Legal DevOps · Tech Compliance

we regulate
your complexity.

Compliance Intelligence

Edificio moderno con linee geometriche — approccio Legal Engineering alla consulenza tech per startup
Approach

Compliance By Design

Regulatory compliance is not an obstacle: it's a product quality element, to be integrated from the design stage.

Integrated in the product

Compliance enters the development process as a functional requirement with verifiable acceptance criteria.

Scalable with the business (proportional to real risk)

A regulatory framework built on your company's actual risk profile, not on generic checklists. From seed startup to scale-up with 50 sub-processors and ISO 27001 audit: the structure adapts without complete rewrites.

Collaborative and measurable (with your team's tools)

I work with GitHub, Linear, Notion, Slack. Regulatory requirements are Issues, not PDF reports. Compliance becomes something the team monitors and improves, not something managed only by the legal department.

Being compliant with European standards means being ready for any client, in any market.

Focus: European Data Economy

Data Economy.
Four rules.
One ecosystem.

GDPR, Data Act, Data Governance Act, ePrivacy: your product operates at the intersection of all four. They are not separate compliance boxes to tick on a checklist — they are a single regulatory system governing every European data flow, personal and non-personal. Knowing one without the others is the fastest way to be compliant on paper and exposed in reality.

The regulatory system governing every European data point

Your product produces data. It collects, processes, transfers, shares it with sub-processors, analyses it to improve features, sends it to AWS, Stripe, Segment, OpenAI. Every step is regulated, and the perimeter has expanded radically in recent years.

GDPR is the foundation. But from 2023 onwards, the European legislator has built an ecosystem of new regulations around it, extending governance to non-personal data, industrial data, and electronic communications. Ignoring the Data Act because "we don't handle personal IoT data" or the DGA because "we're not a data marketplace" is a mistake you pay for during enterprise due diligence or the first contract with a banking client.

Our approach treats data governance as an architectural layer of the product: regulatory requirements enter the data model, integration pipeline and supplier contracts — not as constraints added after the fact, but as functional specifications from the first user story.

The system in four regulations

GDPR EU Reg. 2016/679

The foundation of the ecosystem. Governs every processing of personal data: collection, storage, processing, transfer. Data subject rights (access, erasure, portability, objection), controller accountability with processing records, legal basis for each processing, notification obligations in case of data breach within 72h.

La protezione dei dati deve essere integrata nel sistema fin dalla progettazione e le impostazioni predefinite devono essere le più rispettose della privacy: non sono raccomandazioni — sono obblighi con impatto diretto sull'architettura del prodotto. Questo significa che la retention policy si decide quando si progetta il DB schema, non quando arriva il Garante.

Watch the pseudonymisation boundary: pseudonymised data in your analytics or ML system is not automatically outside the GDPR. If your system can link it back to a specific individual — even indirectly — it remains personal data. Before excluding it from compliance scope, a specific technical assessment is required.

For SaaS startups: GDPR is not just a privacy policy and cookie banner — it's the consent architecture, the retention policy in the DB schema, the DPAs with every sub-processor, the Data Breach Response Plan tested before you need it.

Data Act EU Reg. 2023/2854 (in force from September 2025)

The Data Act changes the game for connected hardware manufacturers: your customers now have the right to take data generated by their device's use and give it to a direct competitor. This is not a theoretical scenario — it's an enforceable right from September 2025. How do you manage it contractually? How does it impact the architecture of your data value-added service?

For those processing or commercialising third-party IoT data: the new access and sharing rules change your contractual position relative to the hardware manufacturers. Verify before the next renegotiation.

For cloud providers: the Data Act introduces portability and switching obligations. For enterprise clients using your SaaS on a single cloud: the lock-in clauses you have today may not hold up against the new portability standards.

For SaaS in the healthcare sector: the European Health Data Space introduces specific secondary portability and research access obligations. If you handle health data, the perimeter has already expanded.

DGA Data Governance Act — EU Reg. 2022/868 (in force from September 2023)

If your product aggregates datasets from multiple sources, facilitates data sharing between companies, or acts as a data marketplace, the DGA classifies you as a "data intermediation service provider" with registration, activity separation and neutrality requirements. This is not an intuitive category — many startups that fall within it don't know it yet.

