The UK’s Cyber Security and Resilience Bill has begun its parliamentary passage and proposes substantial changes to the Network and Information Systems Regulations 2018 that will directly reshape obligations for the data centre sector. According to the original report, the government has not announced a firm timetable for the Bill to become law, but officials expect it could receive Royal Assent by next spring. [1][5][2]

Central to the Bill is the explicit inclusion of providers of data centre services as Operators of Essential Services (OES). The government’s policy material defines a "data centre service" as the provision of a physical structure housing, connecting and operating relevant IT equipment together with supporting infrastructure, and sets capacity thresholds for designation , 10 megawatts for enterprise provision and 1 megawatt for other commercial provision. Designation is accompanied by a statutory requirement to notify the competent authority (Ofcom) within three months of designation. [1][4][2]

Designated data centre operators will face new and existing duties to take "appropriate and proportionate technical and organisational measures" to manage risks to the networks and information systems underpinning their essential services, and to reduce the impact of incidents while ensuring continuity of service. The Bill strengthens incident reporting by lowering the notification threshold and requiring an initial report to the competent authority within 24 hours and a full report within 72 hours; operators must also notify customers likely to be adversely affected "as soon as reasonably practical" after the full notification. [1][2][4]

Beyond physical data centres, the Bill enlarges the regulated perimeter to capture other supplier types. Cloud computing providers continue as Relevant Digital Service Providers (RDSP) under the updated framework, while a new category , Relevant Managed Service Providers (RMSP) , would cover "provision of ongoing management of information technology systems" where the supplier connects to or accesses customers’ network and information systems. The Bill does not appear to enact the intra-group exclusion considered in earlier policy papers, potentially widening scope for multinational suppliers. The Information Commissioner (shortly to be the Information Commission) will be the competent authority for RDSPs and RMSPs. [1][2]

The Bill also introduces a route for organisations to be pulled into scope by designation as a critical supplier to an OES, RDSP or RMSP. Separately, government announcements have designated data centres as Critical National Infrastructure, a move intended to align them more closely with sectors such as energy and water and to ensure greater government support during major incidents. That designation underlines the strategic rationale for tighter regulation and operational resilience measures. [3][6][1]

Enforcement and sanctions are significantly strengthened: the Bill contemplates turnover-based penalties of up to 4% of worldwide turnover (or £17m if higher), and tightens notification timing compared with the 2018 Regulations. Government statements frame the Bill as part of a broader drive to harden national cyber defences and ensure continuity of essential public services. Industry data and policy commentary suggest these measures aim both to deter lax security practices and to improve incident response across critical digital infrastructure. [1][2][5]

The Bill draws clear inspiration from the EU’s NIS2 directive , for example, the reduced notification threshold and 24‑hour initial reporting mirror NIS2 , but important differences remain. NIS2 covers a broader set of sectors and introduces personal liability for senior management, while the UK Bill adds a critical supplier designation that has no direct NIS2 equivalent. Maximum monetary penalties under NIS2 are generally lower (around 2% of worldwide turnover or €10m, to be set at member‑state level), meaning organisations operating across the UK and EU will need to navigate divergent obligations and enforcement regimes. Firms serving regulated financial services should also consider whether DORA obligations apply alongside NIS2 and the UK Bill. [1]

For operators and suppliers, the practical message is immediate: organisations not previously in scope , notably some data centre operators and managed service providers , must familiarise themselves with the new duties, incident reporting timelines and potential penalties. Providers of cloud computing services should ensure continued compliance with existing NIS obligations while preparing for the Bill’s expanded requirements. Given the interplay with NIS2, DORA and national designations such as CNI, businesses with cross‑jurisdictional footprints will need coordinated compliance plans to manage overlapping supervisory expectations. [1][4][2]

📌 Reference Map:

##Reference Map:

  • [1] (InsideTechLaw) - Paragraph 1, Paragraph 2, Paragraph 3, Paragraph 4, Paragraph 5, Paragraph 6, Paragraph 7, Paragraph 8
  • [2] (UK government policy statement) - Paragraph 1, Paragraph 3, Paragraph 4, Paragraph 6, Paragraph 8
  • [3] (UK government news: data centres CNI) - Paragraph 5
  • [4] (UK government factsheet: data centres) - Paragraph 2, Paragraph 3, Paragraph 8
  • [5] (UK government collection: Cyber Security and Resilience Bill) - Paragraph 1, Paragraph 6
  • [6] (UK government news: strengthened data storage protections) - Paragraph 5

Source: Noah Wire Services