u95a2\u3057\u3066\u3001\u660e\u78ba\u306a\u6587\u66f8\u5316\u3055\u308c\u305f\u65b9\u91dd\u3001\u624b\u9806\u3001\u6307\u793a\u306b\u3088\u3063\u3066\u6b63\u5f53\u5316\u3055\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td><\/td><\/tr><tr><td>16<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u696d\u8005\u306f\u3001\u6b21\u306e\u3053\u3068\u3092\u884c\u308f\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex I - Part II<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f15807 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3f15807\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9a7982 general elementor-widget elementor-widget-heading\" data-id=\"c9a7982\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-405fa56 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"405fa56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"405fa56\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-405fa56 ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"405fa56\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u6700\u4f4e\u9650\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u6dfb\u4ed8\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex II<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. the name, registered trade name or registered trademark of the manufacturer, and the postal address, the email address or other digital contact as well as, where available, the website at which the manufacturer can be contacted;<\/p><\/td><td>\u4ed8\u5c5e\u66f8II\u3001\u00a71<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">2. the single point of contact where information about vulnerabilities of the product with digital elements can be reported and received, and where the manufacturer\u2019s policy on coordinated vulnerability disclosure can be found;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a72<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">3. name and type and any additional information enabling the unique identification of the product with digital elements;<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a73<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">4.\u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u3001\u88fd\u54c1\u306e\u5fc5\u9808\u6a5f\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7279\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a74<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">5.\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\u306b\u5f93\u3063\u3066\u3001\u307e\u305f\u306f\u5408\u7406\u7684\u306b\u4e88\u898b\u53ef\u80fd\u306a\u8aa4\u7528\u306e\u6761\u4ef6\u4e0b\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u4f7f\u7528\u3059\u308b\u3053\u3068\u306b\u95a2\u9023\u3057\u3001\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u3001\u65e2\u77e5\u307e\u305f\u306f\u4e88\u898b\u53ef\u80fd\u306a\u72b6\u6cc1\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a75<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">6. \u8a72\u5f53\u3059\u308b\u5834\u5408\u3001EU\u9069\u5408\u5ba3\u8a00\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1b<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a76<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">7. \u88fd\u9020\u8005\u304c\u63d0\u4f9b\u3059\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30dd\u30fc\u30c8\u306e\u7a2e\u985e\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u63d0\u4f9b\u3092\u671f\u5f85\u3067\u304d\u308b\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306e\u7d42\u4e86\u65e5\uff1b<\/p><\/td><td>Annex VI, \u00a77<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">8. \u8a73\u7d30\u306a\u6307\u793a\u3001\u307e\u305f\u306f\u305d\u306e\u3088\u3046\u306a\u8a73\u7d30\u306a\u6307\u793a\u3084\u60c5\u5831\u3092\u53c2\u7167\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a<\/p><\/td><td>Annex II, \u00a78<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a)\u6700\u521d\u306e\u8a66\u904b\u8ee2\u6642\u53ca\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8010\u7528\u671f\u9593\u3092\u901a\u3058\u3066\u3001\u305d\u306e\u5b89\u5168\u306a\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u63aa\u7f6e\uff1b<\/p><\/td><td>Annex II, \u00a78 (a)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3078\u306e\u5909\u66f4\u304c\u3001\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\uff1b<\/p><\/td><td>Annex II, \u00a78 (b)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u65b9\u6cd5\uff1b<\/p><\/td><td>Annex II, \u00a78 (c)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:60px\">(d) \u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u524a\u9664\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u542b\u3080\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u5b89\u5168\u306a\u5ec3\u68c4\uff1b<\/p><\/td><td>Annex II, \u00a78 (d)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(e) how the default setting enabling the automatic installation of security updates, as required by Part I, point (2)(c), of Annex I, can be turned off;<\/p><\/td><td>Annex II, \u00a78 (e)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(f) where the product with digital elements is intended for integration into other products with digital elements, the information necessary for the integrator to comply with the essential cybersecurity requirements set out in Annex I and the documentation requirements set out in Annex VII.<\/p><\/td><td>Annex II, \u00a78 (f)<\/td><td>Assessed by notified body, as part of the Technical Documentation<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">9.\u88fd\u9020\u8005\u304c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3092\u30e6\u30fc\u30b6\u30fc\u306b\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u6c7a\u5b9a\u3057\u305f\u5834\u5408\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u6240\u306b\u95a2\u3059\u308b\u60c5\u5831\u3002<\/p><\/td><td>\u9644\u5c5e\u66f8II\u3001\u00a79<\/td><td>Not mandatory<\/td><td><\/td><\/tr><tr><td>49<\/td><td>The user information and instructions as set out in Annex II (detailed above), shall be included in the Technical Documentation.<\/td><td>Annex VII, \u00a71 (d)<\/td><td>'-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22fc915 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"22fc915\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca6da15 general elementor-widget elementor-widget-heading\" data-id=\"ca6da15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EU\u9069\u5408\u5ba3\u8a00<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-116363f elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"116363f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"116363f\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-116363f ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"116363f\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u7b2c28\u6761\u306eEU\u9069\u5408\u5ba3\u8a00\u66f8\u306b\u306f\u3001\u4ee5\u4e0b\u306e\u3059\u3079\u3066\u306e\u60c5\u5831\u3092\u8a18\u8f09\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Annex V<\/td><td>The EU Declaration of conformity is self-written<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\"> (1) Name and type and any additional information enabling the unique identification of the product with digital elements<\/p><\/td><td>Annex V, \u00a71<\/td><td>-<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\"> (2) Name and address of the software developer or its authorised representative<\/p><\/td><td>Annex V, \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (3) A statement that the EU declaration of conformity is issued under the sole responsibility of the provider<\/p><\/td><td>Annex V, \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (4) Object of the declaration (identification of the product with digital elements allowing traceability, which may include a photograph, where appropriate)<\/p><\/td><td>Annex V, \u00a74<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (5) A statement that the object of the declaration described above is in conformity with the relevant Union harmonisation legislation<\/p><\/td><td>Annex V, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\"> (7) Where applicable, the name and number of the notified body, a description of the conformity assessment procedure performed and identification of the certificate issued<\/p><\/td><td>Annex V, \u00a77<\/td><td>mandatory<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7c21\u6613EU\u9069\u5408\u5ba3\u8a00\u66f8<\/td><td>Annex VI<\/td><td>Only for SMEs and micro-enterprises<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (6) References to any relevant harmonised standards used or any other common specification or cybersecurity certification in relation to which conformity is declared<\/p><\/td><td>Annex V, \u00a76<\/td><td>\u8a72\u5f53\u3059\u308b\u5834\u5408<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (8) Additional information: <br>Signed for and on behalf of: <br>(\u767a\u884c\u5730\u3068\u767a\u884c\u65e5\uff09\uff1a <br>(\u540d\u524d, \u95a2\u6570) <br>(\u7f72\u540d\uff09\uff1a<\/p><\/td><td>Annex V, \u00a78<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td>The simplified EU declaration of conformity referred to in shall be provided as follows: Hereby, ... [name of software developer] declares that the product with digital elements type ... [designation of type of product with digital element] is in compliance with Regulation (EU) 2024\/\u2026+ . The full text of the EU declaration of conformity is available at the following internet address: \u2026<\/td><td>Annex VI<\/td><td>\u81ea\u66f8<\/td><td><\/td><\/tr><tr><td>12<\/td><td>The software developer shall draw up a written declaration of conformity for each product model and keep it at the disposal of the national authorities for 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer. The declaration of conformity shall identify the product model for which it has been drawn up. A copy of the declaration of conformity shall be made available to the relevant authorities upon request.