The DGA and the Data Act don't overlap: the DGA regulates those who facilitate sharing (intermediaries), the Data Act regulates rights over specific data categories (those generated by connected products). A company building a B2B service on IoT data must understand both, because non-compliance risks come from different directions.

ePrivacy Dir. 2002/58/EC and proposed Regulation (under revision)

The framework the Italian DPA applies in its inspections on cookies and behavioural tracking. The proposed ePrivacy Regulation has been stalled since 2017, but the DPA isn't waiting: it has already issued significant fines for cookie walls, dark patterns and non-compliant CMP configurations. Don't wait for the final regulation to fix your banner.

Data governance becomes a functional requirement of the software. I work directly with your technical team — not downstream of their work, but from the first user story. Regulatory requirements enter the DB schema before the first migration, the DPAs before the sub-processor integration, the CMP before go-live.

The result is a product that doesn't accumulate compliance debt: every new feature is born already assessed for its regulatory impact, every new supplier is qualified before integration, every extra-EU transfer has its legal basis documented.

Services

DPO as a Service

Formal appointment as external Data Protection Officer under art. 37 GDPR. Official point of contact with the Data Protection Authority, ongoing compliance monitoring, management of data subject requests (DSAR: access, erasure, portability, objection), team training, compliance metrics reporting. Scalable model: retainer calibrated to your company's stage, expandable without hiring constraints. Not a generalist DPO — a DPO with direct expertise in SaaS architectures, API economy and cloud providers.

Privacy Architecture Review

Technical-legal analysis of the product architecture against GDPR and Data Act requirements: mapping all data flows (from user input to S3 bucket, through every microservice and third-party API call), identifying legal bases for each processing, analysing retention policies implemented in the DB schema, verifying data minimisation. Includes verifying the personal/pseudonymised data boundary for analytics and ML systems: data that doesn't directly identify the user is not automatically outside the GDPR.

Technical DPIA

Data Protection Impact Assessment for high-risk processing: large-scale behavioural profiling, systematic monitoring, processing of special categories (health, biometric, judicial data). The DPIA is built on the system's real architecture, with a threat model of risks to data subjects' rights, analysis of implemented technical mitigation measures (encryption, pseudonymisation, access control) and proportionality assessment. A document that holds up in the event of an inspection or challenge.

Data Breach Response

Structured incident response procedure: risk level assessment for data subjects' rights, notification to the DPA within 72h with complete incident documentation, communication to data subjects when risk is high, remediation plan and post-incident review. The service includes an emergency channel with response SLA in the first hours — because the quality of the notification and the outcome of any investigation are decided in the first 24h from incident identification.

Vendor Risk & Transfer Impact Assessment

Mapping and qualification of all sub-processors: AWS, GCP, Stripe, HubSpot, Intercom, Mixpanel, Segment, Sentry, OpenAI, Anthropic and every other processor acting on your behalf. Negotiation and drafting of Data Processing Agreements. Standard Contractual Clauses for extra-EU transfers. Transfer Impact Assessment for flows to the USA, UK and third countries. The processing record is built and maintained as a living document, updated with every new integration.

Consent & Cookie Compliance

Consent strategy implementation compliant with the Italian DPA 2021 guidelines: Consent Management Platform configuration, privacy-safe default verification, cookie banner and cookie wall audit, third-party tag analysis (Google Tag Manager, Meta Pixel, LinkedIn Insight Tag, Hotjar). For every third-party script: legal basis, cookie category, consent implications. Consent collected must be documented, granular and revocable as easily as it was given.

