The Radio Equipment Directive (RED) (Directive 2014/53/EU) is the European Union’s regulatory framework for radio equipment. It ensures that devices placed on the market meet essential requirements for safety, health, electromagnetic compatibility, and the efficient use of the radio spectrum.
While the directive has been in place since 2014, recent amendments have significantly expanded its scope to address cybersecurity concerns. One of the most critical aspects of the RED is Article 3.3, which introduces additional essential requirements to any equipment that intentionally transmits or receives radio waves for communication or radiodetermination purposes. This includes a wide range of devices, from smartphones and tablets to IoT sensors and connected appliances. The scope is deliberately broad to encompass the rapidly evolving landscape of connected devices.
As the August 1, 2025, compliance deadline approaches, IoT manufacturers must ensure their products align with these new requirements to avoid regulatory, financial, and reputational risks and maintain market access in the European Economic Area (EEA).
Understanding Article 3.3 of the RED
Purpose and Scope
Article 3.3 of the RED directive mandates additional cybersecurity and safety measures for radio equipment. It introduces three key provisions that IoT manufacturers must comply with:
- Article 3.3(d): Prevents radio equipment from harming networks or misusing network resources, ensuring that devices do not cause unacceptable service degradation.
- Article 3.3(e): Requires safeguards to protect personal data and user privacy, reinforcing alignment with GDPR and other data protection regulations.
- Article 3.3(f): Mandates protections against fraud, particularly for devices that handle financial transactions or sensitive user interactions.
For IoT manufacturers, this means integrating security mechanisms at both the hardware and software levels to meet compliance standards.
Impact on the IoT Industry
The implementation of Article 3.3 represents a significant shift in IoT device regulation. While compliance requires investment and resource allocation, it ultimately benefits both manufacturers and consumers by:
- Establishing clear security standards
- Building consumer trust in IoT devices
- Creating a more secure IoT ecosystem
- Harmonizing security requirements across the EU market
Core Requirements for IoT Manufacturers
To comply with Article 3.3, manufacturers must implement the following security measures:
1. Network Protection (Article 3.3(d))
Connected devices must incorporate safeguards to protect networks from harm.
- Devices must prevent unauthorized network access or interference.
- Implement encryption and authentication protocols to secure device-to-network communications.
- Ensure software updates and patches do not degrade network performance.
- Implement features that ensure their devices cannot be used to disrupt network services or compromise network infrastructure.
2. Data Protection and Privacy (Article 3.3(e))
Privacy considerations are at the forefront of Article 3.3.
- Devices must incorporate data encryption, secure storage, and privacy controls to prevent unauthorized access.
- Compliance with GDPR is necessary to align with EU data protection laws.
- Secure transmission methods must be in place to protect personal data from interception.
- Manufacturers must adopt a "privacy by design" approach, making data protection an integral part of device development rather than an afterthought.
3. Fraud Prevention (Article 3.3(f))
The directive requires measures to prevent financial fraud through or against these devices.
- Devices handling financial transactions must implement anti-fraud mechanisms such as secure payment processing and two-factor authentication.
- Strong identity verification methods should be used to protect user credentials.
- Security testing and vulnerability assessments must be conducted regularly to detect potential fraud risks.
Compliance Requirements for IoT Manufacturers
Achieving compliance with Article 3.3 requires a comprehensive approach to device security. Manufacturers must prepare detailed technical documentation demonstrating how their devices meet these requirements. This includes:
- Detailed product specifications
- Risk assessment documentation
- Test reports and certification results
- Design and manufacturing information
- Compliance declarations
Additionally, IoT manufacturers must undergo a conformity assessment procedure before a product is released to the market. Depending on the device category and risk level, this may involve self-assessment or review by a notified body. The assessment verifies that all essential requirements are met, leading to CE marking authorization.
Compliance Timeline
The European Commission has set a mandatory compliance deadline of August 1, 2025, for Articles 3.3(d), 3.3(e), and 3.3(f). After this date, non-compliant devices will not be permitted for sale in the EU.
Manufacturers should act now to implement these security measures, as compliance assessments and certification processes can take months to complete.
Consequences of Non-Compliance
Failing to comply with RED Article 3.3 can result in significant consequences for IoT manufacturers:
1. Regulatory and Legal Implications
- Non-compliant products may be removed from the EU market.
- Companies could face fines and penalties from regulatory authorities.
- Legal action may be taken by affected consumers or business partners.
2. Market and Reputational Risks
- Consumers increasingly prioritize security; non-compliance can lead to loss of trust and reduced sales.
- Companies that fail to meet cybersecurity requirements may be considered risk-prone, leading to loss of business opportunities and partnerships.
- Security vulnerabilities can lead to data breaches, damage brand reputation, and result in potential lawsuits.
Steps to Achieve Compliance
1. Assessment and Planning
- Conduct an internal security audit to identify gaps in compliance with Article 3.3.
- Develop a compliance roadmap to implement necessary security measures before the August 2025 deadline.
2. Design and Development
- Integrate security-by-design principles to ensure products are compliant from the development stage.
- Use secure firmware and software development practices to minimize vulnerabilities.
- Implement regular security updates to maintain compliance over time.
3. Testing and Certification
- Work with accredited testing laboratories to verify compliance with the RED.
- Obtain a Declaration of Conformity (DoC) to demonstrate adherence to EU regulations.
- Maintain comprehensive technical documentation detailing compliance measures.
4. Post-Market Surveillance
- Monitor device security after deployment through regular security audits.
- Establish a system for reporting and addressing vulnerabilities.
- Prepare a response plan for handling potential security incidents or compliance breaches.
Best Practices for Implementation
To achieve compliance, manufacturers should adopt these key practices:
Security by Design
Integrate security features from the earliest stages of product development. This proactive approach is more cost-effective than retrofitting security features and helps ensure comprehensive protection.
Continuous Assessment
Implement ongoing security testing and validation procedures. Regular assessments help identify and address vulnerabilities before they can be exploited.
Documentation Management
Maintain detailed records of all security measures, test results, and risk assessments. Good documentation practices are crucial for demonstrating compliance and facilitating future updates.
Conclusion
Article 3.3 of the RED directive represents a crucial step toward securing the IoT ecosystem. While compliance may require significant effort, it establishes essential safeguards for networks, personal data, and fraud prevention. Manufacturers who embrace these requirements and implement robust security measures will be well-positioned for success in the evolving IoT landscape.
Finite State is committed to helping IoT manufacturers navigate these evolving regulations by providing industry-leading software supply chain security solutions. Contact us today to learn more about how we can support your compliance efforts.
Share this
You May Also Like
These Related Stories

Understanding The EU CRA's SBOM & Technical Documentation Requirements

Navigating the EU Cyber Resilience Act: Essential Insights for Product Security Teams