<\/td><td>Annex VIII, Part IV, \u00a75<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84df88b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"84df88b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abbfbc7 general elementor-widget elementor-widget-heading\" data-id=\"abbfbc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u6280\u8853\u6587\u66f8<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47b238d elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"47b238d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"47b238d\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-47b238d ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"47b238d\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>The technical documentation shall contain at least the following information, as applicable to the relevant product with digital elements:<\/td><td>Annex VII<\/td><td>'-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">1. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u6982\u8981\u8aac\u660e\uff1a<\/p><\/td><td>Annex VII, \u00a71<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:60px\">(a) \u305d\u306e\u610f\u56f3\u3055\u308c\u305f\u76ee\u7684\uff1b<\/p><\/td><td>Annex VII, \u00a71 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\">(b) versions of software affecting compliance with essential cybersecurity requirements;<\/p><\/td><td>Annex VII, \u00a71 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\">(c) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u304c\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u88fd\u54c1\u3067\u3042\u308b\u5834\u5408\u3001\u5916\u89b3\u306e\u7279\u5fb4\u3001\u30de\u30fc\u30ad\u30f3\u30b0\u3001\u5185\u90e8\u30ec\u30a4\u30a2\u30a6\u30c8\u3092\u793a\u3059\u5199\u771f\u307e\u305f\u306f\u30a4\u30e9\u30b9\u30c8\uff1b<\/p><\/td><td>Annex VII, \u00a71 (c)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(d) \u9644\u5c5e\u66f8II\u306b\u5b9a\u3081\u308b\u4f7f\u7528\u8005\u60c5\u5831\u304a\u3088\u3073\u6307\u793a\uff1b<\/p><\/td><td>Annex VII, \u00a71 (d)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\">2. \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u751f\u7523\u3001\u304a\u3088\u3073\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306b\u95a2\u3059\u308b\u8a18\u8ff0\uff1a<\/p><\/td><td>Annex VII, \u00a72<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(a) \u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3068\u958b\u767a\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u3002\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u56f3\u9762\u3084\u56de\u8def\u56f3\u3001\u304a\u3088\u3073\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u3069\u306e\u3088\u3046\u306b\u4e92\u3044\u306e\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u3001\u3042\u308b\u3044\u306f\u4e92\u3044\u306b\u9023\u52d5\u3057\u3001\u5168\u4f53\u7684\u306a\u51e6\u7406\u306b\u7d71\u5408\u3055\u308c\u308b\u304b\u3092\u8aac\u660e\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u8aac\u660e\u3092\u542b\u3080\uff1b<\/p><\/td><td>Annex VII, \u00a72 (a)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:60px\">(b) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u90e8\u54c1\u8868\u3001\u8abf\u6574\u3055\u308c\u305f\u8106\u5f31\u6027\u958b\u793a\u65b9\u91dd\u3001\u8106\u5f31\u6027\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306e\u9023\u7d61\u5148\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u8a3c\u62e0\u3001\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5b89\u5168\u306a\u914d\u5e03\u306e\u305f\u3081\u306b\u9078\u629e\u3055\u308c\u305f\u6280\u8853\u7684\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u8aac\u660e\u3092\u542b\u3080\u3001\u88fd\u9020\u8005\u306b\u3088\u3063\u3066\u5b9f\u65bd\u3055\u308c\u305f\u8106\u5f31\u6027\u51e6\u7406\u30d7\u30ed\u30bb\u30b9\u306e\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (b)<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(c)\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u304a\u3088\u3073\u76e3\u8996\u30d7\u30ed\u30bb\u30b9\u3001\u306a\u3089\u3073\u306b\u305d\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u691c\u8a3c\u306b\u95a2\u3059\u308b\u5fc5\u8981\u306a\u60c5\u5831\u304a\u3088\u3073\u4ed5\u69d8\uff1b<\/p><\/td><td>Annex VII, \u00a72 (c)<\/td><td>self-Assessed by notified body<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">3. an assessment of the cybersecurity risks against which the product with digital elements is designed, developed, produced, delivered and maintained pursuant to Article 13, including how the essential cybersecurity requirements set out in Part I of Annex I are applicable;<\/p><\/td><td>Annex VII, \u00a73<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">4. relevant information that was taken into account to determine the support period pursuant to Article 13(8) of the product with digital elements;<\/p><\/td><td>Annex VII, \u00a74<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">5. a list of the harmonised standards applied in full or in part the references of which have been published in the Official Journal of the European Union, common specifications as set out in Article 27 of this Regulation or European cybersecurity certification schemes adopted pursuant to Regulation (EU) 2019\/881 pursuant to Article 27(8) of this Regulation, and, where those harmonised standards, common specifications or European cybersecurity certification schemes have not been applied, descriptions of the solutions adopted to meet the essential cybersecurity requirements set out in Parts I and II of Annex I, including a list of other relevant technical specifications applied. In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied;<\/p><\/td><td>Annex VII, \u00a75<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\">6. reports of the tests carried out to verify the conformity of the product with digital elements and of the vulnerability handling processes with the applicable essential cybersecurity requirements as set out in Parts I and II of Annex I;<\/p><\/td><td>Annex VII, \u00a76<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">8. where applicable, the software bill of materials, further to a reasoned request from a market surveillance authority provided that it is necessary in order for that authority to be able to check compliance with the essential cybersecurity requirements set out in Annex I.<\/p><\/td><td>Annex VII, \u00a78<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\">7. EU\u9069\u5408\u5ba3\u8a00\u66f8\u306e\u30b3\u30d4\u30fc\uff1b<\/p><\/td><td>Annex VII, \u00a77<\/td><td>\u30ce\u30fc\u30c6\u30a3\u30d5\u30a1\u30a4\u30c9\u30fb\u30dc\u30c7\u30a3\u306b\u3088\u308b\u8a55\u4fa1<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-495b1d4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"495b1d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-211cca5 general elementor-widget elementor-widget-heading\" data-id=\"211cca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5f53\u5c40\u3068\u306e\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25cab29 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"25cab29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"25cab29\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-25cab29 ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"25cab29\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.<\/td><td>Article 14(1) and 14(7)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (2)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">(a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 (2) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (2) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u3059\u3067\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001\u662f\u6b63\u63aa\u7f6e\u307e\u305f\u306f\u7de9\u548c\u63aa\u7f6e\u304c\u5229\u7528\u53ef\u80fd\u306b\u306a\u3063\u3066\u304b\u308914\u65e5\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\uff1a<\/p><\/td><td>Article 14 (2) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(i) \u8106\u5f31\u6027\u306e\u8aac\u660e\uff08\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\uff09\uff1b<\/p><\/p><\/td><td>Article 14 (2) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:60px\">(ii) \u5229\u7528\u53ef\u80fd\u306a\u5834\u5408\u3001\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u3001\u307e\u305f\u306f\u60aa\u7528\u3057\u3066\u3044\u308b\u60aa\u610f\u306e\u3042\u308b\u884c\u70ba\u8005\u306b\u95a2\u3059\u308b\u60c5\u5831\uff1b<\/p><\/td><td>Article 14 (2) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:60px\">(iii) \u8106\u5f31\u6027\u3092\u662f\u6b63\u3059\u308b\u305f\u3081\u306b\u63d0\u4f9b\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u307e\u305f\u306f\u305d\u306e\u4ed6\u306e\u662f\u6b63\u63aa\u7f6e\u306e\u8a73\u7d30\u3002<\/p><\/td><td>Article 14 (2) (c) (iII)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>9<\/td><td>A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform<\/td><td>Article 14 (3)<\/td><td>Single platform is not yet established (Dec 2024)<\/td><td><\/td><\/tr><tr><td>10<\/td><td>\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/td><td>Article 14 (4)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 (4) (a)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 (4) (b)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">(c) \u95a2\u9023\u60c5\u5831\u304c\u65e2\u306b\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3092\u9664\u304d\u3001(b)\u306b\u57fa\u3065\u304f\u4e8b\u6545\u901a\u77e5\u66f8\u306e\u63d0\u51fa\u5f8c1\u30f6\u6708\u4ee5\u5185\u306b\u3001\u5c11\u306a\u304f\u3068\u3082\u4ee5\u4e0b\u3092\u542b\u3080\u6700\u7d42\u5831\u544a\u66f8\u3092\u63d0\u51fa\u3059\u308b\u3053\u3068\uff1a<\/p><\/td><td>Article 14 (4) (c)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(i)\u305d\u306e\u91cd\u5927\u6027\u3068\u5f71\u97ff\u3092\u542b\u3080\u3001\u4e8b\u6545\u306e\u8a73\u7d30\u306a\u8aac\u660e\uff1b<\/p><\/td><td>Article 14 (4) (c) (i)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(ii) \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f15\u304d\u91d1\u3068\u306a\u3063\u305f\u3068\u601d\u308f\u308c\u308b\u8105\u5a01\u306e\u7a2e\u985e\u307e\u305f\u306f\u6839\u672c\u539f\u56e0\uff1b<\/p><\/td><td>Article 14 (4) (c) (ii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:60px\">(iii) \u9069\u7528\u6e08\u307f\u304a\u3088\u3073\u7d99\u7d9a\u4e2d\u306e\u7de9\u548c\u7b56\u3002<\/p><\/td><td>Article 