FAQ

Does the Data Act apply to us? We build software, not hardware.
If you only build SaaS software without hardware, you're not the direct target. The problem is upstream: your customers who manufacture connected devices have new data sharing obligations that will change their integration architectures — and consequently their contracts with you. If your SaaS is part of an enterprise IoT ecosystem, start now to understand how the new data access rights are reshaping flows and contractual relationships between the parties involved.
We already have a privacy policy. Are we covered?
The privacy policy is just the visible surface of GDPR compliance. What the DPA verifies in an inspection is the underlying level: the processing record actually completed, the documented legal basis for each processing, DPAs signed with all sub-processors, real procedures for managing DSARs and data breaches. A well-written privacy policy without an underlying architecture is a paper shield.
When is the obligation to appoint a DPO triggered?
The obligation is triggered in three cases: public authority, systematic large-scale monitoring of data subjects as the core activity, large-scale processing of special categories. For SaaS startups the obligation is typically triggered when the core business is behavioural profiling, predictive analytics or health data processing. Even without a formal obligation, voluntary appointment is advisable: it is viewed positively by the DPA and signals organisational maturity to investors.
Usiamo dati sintetici per l'addestramento dei modelli. Siamo fuori dal GDPR?
Non automaticamente. I dati sintetici escono dal perimetro GDPR solo se garantiscono l'impossibilità pratica di re-identificazione rispetto ai dati originali — e questa soglia va dimostrata tecnicamente, non solo affermata. Se usi dati sintetici derivati da dataset di dati personali, una valutazione specifica è necessaria prima di usarli come alternativa al consenso.
What changes for us with the Data Act in force from September 2025?
It depends on who your clients are. If they produce or use connected hardware, their data sharing architectures will change — and so will their contracts with you. If you're a cloud provider or manage hosting services, the new portability and switching obligations will impact your contractual clauses. If you're a SaaS in the healthcare sector, the European Health Data Space ecosystem has already expanded your obligations perimeter. Verify before the next contract renegotiation.

Where do you stand on the European Data Economy?

A 30-minute call to map your data flows against GDPR, Data Act and DGA: which regulations apply to your product, what the real exposures are, and what concrete steps to take in the next 90 days. No commitment.

Prenota la call →
Focus: AI Act · Machinery Regulation · Cyber Resilience Act

AI Act & Machinery.
The future is already
regulated.

If you build robots, autonomous systems or machines with integrated AI, you are operating at the intersection of three overlapping European regulations: the AI Act, the Machinery Regulation and — from 2027 — the Cyber Resilience Act. Knowing just one is not enough. And almost no one knows all three.

Three regulations, one product

Until 2024, industrial machine manufacturers had a single reference framework: the Machinery Directive with its CE marking. Today that framework is no longer sufficient. If the machine integrates AI, a second compliance layer is required — the AI Act. If it has updatable software components, from December 2027 the Cyber Resilience Act will also apply.

The practical result is a multiple compliance regime: the machine must be safe as hardware (Machinery Regulation, CE marking), compliant as an AI system (risk classification, technical documentation, human oversight, FRIA) and (from 2027) cyber-resilient as a product with digital elements (security by design, vulnerability disclosure, patch support for the entire commercial lifetime).

Those who don't build the technical documentation in an integrated way from the first release end up doing a complete rewrite before the enterprise launch. The cost is not linear: it is much higher if addressed after the fact.

The new Product Liability Directive adds a further risk layer: a bug in the ML model that causes an incident is no longer just a technical issue, but a potential civil liability for the manufacturer. Legal due diligence on software and AI is not optional — it is part of the product.

The frameworks at their intersection

AI Act EU Reg. 2024/1689

Four risk categories. For industrial machines, the critical point is Annex III: AI systems used as safety components are classified as high-risk, with technical documentation obligations, EU database registration, robustness testing, mandatory human oversight and FRIA. Incorrect downward classification is the most penalised type of non-compliance.

If you integrate a general-purpose AI model (an LLM, for example) in your machine for voice interfaces or decision support: verify that the model meets the transparency obligations on training data required for these models. If it is not compliant, liability may fall on you as the deployer.

Intersection The dual regime for AI-enabled robots

Una macchina con componente AI ad alto rischio deve soddisfare contemporaneamente: i requisiti essenziali di sicurezza del Regolamento Macchine, inclusi quelli per macchine con funzioni di apprendimento automatico (Allegato I, sezione 1.1.9); e i requisiti AI Act: documentazione tecnica Allegato IV, log automatici verificabili, misure di supervisione umana, post-market monitoring. Le due conformità condividono alcune evidenze documentali ma richiedono strutture distinte — costruirle separatamente duplica il lavoro senza aggiungere valore.

Machinery Reg. EU Reg. 2023/1230 (applicable from January 2027)

Replaces the Machinery Directive with an updated framework that includes machines with machine-learning capabilities. The new essential safety requirements for "self-evolving" machines require that safety behaviours remain predictable and verifiable even after training and model update phases. Every project starting today should account for this: it is far less costly than doing a complete revision in 18 months.

