Zayo strives to uphold the highest standards of international regulatory compliance. We recognize that operating in a global marketplace requires adherence to a variety of laws, regulations, and industry standards. As such, we ensure that all of our products and services meet or exceed the applicable requirements in each country or region where we operate.
Our Compliance program continually monitors global regulations, including data protection, privacy laws, financial regulations, and industry-specific standards, to ensure our operations remain transparent and accountable. We take pride in our proactive approach, implementing strong internal processes and controls to safeguard your interests and ensure the security and integrity of our operations.
We are committed to keeping you informed about how these regulations impact your experience with us and to maintaining open communication.
Digital Operational Resilience Act (DORA)
The Digital Operational Resilience Act (DORA) is a European Union regulation that aims to enhance the cybersecurity and resilience of the financial sector against ICT-related risks, requiring financial institutions to implement sound risk management, incident reporting, and resilience testing procedures. Although DORA is an EU regulation, Zayo views its compliance through a wider lens so as not to inhibit cross-border selling of Zayo’s products and services.
Zayo is not a financial services entity and has not been designated as a critical Information and Communications Technology (ICT) third-party service provider. DORA imposes several responsibilities on third-party suppliers to ensure the resilience and security of financial entities’ ICT systems, and Zayo appreciates the impact of DORA on financial services entities. Our organization addresses DORA regulations as they apply to ICT third-party service providers in the following areas:
Risk Management: Third-party suppliers must implement robust risk management frameworks to identify, assess, and mitigate ICT risks. This includes regular risk assessments and the implementation of appropriate security measures. Zayo’s Third Party Management Program (TPRM) addresses this requirement as outlined in our Third Party and Supply Chain Oversight Standard.
Incident Reporting: Suppliers are required to promptly report any significant ICT-related incidents to the financial entities they serve. This ensures that potential threats are quickly addressed and mitigated. Incident response and notifications are outlined in our Operational and Systems Continuity Standard.
Resilience Testing: Suppliers must conduct regular resilience testing of their ICT systems to ensure they can withstand and recover from disruptions. This includes stress testing and scenario analysis. This is addressed as part of Zayo’s Enterprise Resilience program and outlined in our Operational and Systems Continuity Standard.
Compliance with Security Standards: Suppliers must adhere to relevant security standards and best practices, (e.g., ISO/IEC 27001, to ensure the security and integrity of their ICT systems). Zayo’s Security Governance Framework is based on the Unified Compliance Framework (UCF), providing a common control structure accounting for a host of global regulatory requirements, including ISO/IEC 27001.
Contractual Obligations: Financial entities must include specific contractual clauses in their agreements with third-party suppliers to ensure compliance with DORA requirements. This includes provisions for audit rights, incident reporting, and termination rights in case of non-compliance. These requirements are addressed in our customer contract terms and conditions and addendums.
Monitoring and Oversight: Financial entities are required to continuously monitor and oversee the activities of their third-party suppliers to ensure ongoing compliance with DORA regulations. These requirements are also addressed in our customer contract terms and conditions and addendums.
These responsibilities aim to enhance the overall digital operational resilience of financial entities by ensuring that third-party suppliers play a proactive role in managing and mitigating ICT risks associated to the Services they provide their customers. Zayo is committed to complying as a third-party ICT to its financial entity customers.
Network and Information Security 2.0 Directive (NiS2)
The Network and Information Security 2.0 Directive (NiS2) establishes comprehensive cybersecurity standards across the European Union (EU) for operators of essential services and digital service providers. Effective from January 16, 2023, NiS2 replaces the previous NIS Directive and mandates that EU Member States integrate these standards into national legislation by October 17, 2024.
Key Objectives and Enhancements
NiS2 aims to enhance the cybersecurity landscape by introducing a Cyber Crisis Management Structure through the European Cyber Crisis Liaison Organization Network (EU-CyCLONe). It promotes harmonization of security requirements, encourages national strategies to address new areas such as supply chain and vulnerability management, and expands the sectors covered, thereby increasing the number of entities responsible for cybersecurity.
Responsibilities of ENISA
The European Union Agency for Cybersecurity (ENISA) plays a crucial role under NiS2 by overseeing several new initiatives, including the development of a European vulnerability registry and annual reports on the state of cybersecurity. ENISA supports Member States in transposing the directive and addresses common cybersecurity challenges.