14 (4) (c) (iii)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>17<\/td><td>After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/td><td>Article 14 (8)<\/td><td>Mandatory Reporting<\/td><td><\/td><\/tr><tr><td>18<\/td><td>\u88fd\u9020\u696d\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u542b\u307e\u308c\u308b\u8106\u5f31\u6027\u3001\u304a\u3088\u3073\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30ea\u30b9\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (1)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><tr><td>19<\/td><td>\u88fd\u9020\u8005\u3060\u3051\u3067\u306a\u304f\u3001\u305d\u306e\u4ed6\u306e\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3082\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3084\u3001\u305d\u306e\u3088\u3046\u306a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u30cb\u30a2\u30df\u30b9\u3092\u3001\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\u3068\u3057\u3066\u6307\u5b9a\u3055\u308c\u305fCSIRT\u307e\u305f\u306fENISA\u306b\u4efb\u610f\u3067\u901a\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/td><td>Article 15 (2)<\/td><td>Voluntary Reporting<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a0efc5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2a0efc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33fb0a7 general elementor-widget elementor-widget-heading\" data-id=\"33fb0a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u8a8d\u8a3c\u7533\u8acb<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78aeeac elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"78aeeac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"78aeeac\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-78aeeac ea-advanced-data-table-paginated ea-advanced-data-table-searchable\" data-id=\"78aeeac\" data-items-per-page=\"10\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>3<\/td><td>The manufacturer shall lodge an application for assessment of its quality system with the notified body of its choice, for the products with digital elements concerned. The application shall include:<\/td><td>Annex VIII, Part IV, \u00a73.1 <\/td><td>-<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\"> (a) the name and address of the manufacturer and, if the application is lodged by the authorised representative, the name and address of that authorised representative; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (a)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\"> (b) the technical documentation for one model of each category of products with digital elements intended to be manufactured or developed. The technical documentation shall, wherever applicable, contain at least the elements as set out in Annex VII; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (b)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\"> (c) the documentation concerning the quality system; and <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (c)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>7<\/td><td><p style=\"margin-left:40px\"> (d) a written declaration that the same application has not been lodged with any other notified body. <\/p><\/td><td>Annex VIII, Part IV, \u00a73.1 (d)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>8<\/td><td>The quality system shall ensure compliance of the products with digital elements with the essential cybersecurity requirements set out in Part I of Annex I and compliance of the vulnerability handling processes put in place by the manufacturer with the requirements set out in Part II of Annex I. All the elements, requirements and provisions adopted by the manufacturer shall be documented in a systematic and orderly manner in the form of written policies, procedures and instructions. That quality system documentation shall permit a consistent interpretation of the quality programmes, plans, manuals and records. It shall, in particular, contain an adequate description of:<\/td><td>Annex VIII, Part IV, \u00a73.2<\/td><td>-<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\"> (a) the quality objectives and the organisational structure, responsibilities and powers of the management with regard to design, development, product quality and vulnerability handling;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (a)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:40px\"> (b) the technical design and development specifications, including standards, that will be applied and, where the relevant harmonised standards or technical specifications will not be applied in full, the means that will be used to ensure that the essential cybersecurity requirements set out in Part I of Annex I that apply to the products with digital elements will be met; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (b)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:40px\"> (c) the procedural specifications, including standards, that will be applied and, where the relevant harmonised standards or technical specifications will not be applied in full, the means that will be used to ensure that the essential cybersecurity requirements set out in Part II of Annex I that apply to the manufacturer will be met;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (c)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:40px\"> (d) the design and development control, as well as design and development verification techniques, processes and systematic actions that will be used when designing and developing the products with digital elements pertaining to the product category covered;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (d)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\"> (e) the corresponding production, quality control and quality assurance techniques, processes and systematic actions that will be used;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (e)<\/td><td>-<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:40px\"> (f) the examinations and tests that will be carried out before, during and after production, and the frequency with which they will be carried out;<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (f)<\/td><td><\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:40px\"> (g) the quality records, such as inspection reports and test data, calibration data and qualification reports on the personnel concerned; <\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (g)<\/td><td><\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\"> (h) the means of monitoring the achievement of the required design and product quality and the effective operation of the quality system.<\/p><\/td><td>Annex VIII, Part IV, \u00a73.2 (h)<\/td><td><\/td><td><\/td><\/tr><tr><td>17<\/td><td>\u88fd\u9020\u8005\u306f\u3001\u627f\u8a8d\u3055\u308c\u305f\u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u304b\u3089\u751f\u3058\u308b\u7fa9\u52d9\u3092\u5c65\u884c\u3057\u3001\u305d\u308c\u304c\u9069\u5207\u304b\u3064\u52b9\u7387\u7684\u3067\u3042\u308a\u7d9a\u3051\u308b\u3088\u3046\u306b\u7dad\u6301\u3059\u308b\u3053\u3068\u3092\u7d04\u675f\u3059\u308b\u3082\u306e\u3068\u3059\u308b\u3002<\/td><td>Annex VIII, Part IV, \u00a73.4<\/td><td><\/td><td><\/td><\/tr><tr><td>18<\/td><td>The manufacturer shall keep the notified body that has approved the quality system informed of any intended change to the quality system.<\/td><td>Annex VIII, Part IV, \u00a73.5<\/td><td><\/td><td><\/td><\/tr><tr><td>19<\/td><td>Surveillance under the responsibility of the notified body: The manufacturer shall, for assessment purposes, allow the notified body access to the design, development, production, inspection, testing and storage sites, and shall provide it with all necessary information, in particular:<\/td><td>Annex VIII, Part IV, \u00a74.2<\/td><td><\/td><td><\/td><\/tr><tr><td>20<\/td><td><p style=\"margin-left:40px\"> (a) the quality system documentation;.<\/p><\/td><td>Annex VIII, Part IV, \u00a74.2 (a)<\/td><td><\/td><td><\/td><\/tr><tr><td>21<\/td><td><p style=\"margin-left:40px\"> (b) the quality records as provided for by the design part of the quality system, such as results of analyses, calculations and tests;<\/p><\/td><td>Annex VIII, Part IV, \u00a74.2 (b)<\/td><td><\/td><td><\/td><\/tr><tr><td>22<\/td><td><p style=\"margin-left:40px\"> (c) the quality records as provided for by the manufacturing part of the quality system, such as inspection reports and test data, calibration data and qualification reports on the personnel concerned.<\/p><\/td><td>Annex VIII, Part IV, \u00a74.2 (c)<\/td><td><\/td><td><\/td><\/tr><tr><td>1<\/td><td>Conformity based on full quality assurance is the conformity assessment procedure whereby the manufacturer fulfils the obligations set out in points 2 and 5 of this Part, and ensures and declares on its sole responsibility that the products with digital elements or product categories concerned satisfy the essential cybersecurity requirements set out in Part I of Annex I and that the vulnerability handling processes put in place by the manufacturer meet the requirements set out in Part II of Annex I.<\/td><td>Annex VIII, Part IV, \u00a71<\/td><td><\/td><td><\/td><\/tr><tr><td>2<\/td><td>\u88fd\u9020\u8005\u306f\u3001\u5f53\u8a72\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u6700\u7d42\u88fd\u54c1\u691c\u67fb\u304a\u3088\u3073\u8a66\u9a13\u3001\u306a\u3089\u3073\u306b\u8106\u5f31\u6027\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066\u3001\u30dd\u30a4\u30f3\u30c83\u306b\u898f\u5b9a\u3055\u308c\u308b\u627f\u8a8d\u3055\u308c\u305f\u54c1\u8cea\u30b7\u30b9\u30c6\u30e0\u3092\u904b\u7528\u3057\u3001\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u3092\u901a\u3058\u3066\u305d\u306e\u6709\u52b9\u6027\u3092\u7dad\u6301\u3057\u3001\u30dd\u30a4\u30f3\u30c84\u306b\u898f\u5b9a\u3055\u308c\u308b\u30b5\u30fc\u30d9\u30a4\u30e9\u30f3\u30b9\u3092\u53d7\u3051\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td>Annex VIII, Part IV, \u00a72<\/td><td><\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><div class=\"ea-advanced-data-table-pagination ea-advanced-data-table-pagination-button clearfix\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2468691523\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2468691523\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-36072da e-flex e-con-boxed e-con e-child\" data-id=\"36072da\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cac983b e-con-full e-flex e-con e-child\" data-id=\"cac983b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17519bf general elementor-widget elementor-widget-heading\" data-id=\"17519bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u306e\u958b\u767a\u8005 <u>open source <\/u> \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f7caf2 elementor-widget elementor-widget-text-editor\" data-id=\"4f7caf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Cyber Resilience Act defines &#8220;f<strong>ree and open-source software&#8221; as<\/strong> <strong>software whose source code is publicly accessible and distributed under a license that allows users to freely access, modify, use, and redistribute the software.