CRA Cyber Resilience Act — EU Reg. 2024/2847 (applicable from December 2027)

From December 2027, all products with digital elements (including robots and autonomous systems with software components) must meet cybersecurity-by-design requirements: security must be built into the product from the design stage, not added later. Concrete obligations: structured vulnerability management, security patch support for the entire commercial lifetime of the product, ENISA notification within 24h of actively exploited vulnerabilities. For those building robots with remotely updatable firmware: every software component falls within the CRA perimeter. Building the technical documentation today in an integrated way with the Machinery Regulation and the AI Act (instead of three separate processes) is the most efficient choice.

Key deadlines

DateEvent
Feb 2025AI Act: absolute prohibitions in force (real-time biometric identification, subliminal manipulation, social scoring).
Aug 2026AI Act: full application for high-risk systems (Annex III). FRIA, technical documentation, EU registration. Penalties: up to €15M or 3% of turnover.
Jan 2027Machinery Regulation 2023/1230 replaces Machinery Directive 2006/42/CE.
Dec 2027Cyber Resilience Act: full application. Security by design, vulnerability disclosure, mandatory patch support.

Services

AI Risk Classification Report

Analysis of the AI system against the four risk categories of the regulation, with focus on Annex III for safety components in machinery. Mapping of the declared intended purpose and the reasonably foreseeable misuse — because the AI Act assesses risk on actual use cases, not just declared ones. Verification of the interaction between AI Act classification and classification under the Machinery Regulation. Analysis of the applicable regime for any general-purpose models integrated into the system.

Output: classification memo with a defensible position before the market surveillance authority, map of applicable obligations, and compliance roadmap prioritised for the next 18 months.

CE Marking & Integrated Technical Documentation

Management of technical documentation for multi-regime systems: Machinery Regulation, AI Act, Cyber Resilience Act. Building integrated documentation that satisfies all frameworks without duplication — same documentary evidence, distinct structures where required. Defining the compliance path: self-declaration vs. involvement of a Notified Body for high-risk categories.

A critical issue in building technical documentation is the gap between the obligation to control and the actual power to control. The AI Act imposes human oversight requirements (Art. 14), but an AI system may be designed in a way that makes such oversight difficult or impossible to exercise in practice. A machine processing hundreds of signals per second in industrial environments cannot be "supervised" by a human operator in the traditional sense. The technical documentation must address this explicitly: define what type of supervision is technically exercisable on that specific system, under what operational conditions, and at what frequency. Failing to document this analysis risks not satisfying the regulatory requirement.

FRIA — Fundamental Rights Impact Assessment

Mandatory fundamental rights impact assessment for high-risk AI systems. For industrial machinery: analysis of the rights of persons who interact with or are affected by the machine (operators, workers, third parties in the operational environment). Analysis of systematic biases in training data for safety-critical functions. Document designed to be updated with every significant change to the system.

Product Liability & AI Civil Liability

Documentation strategy to demonstrate due diligence in the design and monitoring of the AI system. Contractual structure along the supply chain: indemnity clauses between the machine manufacturer, AI component supplier, and distributor. Analysis of insurance coverage against the new liability regime for products with software and AI components.

Two structural dynamics make civil liability in AI systems more complex than in traditional products. The first is the many hands problem: the development chain involves dozens of actors — no one has full control, no one has visibility over every component. In the event of an incident, this fragmentation creates a liability vacuum that the contractual structure must address explicitly. The second is the risk of the moral crumple zone: in a system where an operator is nominally responsible for oversight but in practice cannot exercise real control over the AI system's output, that operator absorbs the legal burden in case of an incident. The technical documentation must precisely define the effective perimeter of human control exercisable in the real operational context.

Training Data & Model IP

Analysis of training dataset composition: origin, licences, presence of copyright-protected or trade-secret data. Review of open-source licences for base models and usage restrictions for commercial and high-risk applications. Protection of proprietary model intellectual property: trade secret, IP assignment in contracts with employees and contractors. Compliance with training data transparency obligations for general-purpose models.

CRA Readiness Assessment

Analysis of the product against the Cyber Resilience Act requirements in preparation for the December 2027 deadline: attack surface mapping, security-by-design architecture review, vulnerability disclosure policy analysis, patch release procedure verification. For robot manufacturers: the CRA overlaps with the Machinery Regulation's post-market surveillance obligations and the AI Act's monitoring requirements — an integrated system is more efficient than three separate processes.