Zayo’s Compliance Strategy
Zayo is proactively aligning its operations with NiS2 as an Essential Entity. Under the guidance of the Chief Security Officer (CSO), Zayo is implementing safeguards as part of its security program to meet NiS2 requirements while ensuring compliance with global regulations.
NiS2 significantly broadens the scope of compliance to include mid-sized and large companies across 18 critical sectors, such as energy, transport, and healthcare. Organizations classified as essential or important must establish incident-reporting processes for significant security breaches, guided by criteria related to location, size, and industry.
Accountability Shift
A pivotal change under NiS2 is the shift in accountability for cybersecurity from security teams to organizational management. Executives now face personal liability for gross negligence related to cybersecurity incidents, emphasizing the importance of management’s involvement in cybersecurity governance.
Importance for Subject Matter Experts (SMEs)
For NiS2 to succeed, all businesses, particularly business SMEs, must enhance their cybersecurity posture. This includes conducting risk assessments, updating contracts to define cybersecurity responsibilities, and developing comprehensive policies and procedures. Continuous employee training on cybersecurity best practices is critical to broadening awareness and compliance.
Enforcement and Penalties
Noncompliance with NiS2 can result in substantial penalties, including fines up to €10 million or 2% of global turnover for essential entities. Member States are also empowered to impose temporary managerial bans on executives of non-compliant organizations.
Zayo’s commitment to cybersecurity and compliance with NiS2 reflects its understanding of the importance of safeguarding products and services. Zayo’s board, executive leadership team, workforce, third parties, partners, and stakeholders understand the importance of having strong safeguards in place for our products. We utilize the Unified Compliance Framework (UCF) to establish a set of common controls that align to global standards, laws, regulations, guidelines, and best practices. We ensure that we continually mature and improve our control environment over time, in an effort to achieve continuous improvement.
UK Telecommunications Security Act (TSA)
The Telecommunications Security Act (TSA), effective March 31, 2025, introduces new security regulations for telecom providers in the United Kingdom (UK), responding to evolving geopolitical threats and increasing cybercriminal activity. The Act establishes a ‘Three Layer Framework’ and a tiering system that categorizes providers based on size and annual revenue, determining compliance requirements and timelines. The UK Office of Communications (Ofcom) is a regulatory body supervising the communications industry for the UK – TSA, passed into law on October 1, 2022, ushering in a number of new security requirements for public telecom providers.
Zayo, classified as a Tier 2 provider, is proactively aligning its operations with TSA requirements. The company implemented safeguards to meet initial compliance measures and continues to enhance its Information Security Program (ISP) with guidance from its Chief Security Officer (CSO). Zayo recognizes the urgency of compliance and is committed to establishing robust controls in preparation for the approaching deadlines.
The TSA outlines specific compliance phases, each containing a set of measures designed to build cyber resilience. Providers must navigate these phases while focusing on key concepts such as network architecture, identity and access management, supply chain oversight, resilience, and governance. Non-compliance may result in significant fines, reputational damage, and operational disruptions, emphasizing the need for strategic investment in cybersecurity capabilities.
Ofcom now holds enhanced powers to enforce compliance, including monitoring providers and taking action against non-compliance. Providers must secure sensitive network equipment, manage supply chain risks, and maintain transparency in their cyber strategies. The Act also empowers the government to manage risks from high-risk vendors, which may lead to the removal of their equipment from telecom networks.
Zayo’s board, executive leadership team, workforce, third parties, partners, and stakeholders understand the importance of having strong safeguards in place for our products. We utilize the Unified Compliance Framework (UCF) to establish a set of common controls that align to global standards, laws, regulations, guidelines, and best practices. We ensure that we continually mature and improve our control environment over time, in an effort to achieve continuous improvement.
Zayo is committed to maintaining high security standards and ensuring compliance with the TSA through continuous improvement, effective governance, and sound safeguards across its operations.
International Privacy Regulations
At Zayo, we take your privacy and data protection seriously. We understand that the trust you place in us when sharing your personal information is invaluable, and we are committed to safeguarding your data with the highest standards of security and care.
We follow strict protocols to ensure that your personal and sensitive information is handled securely, stored responsibly, and only used for the purposes you’ve agreed to. We are transparent about how we collect, process, and protect your data, and we comply with all relevant international privacy laws and regulations, including GDPR and PIPEDA. For more information, refer to Data Protection and Privacy