<\/strong><\/p><p>An <strong>open-source software steward<\/strong> is a legal entity, distinct from a manufacturer, that plays an ongoing, active role in supporting the development and maintenance of specific software products containing digital elements classified as free and open-source software. As such,\u00a0 open-source software stewrds are not considered manufacturers unless they take on additional commercial functions like product marketing or distribution.<\/p><p><strong>Additonnaly, open-source software stewards are subject to the CRA only when they support the development of products &#8220;intended for commercial activities.&#8221;<\/strong> These activities include integration into commercial services or monetized products. However, the primary focus of open-source software stewards is to support the development of free and open-source software, ensuring its continued evolution and availability. Unlike manufacturers, stewards do not market or brand the software as their own, nor do they derive significant revenue beyond what is necessary to provide free support and maintain the software. Their role is centered around community-driven development and the technical stewardship of the software project, rather than commercial interests.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a56fdff elementor-widget elementor-widget-menu-anchor\" data-id=\"a56fdff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c4243b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5c4243b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-888738a general elementor-widget elementor-widget-heading\" data-id=\"888738a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a2c3b7 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"3a2c3b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"3a2c3b7\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-3a2c3b7 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"3a2c3b7\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td>\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u30b9\u30c1\u30e5\u30ef\u30fc\u30c9\u306f\u3001\u5e02\u5834\u76e3\u8996\u5f53\u5c40\u306e\u8981\u8acb\u306b\u5fdc\u3058\u3066\u3001\u30d5\u30ea\u30fc\u30bd\u30d5 \u30c8\u30a6\u30a7\u30a2\u304a\u3088\u3073\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3068\u3057\u3066\u9069\u683c\u306a\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6301\u3064\u88fd\u54c1 \u304c\u3082\u305f\u3089\u3059\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3059\u308b\u76ee\u7684\u3067\u3001\u5e02\u5834\u76e3\u8996\u5f53\u5c40\u306b\u5354\u529b\u3057\u306a\u3051 \u308c\u3070\u306a\u3089\u306a\u3044\u3002\u5e02\u5834\u76e3\u8996\u5f53\u5c40\u304b\u3089\u306e\u5408\u7406\u7684\u306a\u8981\u8acb\u304c\u3042\u3063\u305f\u5834\u5408\u3001\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u30b9\u30c1\u30e5\u30ef\u30fc\u30c9\u306f\u3001\u540c\u5f53\u5c40\u306b\u5bfe\u3057\u3001\u540c\u5f53\u5c40\u304c\u5bb9\u6613\u306b\u7406\u89e3\u3067\u304d\u308b\u8a00\u8a9e\u3067\u3001\u7d19\u307e\u305f\u306f\u96fb\u5b50\u5f62\u5f0f\u3067\u3001\u7b2c1\u9805\u3067\u8a00\u53ca\u3057\u305f\u6587\u66f8\u3092\u63d0\u4f9b\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td>Article 24 \u00a72<\/td><td>-<\/td><td><\/td><\/tr><tr><td>1<\/td><td>Open-source software stewards shall put in place and document in a verifiable manner a cybersecurity policy to foster the development of a secure product with digital elements as well as an effective handling of vulnerabilities by the developers of that product. That policy shall also foster the voluntary reporting of vulnerabilities as laid down in Article 15 by the developers of that product and take into account the specific nature of the open- source software steward and the legal and organisational arrangements to which it is subject. That policy shall, in particular, include aspects related to documenting, addressing and remediating vulnerabilities and promote the sharing of information concerning discovered vulnerabilities within the open-source community<\/td><td>Article 24 \u00a71<\/td><td>-<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6cb443 elementor-widget elementor-widget-menu-anchor\" data-id=\"f6cb443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"declaration-of-conformity\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b270324 elementor-widget elementor-widget-menu-anchor\" data-id=\"b270324\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general-docu\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a46669 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0a46669\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ae0c78 general elementor-widget elementor-widget-heading\" data-id=\"7ae0c78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Security attestation of free and open-source software<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0767929 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"0767929\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"0767929\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-0767929 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"0767929\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>2<\/td><td><p style=\"margin-left:40px\">For the purpose of complying with paragraph 1, manufacturers shall exercise due diligence when integrating components sourced from third parties so that those components do not compromise the cybersecurity of the product with digital elements, including when integrating components of free and open-source software that have not been made available on the market in the course of a commercial activity.<\/p><\/td><td>Article 13 \u00a75<\/td><td>Requirement for manufacturers<\/td><td><\/td><\/tr><tr><td>1<\/td><td>In order to facilitate the due diligence obligation set out in Article 13(5), in particular as regards manufacturers that integrate free and open-source software components in their products with digital elements, the Commission is empowered to adopt delegated acts in accordance with Article 61 to supplement this Regulation by establishing <b>voluntary security attestation programmes <\/b> allowing the developers or users of products with digital elements qualifying as free and open-source software as well as other third parties to assess the conformity of such products with all or certain essential cybersecurity requirements or other obligations laid down in this Regulation.<\/td><td>Article 25<\/td><td>As of 12.2024 - no delegated act has been published<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-874255d elementor-widget elementor-widget-menu-anchor\" data-id=\"874255d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"technical-documentation\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9d23a6 elementor-widget elementor-widget-menu-anchor\" data-id=\"b9d23a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"authorities\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a6ca13 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7a6ca13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0483618 general elementor-widget elementor-widget-heading\" data-id=\"0483618\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5f53\u5c40\u3068\u306e\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dde3bf elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"6dde3bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"6dde3bf\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-6dde3bf ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"6dde3bf\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30b3\u30e1\u30f3\u30c8<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>7<\/td><td>The obligations laid down in Article 14(3) and (8) shall apply to open-source software stewards to the extent that severe incidents having an impact on the security of products with digital elements affect network and information systems provided by the open-source software stewards for the development of such products.<\/td><td>Article 24 \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>1<\/td><td>The obligations laid down in Article 14(1) shall apply to open-source software stewards to the extent that they are involved in the development of the products with digital elements.<\/td><td>Article 24 \u00a73<\/td><td>-<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA.<\/p><\/td><td>Article 14 \u00a71<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">\u7b2c1\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u306e\u66f8\u985e\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/p><\/td><td>Article 14 \u00a72<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:60px\"> (a) \u6d3b\u767a\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u3044\u304b\u306a\u308b\u5834\u5408\u3067\u3082\u88fd\u9020\u8005\u304c\u305d\u308c\u3092\u8a8d\u8b58\u3057\u3066\u304b\u308924\u6642\u9593\u4ee5\u5185\u306b\u3001\u65e9\u671f\u8b66\u544a\u901a\u77e5\u3092\u884c\u3046\u3053\u3068\uff1b<\/p><\/td><td>Article 14 \u00a72 (a)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:60px\"> (b) unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 \u00a72 (b)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:60px\">(c) unless the relevant information has already been provided, a final report, no later than 14 days after a corrective or mitigating measure is available, including at least the following: (i) a description of the vulnerability, including its severity and impact; (ii) where available, information concerning any malicious actor that has exploited or that is exploiting the vulnerability; (iii) details about the security update or other corrective measures that have been made available to remedy the vulnerability.