Post-Market Monitoring & Incident Reporting

Design of the in-production monitoring system required by the AI Act: performance KPIs, alert thresholds for performance degradation, model update procedure that does not trigger a new conformity assessment. Incident reporting: serious malfunctions must be notified to the national market surveillance authority. Integration with the Machinery Regulation's post-market surveillance obligations and the CRA's vulnerability disclosure requirements.

Who it's designed for

Industrial robot and cobot manufacturers — Collaborative robots with adaptive functions, pick-and-place systems with computer vision, robotic arms with ML-based trajectory planning. The AI component is almost certainly a safety component under the AI Act: high risk, Annex III.

Autonomous system and AMR manufacturers — Autonomous Mobile Robots and AGVs with ML-based navigation for industrial or logistics environments. Movement autonomy in environments shared with people triggers specific requirements under both the Machinery Regulation and the AI Act.

Robotics and deep tech startups — Teams developing robotic platforms for agriculture, construction, healthcare, defence, or space. The multi-framework regulatory regime impacts system design from the start: retrofitting an architecture for compliance is far more costly than building it compliant from the first release.

AI system integrators in existing machinery — Those adding an AI layer (computer vision, anomaly detection, predictive maintenance) to already-certified machines. Integrating a high-risk AI component may require a new conformity assessment of the entire machine, and from 2027 a review of CRA documentation if the product has remotely updatable software components.

FAQ

I already have CE marking for my machine. Do I need to do anything for the AI Act?
CE marking does not cover AI Act compliance. If the AI system falls within high risk — typically because it is a safety component of the machine — additional technical documentation, registration in the EU database, a logging and monitoring system, and a FRIA are required. CE marking remains valid for mechanical safety, but AI Act compliance is a separate obligation. From 2027, also check CRA requirements for updatable software components.
My model improves over time (online learning). Does every update require a new conformity assessment?
Not necessarily, but it depends on the extent of the change. The AI Act distinguishes between "substantial" modifications and minor updates. The initial technical documentation must describe the boundaries within which the model can update without requiring a new assessment — designing this threshold in advance is far more efficient than evaluating it case by case. The CRA from 2027 adds specific requirements: every security patch must be documented according to the vulnerability disclosure procedure.
We are a startup. Can we afford the multi-framework regulatory regime?
The cost of compliance is inversely proportional to how early you integrate it. An architecture that starts with correct technical documentation, a logging system, and monitoring procedures costs marginally more in the development phase, and saves a complete rewrite before the enterprise launch. Enterprise markets and investment funds increasingly require evidence of AI Act and CRA readiness as a condition for signing.
The Machinery Regulation replaces the Directive from 2027. What should I do now?
Every new project starting today should be designed with the new requirements in mind: it is far less costly than a complete revision in 18 months. Already factor in the CRA (December 2027): cybersecurity-by-design requirements add to the new Machinery Regulation requirements. Addressing them separately is less efficient than building integrated technical documentation from the start.

Is your robot or AI system correctly classified under all applicable frameworks?

A classification session to analyse your product against the AI Act, Machinery Regulation, and Cyber Resilience Act: risk category, applicable obligations, interaction between the three frameworks, and operational roadmap. 60 minutes, defensible position as output.

Request classification →
Focus: NIS2 · DORA · Cyber Resilience Act

NIS2 & Cyber Law.
Let's get ready together.

NIS2 is not just an IT problem. It is a legal obligation with direct personal liability for directors. Delegating to the technical team is not enough, and ignoring it exposes management to personal sanctions regardless of who handles operational security.

Personal liability of directors

Since NIS2 transposition in Italy (D.Lgs. 138/2024), management bodies approve security measures and monitor their implementation. Non-compliance can result in personal liability for directors — including temporary suspension from office for essential entities.

The structural shift NIS2 introduces

The scope has tripled. NIS1 covered 7 sectors. NIS2 covers 18, including for the first time managed service providers, cloud providers, software vendors, and ICT suppliers in general. If your main client is a bank, hospital, utility, or public administration, you may be subject to NIS2 supply chain obligations even without falling directly within the scope, because essential entities are required to manage the risk of their ICT suppliers.

Liability has become personal. Management bodies approve security measures and monitor their implementation. Non-compliance can result in personal liability for directors, including temporary suspension from office for essential entities. This is no longer just a technical matter: it is a Board responsibility.

Notifications are faster and more structured. Pre-alert to the ACN within 24h of incident identification, detailed notification within 72h, final report within 1 month. Each phase has specific content requirements. Facing an incident without documented and tested procedures means managing the technical crisis and drafting regulatory documents under pressure at the same time.

NIS2 assesses security in a 360-degree view. Not just technical cybersecurity: also physical controls on systems (unauthorised access to servers) and resilience against power outages or environmental events. A framework that covers only software is incomplete — and will be seen as such by the ACN.

Are you a fintech, bank, or insurer?

Your reference framework is not NIS2 but DORA (in force since January 2025): specific ICT risk management requirements, operational resilience testing, formalised management of critical ICT suppliers. Where DORA and NIS2 overlap, DORA prevails. But if you provide ICT services to third parties, you may be subject to both, and managing them as two separate silos is more costly than building an integrated framework.

Do you develop software sold as a product?

From December 2027 the Cyber Resilience Act imposes cybersecurity-by-design requirements: security built into the product from design, structured vulnerability management, patch support throughout the commercial life. For startups selling software as a licence or embedded product: the CRA introduces a compliance regime similar to CE marking.

Mandatory time windows — NIS2 Incident Notification

24h Pre-alert

Initial notification to the ACN: minimum information about the incident, estimated impact, indication of whether a deliberate attack is suspected.

72h Full notification

Initial cause analysis, measures taken, indicators of compromise. In parallel, notification to the Data Protection Authority if personal data is involved.

1 month Final report

Full root-cause analysis, remediation measures, quantified actual impact, lessons learned.

Services

NIS2 Gap Analysis

Verification of applicability under D.Lgs. 138/2024: analysis of the operational sector, size thresholds (50 employees or €10M turnover) and entity type (essential or important). Mapping of applicable technical and organisational obligations: technical, physical, and organisational security measures, ICT supply chain security, incident management, business continuity, encryption, multi-factor authentication. The analysis evaluates compliance against recognised international standards (ISO/IEC 27001, ISO/IEC 27005) — the most defensible approach in the event of an ACN inspection.

Output: documented applicability assessment, obligations map with operational priorities, roadmap with concrete milestones.

Incident Response Plan

Incident response plan compliant with NIS2 obligations: operational definition of "significant incident", detection and internal escalation procedures, ACN notification chain (24h pre-alert → 72h detailed notification → 1 month final report), documentation templates for each phase. Includes proactive monitoring of known vulnerabilities in systems in use, because an incident often originates from an already-known unpatched vulnerability. Coordination with GDPR procedures for incidents that also involve a data breach: the two notifications have similar deadlines but different content and must be managed in parallel. The plan is tested with simulated scenarios — an untested plan does not work when needed.

Supply Chain Security Contracts

Assessment of critical ICT suppliers and drafting of security contractual clauses: minimum technical obligations (patching policy, incident notification, audit rights), security SLAs with measurable metrics, audit and penetration testing rights, incident notification obligations towards the client. The supply chain is the most common attack vector, and NIS2 makes it an explicit contractual responsibility.

DORA Compliance (financial sector)

For banks, fintechs, insurers, and investment managers: compliance profile analysis against DORA. Review of ICT risk governance framework. Assessment of critical ICT suppliers according to European supervisory authority guidelines. Structuring DORA incident reporting procedures and coordination with NIS2 obligations. For fintechs: verification of direct applicability and impact on contracts with DORA-subject clients.

Board & Management Training (4h)

Training session for CTOs, CEOs, and board members: overview of obligations and management personal liability, full scope of required security (technical, physical, organisational), what the Board must approve and how to document it, practical incident scenarios with simulation of the decision-making process in the first 24h. Documented and certified training — proof of compliance with the training obligation in the event of an inspection.

Cyber Risk Legal Assessment

Legal risk profile analysis: mapping of potential sanctions against current non-compliance level, assessment of management personal liability exposure, analysis of enterprise client contracts containing security compliance clauses. For startups providing ICT services to NIS2 entities: assessment of the impact of supply chain security obligations. Includes a preliminary CRA scope analysis for those developing and selling software as a product.