<\/p><\/td><td>Article 14 \u00a72 (c)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>8<\/td><td><p style=\"margin-left:40px\">A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator and to ENISA.<\/p><\/td><td>Article 14 \u00a73<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>9<\/td><td><p style=\"margin-left:40px\">\u7b2c3\u9805\u306e\u5c4a\u51fa\u306e\u305f\u3081\u306b\u3001\u88fd\u9020\u8005\u306f\u4ee5\u4e0b\u3092\u63d0\u51fa\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff1a<\/p><\/td><td>Article 14 \u00a74<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>10<\/td><td><p style=\"margin-left:60px\">(a) an early warning notification of a severe incident having an impact on the security of the product with digital elements, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, including at least whether the incident is suspected of being caused by unlawful or malicious acts, which shall also indicate, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available;<\/p><\/td><td>Article 14 \u00a74 (a)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>11<\/td><td><p style=\"margin-left:60px\">(b) unless the relevant information has already been provided, an incident notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the incident, which shall provide general information, where available, about the nature of the incident, an initial assessment of the incident, as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be;<\/p><\/td><td>Article 14 \u00a74 (b)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>12<\/td><td><p style=\"margin-left:60px\">(c) unless the relevant information has already been provided, a final report, within one month after the submission of the incident notification under point (b), including at least the following: (i) a detailed description of the incident, including its severity and impact; (ii) the type of threat or root cause that is likely to have triggered the incident; (iii) applied and ongoing mitigation measures.<\/p><\/td><td>Article 14 \u00a74 (c)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>13<\/td><td><p style=\"margin-left:40px\">For the purposes of paragraph 3, an incident having an impact on the security of the product with digital elements shall be considered to be severe where:<\/p><\/td><td>Article 14 \u00a75<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>14<\/td><td><p style=\"margin-left:60px\">(a) it negatively affects or is capable of negatively affecting the ability of a product with digital elements to protect the availability, authenticity, integrity or confidentiality of sensitive or important data or functions; or<\/p><\/td><td>Article 14 \u00a75 (a)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>15<\/td><td><p style=\"margin-left:60px\">(b) it has led or is capable of leading to the introduction or execution of malicious code in a product with digital elements or in the network and information systems of a user of the product with digital elements<\/p><\/td><td>Article 14 \u00a75 (b)<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><tr><td>16<\/td><td><p style=\"margin-left:40px\">After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.<\/p><\/td><td>Article 14 \u00a78<\/td><td>only applicable if the steward is involved in commercial product development<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1939186513\" role=\"tabpanel\" aria-labelledby=\"others\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-514eb60 e-con-full e-flex e-con e-child\" data-id=\"514eb60\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-447dcb0 sticky-cra e-n-tabs-mobile ha-has-bg-overlay elementor-widget elementor-widget-n-tabs\" data-id=\"447dcb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"71818416\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-718184161\" data-tab-title-id=\"e-n-tab-title-718184161\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-718184161\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u8f38\u5165\u696d\u8005\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"manu-critical\" data-tab-title-id=\"e-n-tab-title-718184162\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-718184162\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u8ca9\u58f2\u696d\u8005\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-718184163\" data-tab-title-id=\"e-n-tab-title-718184163\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-718184163\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u518d\u8ca9\u696d\u8005\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-718184161\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-718184161\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-473032e e-con-full e-flex e-con e-child\" data-id=\"473032e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-53d692a e-con-full e-flex e-con e-child\" data-id=\"53d692a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-216e9c6 general elementor-widget elementor-widget-heading\" data-id=\"216e9c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8f38\u5165\u696d\u8005<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ea763d elementor-widget elementor-widget-text-editor\" data-id=\"6ea763d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u5ff5\u306e\u305f\u3081\u4ed8\u8a00\u3057\u3066\u304a\u304f\u3068\u3001CRA\u306f\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8f38\u5165\u8005\u3092\u300c\u57df\u5916\u306b\u8a2d\u7acb\u3055\u308c\u305f\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u306e\u540d\u79f0\u307e\u305f\u306f\u5546\u6a19\u304c\u4ed8\u3055\u308c\u305f\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u5e02\u5834\u306b\u51fa\u3059\u3001\u57df\u5185\u306b\u8a2d\u7acb\u3055\u308c\u305f\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u300d\u3068\u5b9a\u7fa9\u3057\u3066\u3044\u308b\u3002<\/p><p>Important: <strong>Importers who import products with digital elements<\/strong> <span style=\"text-decoration: underline;\"><strong>under their own trademarks<\/strong><\/span> <strong>\u307e\u305f\u306f<\/strong> <span style=\"text-decoration: underline;\"><strong>substantially modify* existing products<\/strong><\/span> <strong>are to be<\/strong> <span style=\"text-decoration: underline;\"><strong>considered to be a manufacturer<\/strong><\/span> <strong>for the purposes of the CRA<\/strong> and shall assume the full set of responsibilities and obligations outlined in Articles 13 and 14 for manufacturers, ensuring the product meets the CRA&#8217;s requirements:<\/p><ul><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1178\">Conducting risk assessments.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1206\">Determining the support period.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1237\">Handling vulnerabilities.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1262\">Notifying authorities about security incidents.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1309\">Drawing up technical documentation.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1344\">Affixing the CE marking.<\/span><\/div><\/li><\/ul><p>\u00a0<\/p><p>* &#8220;Substantial modification&#8221; refers to changes that affect the product&#8217;s compliance with the essential cybersecurity requirements or alter its intended purpose.<\/p><p><strong>\u26a0\ufe0f These importers should refer to the &#8220;hardware manufacturers&#8221; tab or &#8220;software developers&#8221; tab, whichever fits best.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9912c2a elementor-widget elementor-widget-menu-anchor\" data-id=\"9912c2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31ef6a8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"31ef6a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f066f2 general elementor-widget elementor-widget-heading\" data-id=\"3f066f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb326a elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"5cb326a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"5cb326a\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-5cb326a ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"5cb326a\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Importers shall place on the market only products with digital elements that comply with the essential cybersecurity requirements set out in Part I of Annex I and where the processes put in place by the manufacturer comply with the essential cybersecurity requirements set out in Part II of Annex I.<\/td><td>article 19(1)<\/td><td><\/td><\/tr><tr><td>2<\/td><td>Before placing a product with digital elements on the market, importers shall ensure that:<\/td><td>article 19(2)<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">the appropriate conformity assessment procedures (modules A, B, C or H) have been carried out by the manufacturer;<\/p><\/td><td>article 19(2) (a)<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">the manufacturer has drawn up the technical documentation;<\/p><\/td><td>article 19(2) (b)<\/td><td><\/td><\/tr><tr><td>5<\/td><td><p style=\"margin-left:40px\">the product with digital elements bears the CE marking and is accompanied by the EU declaration of conformity and the information and instructions to the user in a language which can be easily understood by users and market surveillance authorities;<\/p><\/td><td>article 19(2) (c)<\/td><td><\/td><\/tr><tr><td>6<\/td><td><p style=\"margin-left:40px\">the manufacturer has complied with the requirements set out in Article 13(15 - product can be identified with a batch number or similar), (16 - manufacturers' contact information) and (19 - end of support period).