CSIRT Notification Management

Legal support in managing mandatory notifications to the ACN during and after an incident: drafting the pre-alert within the first 24h, managing the detailed notification within 72h, preparing the final report within 1 month. Coordinated management with the Data Protection Authority when the incident also involves personal data. Support in any subsequent investigation phases.

NIS2: are you subject?

Sector — Annex I (essential entities): energy, transport, banking, financial market infrastructure, healthcare, drinking water, wastewater, digital infrastructure, B2B ICT service management, central government, space. Annex II (important entities): postal and courier services, waste management, chemical production, food production, medical/electronic/machinery/vehicle manufacturing, digital providers (marketplaces, search engines, social networks).

Size — 50+ employees or annual turnover > €10M. The conditions are alternative: one is sufficient.

Supply chain — Even if you are not directly within scope, your NIS2-subject clients are required to manage the risk of critical ICT suppliers. If you provide software, infrastructure, or managed services to banks, hospitals, utilities, or public administrations, expect NIS2-aligned contractual clauses in upcoming contracts.

Penalties

Entity typeMaximum penaltyManagement liability
Essential Entities€10M or 2% global turnoverTemporary suspension from office
Important Entities€7M or 1.4% global turnoverPublic notification of the incident
DORA (financial entities)Up to 1% of average daily turnover per day of violationPersonal liability of senior management

FAQ

By when do I need to be compliant?
D.Lgs. 138/2024 is in force. Subject companies must register on the ACN platform and implement the required security measures. The ACN has started registration activities and initial checks. The right time to structure compliance is before the first notifiable incident, not after.
How does the NIS2 notification cascade work?
Three phases: (1) pre-alert within 24h — minimum information about the incident, estimated impact, indication of whether a deliberate attack is suspected; (2) detailed notification within 72h — initial cause analysis, measures taken, indicators of compromise; (3) final report within 1 month — full root-cause analysis, remediation measures, quantified actual impact. For incidents involving personal data, the notification to the Data Protection Authority (same 72h window) must be managed in parallel with the NIS2 notification.
Does NIS2 apply to startups?
Micro and small enterprises are generally excluded from the direct scope. But if your enterprise clients are NIS2 subjects, they will start requiring contractual security guarantees in the next 12 months, regardless of your size.
We are a fintech. NIS2 or DORA?
DORA for ICT operational resilience obligations: it is the sector-specific regulation for the financial sector and prevails over NIS2 where they overlap. But if you provide ICT services to third parties outside the financial scope, NIS2 may apply in parallel. Managing the two frameworks as a single framework (rather than two separate compliance tracks) is more efficient and less costly.
Do we need ISO 27001 certification to comply with NIS2?
No, it is not an obligation. But adopting recognised international standards (ISO/IEC 27001 for security management, ISO/IEC 27005 for risk assessment) is the most defensible approach in case of inspection: it demonstrates that security measures are proportionate, structured, and verifiable. Not an audit done for the sake of the standard, but a framework that makes compliance sustainable over time.

Does NIS2 apply to your company?

One hour of assessment to verify applicability, map the relevant obligations, and define where to start in concrete terms. Output: documented applicability assessment and operational priorities.

Request the Gap Analysis →
Avv. Matteo Pompilio — Tech Lawyer and Data Protection Specialist specialising in GDPR, AI Act and NIS2 for tech startups

Avv. Matteo Pompilio

Tech Lawyer · Legal Data Architect

Studio Legale Pompilio

Our Vision.

We believe regulatory compliance is not a brake on innovation — it is its most solid foundation. Law is the code of the digital ecosystem.

“It's not about chasing compliance but anticipating it. Designing processes by measuring, from the very start, the exact risk exposure is the first step toward the goal.”

— Avv. Matteo Pompilio

Three principles

Privacy as an architectural standard

Data protection decisions are architecture decisions. They belong to the system design phase, not the final review phase. When retention policy enters the DB schema from the first migration, when consent is designed into the UX flow before go-live, when DPAs are negotiated before integrating a sub-processor — compliance stops being an added layer and becomes part of the structure. A product built this way is more robust, more auditable, and easier to evolve over time.