<\/p><\/td><td>article 19(2) (d)<\/td><td><\/td><\/tr><tr><td>7<\/td><td>Importers shall, for at least 10 years after the product with digital elements has been placed on the market or for the support period, whichever is longer, keep a copy of the EU declaration of conformity at the disposal of the market surveillance authorities and ensure that the technical documentation can be made available to those authorities, upon request.<\/td><td>article 19(6)<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74873a2 elementor-widget elementor-widget-menu-anchor\" data-id=\"74873a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"declaration-of-conformity\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c836aa elementor-widget elementor-widget-menu-anchor\" data-id=\"7c836aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general-docu\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-899e7f0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"899e7f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89ed28f general elementor-widget elementor-widget-heading\" data-id=\"89ed28f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u88fd\u54c1\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ccc66d elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"6ccc66d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"6ccc66d\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-6ccc66d ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"6ccc66d\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Importers shall indicate their name, registered trade name or registered trademark, the postal address, email address or other digital contact as well as, where applicable, the website at which they can be contacted on the product with digital elements or on its packaging or in a document accompanying the product with digital elements. The contact details shall be in a language easily understood by users and market surveillance authorities.<\/td><td>article 19 (4)<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8d32c7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d8d32c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aebc723 general elementor-widget elementor-widget-heading\" data-id=\"aebc723\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5831\u544a\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94d54dc elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"94d54dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"94d54dc\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-94d54dc ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"94d54dc\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Where the importer of a product with digital elements becomes aware that the manufacturer of that product has ceased its operations and, as result, is not able to comply with the obligations laid down in this Regulation, the importer shall inform the relevant market surveillance authorities about this situation, as well as, by any means available and to the extent possible, the users of the products with digital elements placed on the market.<\/td><td>article 19(8)<\/td><td><\/td><\/tr><tr><td>2<\/td><td>Importers shall, further to a reasoned request from a market surveillance authority, provide it with all the information and documentation, in paper or electronic form, necessary to demonstrate the conformity of the product with digital elements with the essential cybersecurity requirements set out in Part I of Annex I as well as of the processes put in place by the manufacturer with the essential cybersecurity requirements set out in Part II of Annex I in a language that can be easily understood by that authority. They shall cooperate with that authority, at its request, on any measures taken to eliminate the cybersecurity risks posed by a product with digital elements, which they have placed on the market.<\/td><td>article 19(7)<\/td><td><\/td><\/tr><tr><td>4<\/td><td>Importers who know or have reason to believe that a product with digital elements which they have placed on the market is not in conformity with this Regulation shall immediately take the corrective measures necessary to ensure that the product with digital elements is brought into conformity with this Regulation, or to withdraw or recall the product, if appropriate. <br>Upon becoming aware of a vulnerability in the product with digital elements, importers shall inform the manufacturer without undue delay about that vulnerability. Furthermore, where the product with digital elements presents a significant cybersecurity risk, importers shall immediately inform the market surveillance authorities of the Member States in which they have made the product with digital elements available on the market to that effect, giving details, in particular, of non-compliance and of any corrective measures taken.<\/td><td>article 19(5)<\/td><td><\/td><\/tr><tr><td>3<\/td><td>Where an importer considers or has reason to believe that a product with digital elements or the processes put in place by the manufacturer are not in conformity with this Regulation, the importer shall not place the product on the market until that product or the processes put in place by the manufacturer have been brought into conformity with this Regulation. Furthermore, where the product with digital elements presents a significant cybersecurity risk, the importer shall inform the manufacturer and the market surveillance authorities to that effect. <br>Where an importer has reason to believe that a product with digital elements may present a significant cybersecurity risk in light of non-technical risk factors, the importer shall inform the market surveillance authorities to that effect. Upon receipt of such information, the market surveillance authorities shall follow the procedures referred to in Article 54(2).<\/td><td>article 19(3)<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8f6790 elementor-widget elementor-widget-menu-anchor\" data-id=\"b8f6790\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"technical-documentation\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02eb4d7 elementor-widget elementor-widget-menu-anchor\" data-id=\"02eb4d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"authorities\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-718184162\" role=\"tabpanel\" aria-labelledby=\"manu-critical\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-8f447ea e-con-full e-flex e-con e-child\" data-id=\"8f447ea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe66901 general elementor-widget elementor-widget-heading\" data-id=\"fe66901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8ca9\u58f2\u696d\u8005<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6630a51 elementor-widget elementor-widget-text-editor\" data-id=\"6630a51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u5ff5\u306e\u305f\u3081\u4ed8\u8a00\u3057\u3066\u304a\u304f\u3068\u3001CRA\u306f\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u8ca9\u58f2\u696d\u8005\u3092\u300c\u88fd\u9020\u696d\u8005\u307e\u305f\u306f\u8f38\u5165\u696d\u8005\u4ee5\u5916\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306b\u5c5e\u3059\u308b\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u305d\u306e\u7279\u6027\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u3053\u3068\u306a\u304f\u9023\u5408\u5e02\u5834\u3067\u5165\u624b\u53ef\u80fd\u306b\u3059\u308b\u8005\u300d\u3068\u5b9a\u7fa9\u3057\u3066\u3044\u308b\uff08\u7b2c3\u6761(17)\uff09\u3002<\/p><p><strong>Important: Distribors who distribute products with digital elements <span style=\"text-decoration: underline;\">under their own trademarks<\/span> \u307e\u305f\u306f <span style=\"text-decoration: underline;\">substantially modify* existing products<\/span> are to be <span style=\"text-decoration: underline;\">considered to be a manufacturer<\/span> for the purposes of the CRA and shall assume the full set of responsibilities and obligations outlined in Articles 13 and 14 for manufacturers, ensuring the product meets the CRA&#8217;s requirements:<\/strong><\/p><ul><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1178\">Conducting risk assessments.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1206\">Determining the support period.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1237\">Handling vulnerabilities.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1262\">Notifying authorities about security incidents.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1309\">Drawing up technical documentation.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1344\">Affixing the CE marking.<\/span><\/div><\/li><\/ul><p>\u00a0<\/p><p>* &#8220;Substantial modification&#8221; refers to changes that affect the product&#8217;s compliance with the essential cybersecurity requirements or alter its intended purpose.<\/p><p><strong>\u26a0\ufe0f These distributors should refer to the &#8220;hardware manufacturers&#8221; tab or &#8220;software developers&#8221; tab, whichever fits best.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b6af7f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8b6af7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dbdd58 general elementor-widget elementor-widget-heading\" data-id=\"6dbdd58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u4e00\u822c\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38c329a elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"38c329a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"38c329a\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-38c329a ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"38c329a\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u3092\u5e02\u5834\u306b\u6d41\u901a\u3055\u305b\u308b\u5834\u5408\u3001\u8ca9\u58f2\u696d\u8005\u306f\u3001\u672c\u898f\u5247\u306b\u898f\u5b9a\u3055\u308c\u308b\u8981\u4ef6\u306b\u95a2\u9023\u3057\u3066\u5341\u5206\u306a\u6ce8\u610f\u3092\u6255\u3063\u3066\u884c\u52d5\u3059\u308b\u3082\u306e\u3068\u3059\u308b\u3002<\/td><td>article 20(1)<\/td><td><\/td><\/tr><tr><td>2<\/td><td>Before making a product with digital elements available on the market, distributors shall verify that:<\/td><td>article 20(2)<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">the product with digital elements bears the CE marking;<\/p><\/td><td>article 20(2) (a)<\/td><td><\/td><\/tr><tr><td>4<\/td><td><p style=\"margin-left:40px\">the manufacturer and the importer have complied with the obligations set out in Article 13(15 - product can be identified with a batch number or similar), (16 - manufacturers' contact information), (18 - products are sold will all required documentation), (19 - end of support period), and (20 - EU Declaration of Conformity) and Article19(4 - importer has provided their contact information on the product), and have provided all necessary documents to the distributor.