Law and technology: a single competence

Digital law cannot be applied at a distance from the technology it regulates. A contractual clause written without knowing the architecture of the system it describes is structurally weak. A risk analysis conducted without reading the code (or at least the technical documentation) is unreliable. The studio's method requires legal and technical work to run in parallel, with the same tools and in the same conversation — not downstream of decisions already made, but in the moment they are made.

Compliance is a process, not a task

Regulatory compliance has no finish line. Products evolve, architectures change, regulations update, markets expand. A framework built as a periodic task (to check once a year, or before an audit) cannot withstand this dynamic. The studio's method treats compliance as a continuous process integrated into the organisation's lifecycle: every new feature is evaluated against its regulatory impact, every new supplier is qualified before integration, every incident is managed with already-tested procedures. Compliance that accumulates over time is the kind that does not break at the worst moment.

The method

Integration into the development cycle

Regulatory requirements enter the process as acceptance criteria, not as final reviews. Every sprint has its compliance review component, proportional to the risk of the features developed.

Direct collaboration with the technical team

I don't deliver documents — I work with the team. I participate in technical conversations, understand the system architecture, and know the stack before writing a single line of legal documentation.

Scales with the business

The regulatory framework grows with the company. We build the right structure for the current phase, with the flexibility to adapt it for the next round, the first enterprise client, the expansion into a new geographic market.

Total transparency

No inaccessible legal language. Risks are communicated clearly, with quantified business impact. Priorities are shared, deadlines are real, work is measurable.

Let's build something compliant — and lasting.

The first conversation is free and without obligation. We analyse together the regulatory surface of your product and define concrete steps for the coming weeks.

Let's start →

Privacy & Cookie Policy

Last updated: 31 January 2025

Your privacy matters. This policy clearly explains how we handle your data when you visit this site. Click on sections to expand them.

📋 Privacy Policy

I am, Avv. Matteo Pompilio, the data controller (technically "Titolare del Trattamento" under Italian law) of the data collected through this site.

📍 Office: Via Superga 195 - 76125, Trani (BT)

📧 Email: matteopompilio@studiolegalepompilio.it

🌐 When you browse the site

The site automatically collects some technical information:

  • Indirizzo IP (per sicurezza e funzionamento)
  • Browser and device you use (to optimise the experience)
  • Pages visited and when (to improve the site)

Version 2.0 - Last updated: 31 January 2025

✉️ When you contact me

If you write to me via email or contact form, I collect what you voluntarily provide:

  • Nome e cognome
  • Email
  • Message and request you make

Why do I do this? To respond to your request for information or advice.

Legal basis: Pre-contractual measures (Art. 6.1.b GDPR)

How long do I retain them? 24 months from the request, or until you ask me to delete them.

Your data is NOT sold or shared for commercial purposes.

They may only be communicated to:

  • Technical providers who help run the site (Netlify for hosting, Google Fonts for fonts). These services have their own GDPR-compliant privacy policies.
  • Authorities if required by law (e.g. Data Protection Authority, law enforcement with a mandate).

⚠️ Extra-EU Transfers

Some services (Netlify, Google) also have servers in the USA. Transfers take place in compliance with the EU-US Data Privacy Framework and EU-approved Standard Contractual Clauses.

The GDPR gives you full control over your data. You can:

🔍 Accedere

Ask me for a copy of all the data I hold about you

✏️ Rectify

Correct incorrect or incomplete data

🗑️ Erase

Have your data erased ("right to be forgotten")

⏸️ Restrict

Temporarily block the use of your data

📦 Port

Receive your data in a format readable by other platforms

🚫 Object

Say "no" to processing for legitimate reasons

How to exercise your rights?

Simply write to me at: matteopompilio@studiolegalepompilio.it

I will respond within 30 days (maximum under GDPR).

💡 You can also lodge a complaint with the Data Protection Authority if you believe your rights have been violated.

🍪 Cookie Policy

📅 Changes to this policy

This policy may be updated over time to reflect regulatory changes or changes in site practices. You will always find the latest version here, with the update date at the top.

Version history

v2.0 - 31 Jan 2025

Full GDPR policy. Interactive accordion, clear language, technical cookie detail.

v1.0 - 01 Jan 2025

Initial minimum notice.

Let's start

Let's talk about
your project.

The first conversation is free and without obligation. I will reply within 24 business hours.

Prefer to contact me directly?