<\/p><\/td><td>article 20(2) (b)<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-638e8c5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"638e8c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d62cc54 general elementor-widget elementor-widget-heading\" data-id=\"d62cc54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5831\u544a\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0c7ab elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"7c0c7ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"7c0c7ab\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-7c0c7ab ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"7c0c7ab\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Where a distributor considers or has reason to believe, on the basis of information in its possession, that a product with digital elements or the processes put in place by the manufacturer are not in conformity with the essential cybersecurity requirements set out in Annex I, the distributor shall not make the product with digital elements available on the market until that product or the processes put in place by the manufacturer have been brought into conformity with this Regulation. Furthermore, where the product with digital elements poses a significant cybersecurity risk, the distributor shall inform, without undue delay, the manufacturer and the market surveillance authorities to that effect.<\/td><td>article 20(3)<\/td><td><\/td><\/tr><tr><td>2<\/td><td>Distributors who know or have reason to believe, on the basis of information in their possession, that a product with digital elements, which they have made available on the market, or the processes put in place by its manufacturer are not in conformity with this Regulation shall make sure that the corrective measures necessary to bring that product with digital elements or the processes put in place by its manufacturer into conformity, or to withdraw or recall the product, if appropriate, are taken. <br>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306b\u8106\u5f31\u6027\u304c\u3042\u308b\u3053\u3068\u3092\u77e5\u3063\u305f\u5834\u5408\u3001\u8ca9\u58f2\u696d\u8005\u306f\u305d\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u904e\u5ea6\u306a\u9045\u6ede\u306a\u304f\u88fd\u9020\u696d\u8005\u306b\u901a\u77e5\u3059\u308b\u3082\u306e\u3068\u3059\u308b\u3002\u3055\u3089\u306b\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u4ed8\u304d\u88fd\u54c1\u304c\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u3092\u3082\u305f\u3089\u3059\u5834\u5408\u3001\u8ca9\u58f2\u696d\u8005\u306f\u3001\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u4ed8\u304d\u88fd\u54c1\u3092\u5e02\u5834\u306b\u63d0\u4f9b\u3057\u3066\u3044\u308b\u52a0\u76df\u56fd\u306e\u5e02\u5834\u76e3\u8996\u5f53\u5c40\u306b\u76f4\u3061\u306b\u305d\u306e\u65e8\u3092\u901a\u77e5\u3057\u3001\u7279\u306b\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u306e\u8a73\u7d30\u304a\u3088\u3073\u8b1b\u3058\u3089\u308c\u305f\u662f\u6b63\u63aa\u7f6e\u306b\u3064\u3044\u3066\u5831\u544a\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td>article 20(4)<\/td><td><\/td><\/tr><tr><td>3<\/td><td>Distributors shall, further to a reasoned request from a market surveillance authority, provide all the information and documentation, in paper or electronic form, necessary to demonstrate the conformity of the product with digital elements and the processes put in place by its manufacturer with this Regulation in a language that can be easily understood by that authority. They shall cooperate with that authority, at its request, on any measures taken to eliminate the cybersecurity risks posed by a product with digital elements which they have made available on the market<\/td><td>article 20(5)<\/td><td><\/td><\/tr><tr><td>4<\/td><td>\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306e\u8ca9\u58f2\u696d\u8005\u304c\u3001\u305d\u306e\u4fdd\u6709\u3059\u308b\u60c5\u5831\u306b\u57fa\u3065\u304d\u3001\u5f53\u8a72\u88fd\u54c1\u306e\u88fd\u9020\u696d\u8005\u304c\u64cd\u696d\u3092\u505c\u6b62\u3057\u3001\u305d\u306e\u7d50\u679c\u3001\u672c\u898f\u5247\u306b\u5b9a\u3081\u308b\u7fa9\u52d9\u3092\u9075\u5b88\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u306a\u3044\u3053\u3068\u3092\u8a8d\u8b58\u3057\u305f\u5834\u5408\u3001\u5f53\u8a72\u8ca9\u58f2\u696d\u8005\u306f\u3001\u5f53\u8a72\u5e02\u5834\u76e3\u8996\u5f53\u5c40\u306b\u5bfe\u3057\u3001\u904e\u5ea6\u306e\u9045\u6ede\u306a\u304f\u3001\u5f53\u8a72\u72b6\u6cc1\u3092\u901a\u77e5\u3059\u308b\u3068\u3068\u3082\u306b\u3001\u5229\u7528\u53ef\u80fd\u306a\u3042\u3089\u3086\u308b\u624b\u6bb5\u306b\u3088\u308a\u3001\u304b\u3064\u3001\u53ef\u80fd\u306a\u9650\u308a\u3001\u5e02\u5834\u306b\u7f6e\u304b\u308c\u305f\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u6709\u3059\u308b\u88fd\u54c1\u306e\u4f7f\u7528\u8005\u306b\u3082\u901a\u77e5\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3002<\/td><td>article 20(6) <\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-718184163\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-718184163\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-bd9152a e-flex e-con-boxed e-con e-child\" data-id=\"bd9152a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9931231 e-con-full e-flex e-con e-child\" data-id=\"9931231\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce5e064 general elementor-widget elementor-widget-heading\" data-id=\"ce5e064\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u518d\u8ca9\u696d\u8005\uff0f\u305d\u306e\u4ed6\u306e\u7d4c\u6e08\u4e3b\u4f53<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93205 elementor-widget elementor-widget-text-editor\" data-id=\"4d93205\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CRA\u306f\u300c\u518d\u8ca9\u696d\u8005\u300d\u3068\u3044\u3046\u7528\u8a9e\u3092\u76f4\u63a5\u5b9a\u7fa9\u3057\u3066\u304a\u3089\u305a\u3001\u305d\u306e\u4ee3\u308f\u308a\u306b\u300c\u7d4c\u6e08\u4e8b\u696d\u8005\u300d\u3068\u3044\u3046\u7528\u8a9e\u306e\u5b9a\u7fa9\u3001\u7279\u306b\u5b9a\u7fa9\u306e\u5f8c\u534a\u306b\u6ce8\u76ee\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3001 <span style=\"text-decoration: underline;\">\u30c7\u30b8\u30bf\u30eb\u8981\u7d20\u3092\u542b\u3080\u88fd\u54c1\u306e\u88fd\u9020\u307e\u305f\u306f\u672c\u898f\u5247\u306b\u5f93\u3063\u305f\u88fd\u54c1\u306e\u5e02\u8ca9\u306b\u95a2\u9023\u3057\u3066\u7fa9\u52d9\u3092\u8ca0\u3046\u81ea\u7136\u4eba\u307e\u305f\u306f\u6cd5\u4eba<\/span>\u7b2c3\u6761(12)\u3002<\/p><p><strong>Important: Resellers who resell products with digital elements <span style=\"text-decoration: underline;\">under their own trademarks<\/span> \u307e\u305f\u306f <span style=\"text-decoration: underline;\">substantially modify* existing products<\/span> are to be <span style=\"text-decoration: underline;\">considered to be a manufacturer<\/span> for the purposes of the CRA and shall assume the full set of responsibilities and obligations outlined in Articles 13 and 14 for manufacturers, ensuring the product meets the CRA&#8217;s requirements:<\/strong><\/p><ul><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1178\">Conducting risk assessments.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1206\">Determining the support period.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1237\">Handling vulnerabilities.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1262\">Notifying authorities about security incidents.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1309\">Drawing up technical documentation.<\/span><\/div><\/li><li><div class=\"bullet normal ng-star-inserted\"><span class=\"ng-star-inserted\" data-start-index=\"1344\">Affixing the CE marking.<\/span><\/div><\/li><\/ul><p>\u00a0<\/p><p>* &#8220;Substantial modification&#8221; refers to changes that affect the product&#8217;s compliance with the essential cybersecurity requirements or alter its intended purpose.<\/p><p><strong>\u26a0\ufe0f These resellers should refer to the &#8220;hardware manufacturers&#8221; tab or &#8220;software developers&#8221; tab, whichever fits best.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23896f2 elementor-widget elementor-widget-menu-anchor\" data-id=\"23896f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10a59e9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"10a59e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2886fe3 general elementor-widget elementor-widget-heading\" data-id=\"2886fe3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Case when an economic operator becomes a manufacturer<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf9b43e elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"cf9b43e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"cf9b43e\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-cf9b43e ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"cf9b43e\"><thead><tr><th style=\"width:\">\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th style=\"width:\">\u5fc5\u8981\u6761\u4ef6<\/th><th style=\"width:\">\u53c2\u8003<\/th><th style=\"width:\">\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>A natural or legal person, other than the manufacturer, the importer or the distributor, that carries out a substantial modification of a product with digital elements and makes that product available on the market, shall be considered to be a manufacturer for the purposes of this Regulation.<\/td><td>article 22(1)<\/td><td><\/td><\/tr><tr><td>2<\/td><td>The person referred to in paragraph 1 of this Article shall be subject to the obligations set out in Articles 13 (obligations of the manufacturer) and 14 (reporting obligations) for the part of the product with digital elements that is affected by the substantial modification or, if the substantial modification has an impact on the cybersecurity of the product with digital elements as a whole, for the entire product.<\/td><td>article 22(2)<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec78561 elementor-widget elementor-widget-menu-anchor\" data-id=\"ec78561\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"declaration-of-conformity\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9ca251 elementor-widget elementor-widget-menu-anchor\" data-id=\"a9ca251\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"general-docu\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd252fa elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bd252fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9d779e elementor-widget elementor-widget-menu-anchor\" data-id=\"c9d779e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"technical-documentation\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-089dc7a elementor-widget elementor-widget-menu-anchor\" data-id=\"089dc7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"authorities\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eed7b3 general elementor-widget elementor-widget-heading\" data-id=\"7eed7b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u5831\u544a\u8981\u4ef6<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df53da9 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"df53da9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"df53da9\"><div class=\"ea-advanced-data-table-search-wrap ea-advanced-data-table-search-right\"><input type=\"search\" placeholder=\"\u691c\u7d22\" class=\"ea-advanced-data-table-search\"><\/div><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-ninja ea-advanced-data-table-df53da9 ea-advanced-data-table-sortable ea-advanced-data-table-searchable\" data-id=\"df53da9\"><thead><tr><th>\u8eab\u5206\u8a3c\u660e\u66f8<\/th><th>\u5fc5\u8981\u6761\u4ef6<\/th><th>\u53c2\u8003<\/th><th>\u30c1\u30a7\u30c3\u30af<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Economic operators shall, on request, provide the market surveillance authorities with the following information:<\/td><td>article 23(1)<\/td><td><\/td><\/tr><tr><td>2<\/td><td><p style=\"margin-left:40px\">the name and address of any economic operator who has supplied them with a product with digital elements;<\/p><\/td><td>article 23(1) (a)<\/td><td><\/td><\/tr><tr><td>3<\/td><td><p style=\"margin-left:40px\">where available, the name and address of any economic operator to whom they have supplied a product with digital elements.<\/p><\/td><td>article 23(1) (b)<\/td><td><\/td><\/tr><tr><td>4<\/td><td>Economic operators shall be able to present the information referred to in paragraph 1 for 10 years after they have been supplied with the product with digital elements and for 10 years after they have supplied the product with digital elements.<\/td><td>article 23(2)<\/td><td><\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-310c860 e-flex e-con-boxed e-con e-parent\" data-id=\"310c860\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5493a1e e-con-full e-flex e-con e-child\" data-id=\"5493a1e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<a class=\"eael-wrapper-link-68abe3e --eael-wrapper-link-tag\" href=\"https:\/\/www.cyberresilienceact.eu\/ja\/cra-compliance-cost-calculator\/\"><\/a>\t\t<div data-eael-wrapper-link=\"eael-wrapper-link-68abe3e\" class=\"elementor-element elementor-element-68abe3e elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"68abe3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default translation-block\"><a href=\"https:\/\/www.cyberresilienceact.eu\/ja\/cra-compliance-cost-calculator\/\" target=\"_self\">CRA\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30b3\u30b9\u30c8\u8a08\u7b97\u30c4\u30fc\u30eb\u3092\u6d3b\u7528\u3059\u308b\n\u2192<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f113a59 elementor-widget elementor-widget-text-editor\" data-id=\"f113a59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u4e88\u7b97\u3092\u78ba\u8a8d\u3059\u308b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Compliance Checklist Protect your data, get rid of vulnerabilities and prepare against threats: take the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready! Identify any requirements that may be missing to take swift action and be ready on time. RELATED LINKS Read the full text The CRA, explained Go to the EU&#8217;s website Hardware manufacturers Software developers Importers, distributors, resellers. Non-important products Important and Critical products Manufacturers of non-IMPORTANT products Manufacturers of products not classified as Critical Products or Important Products Class II can self-assess their compliance with the CRA&#8217;s requirements. You can check Annex III of the Regulation for a list [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1030","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data security - The Cyber Resilience Act Compliance Checklist<\/title>\n<meta name=\"description\" content=\"Protect your data and use the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberresilienceact.eu\/ja\/compliance-matrix\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cyber Resilience Act compliance checklist\" \/>\n<meta property=\"og:description\" content=\"Take the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberresilienceact.eu\/ja\/compliance-matrix\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Act\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T00:56:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/unseen-studio-s9CC2SKySJM-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Resilience Act Compliance Checklist\" \/>\n<meta name=\"twitter:description\" content=\"Take the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/unseen-studio-s9CC2SKySJM-unsplash.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/\",\"name\":\"Data security - The Cyber Resilience Act Compliance Checklist\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg\",\"datePublished\":\"2023-05-19T04:35:31+00:00\",\"dateModified\":\"2025-01-17T00:56:16+00:00\",\"description\":\"Protect your data and use the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#primaryimage\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg\",\"contentUrl\":\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberresilienceact.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance matrix\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#website\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/\",\"name\":\"Cyber Resilience Act\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberresilienceact.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#organization\",\"name\":\"Cyber Resilience Act\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png\",\"contentUrl\":\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png\",\"width\":776,\"height\":87,\"caption\":\"Cyber Resilience Act\"},\"image\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data security - The Cyber Resilience Act Compliance Checklist","description":"Protect your data and use the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberresilienceact.eu\/ja\/compliance-matrix\/","og_locale":"ja_JP","og_type":"article","og_title":"The Cyber Resilience Act compliance checklist","og_description":"Take the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !","og_url":"https:\/\/www.cyberresilienceact.eu\/ja\/compliance-matrix\/","og_site_name":"Cyber Resilience Act","article_modified_time":"2025-01-17T00:56:16+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/unseen-studio-s9CC2SKySJM-unsplash.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Cyber Resilience Act Compliance Checklist","twitter_description":"Take the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !","twitter_image":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/unseen-studio-s9CC2SKySJM-unsplash.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/","url":"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/","name":"Data security - The Cyber Resilience Act Compliance Checklist","isPartOf":{"@id":"https:\/\/www.cyberresilienceact.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg","datePublished":"2023-05-19T04:35:31+00:00","dateModified":"2025-01-17T00:56:16+00:00","description":"Protect your data and use the Cyber Resilience Act compliance checklist to verify if your company,\u00a0 product or software are CRA ready !","breadcrumb":{"@id":"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#primaryimage","url":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg","contentUrl":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/pexels-dusan-cvetanovic-12541589-1024x683.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberresilienceact.eu\/compliance-matrix\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberresilienceact.eu\/"},{"@type":"ListItem","position":2,"name":"Compliance matrix"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberresilienceact.eu\/#website","url":"https:\/\/www.cyberresilienceact.eu\/","name":"Cyber Resilience Act","description":"","publisher":{"@id":"https:\/\/www.cyberresilienceact.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberresilienceact.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.cyberresilienceact.eu\/#organization","name":"Cyber Resilience Act","url":"https:\/\/www.cyberresilienceact.eu\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png","contentUrl":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png","width":776,"height":87,"caption":"Cyber Resilience Act"},"image":{"@id":"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/pages\/1030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/comments?post=1030"}],"version-history":[{"count":10,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/pages\/1030\/revisions"}],"predecessor-version":[{"id":5899,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/pages\/1030\/revisions\/5899"}],"wp:attachment":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/media?parent=1030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}