2026-04-17·16 min read·

DORA Art.14: Communication Strategy — Crisis Plans, Designated Officers, and ICT Incident Disclosure for Financial Services (2026)

Post #407 in the sota.io EU Cyber Compliance Series

DORA Chapter II defines the ICT risk management framework. Articles 5–13 govern identification, protection, detection, response, recovery, and learning. Article 14 closes the chapter with the missing dimension that regulators have repeatedly cited in post-incident investigations: structured communication.

The regulatory logic is precise. An entity that detects an incident, contains it, and recovers — but fails to communicate clearly with affected clients, coordinate internally, or inform counterparts — has created secondary harm from the incident itself. DORA Art.14 operationalises the principle that crisis communication is a core component of digital operational resilience, not an afterthought handled ad hoc by whoever is senior in the building when a breach occurs.

Art.14 has three provisions. Each creates a distinct, auditable obligation. This guide covers all three, shows how they connect to the Art.19 major incident reporting regime, provides implementation guidance and a Python self-assessment tool, and closes with a 25-item NCA audit checklist.


1. Who Is Subject to DORA Art.14

DORA Art.2(1) scope covers approximately 22,000 EU financial entities:

Entity TypeDORA ScopeArt.14 Notes
Credit institutions (banks)✅ FullEBA oversight; public communication scrutiny highest
Investment firms✅ FullIncludes MiFID II investment firms above thresholds
Payment institutions✅ FullPSD2 entities now under dual DORA + PSD2 notification regime
E-money institutions✅ FullPrepaid card issuers, wallet operators
Insurance / reinsurance✅ FullSolvency II entities + DORA layered
CCP / CSDs / trading venues✅ FullSystemically significant — heightened public interest standard
Crypto-asset service providers (CASPs)✅ Full (from Dec 30 2024)MiCA registration + DORA Art.14 from same date
Management companies / AIFs✅ FullUCITS/AIFM scope
Microenterprises (<10 staff, <€2M)✅ Proportionality appliesArt.14 obligations remain; proportionate implementation
ICT third-party providers❌ Not DORA Ch.IISubject to DORA Chapter V oversight instead

Proportionality (Art.4(2)): Smaller entities must still designate a communication officer and maintain a crisis plan, but the plan can be lighter-weight — e.g., a single-page procedure document plus named contact, rather than a full media playbook.


2. Art.14(1): Crisis Communication Plans

The Obligation

"Financial entities shall have in place crisis communication plans enabling a responsible disclosure of, at least, major ICT-related incidents or vulnerabilities to clients and counterparts, and to the public, where appropriate." — DORA Art.14(1)

Three disclosure targets are specified: clients, counterparts (i.e., business partners, correspondent banks, payment networks), and the public. The trigger is a major ICT-related incident or a significant ICT vulnerability. The qualifier "where appropriate" applies only to public communication — client and counterpart notification is always required for major incidents.

What "Major" Means Under DORA

A major incident is formally classified under the Art.18 criteria and the EBA/ESMA/EIOPA Joint Guidelines on classification (published December 2023). Key thresholds triggering Art.14 disclosure obligations:

CriterionMajor Incident Threshold
Clients affected≥5,000 clients OR >5% of client base
Duration≥4 hours for critical function unavailability
Financial lossesGross losses ≥€100,000 / Net losses ≥€50,000 (credit institution)
Reputational impactSignificant media coverage or regulatory attention
Data integrityIntegrity breach affecting critical data
Geographic scopeMulti-jurisdiction impact

NCA audit expectation: The Art.14(1) plan must reference these thresholds explicitly. NCAs routinely cite plans that merely say "contact clients if there is a major incident" — without defining what constitutes major — as non-compliant.

Crisis Communication Plan: Required Content

An Art.14(1)-compliant crisis communication plan must contain at minimum:

Trigger Matrix

[ICT Incident Detected]
    → Art.18 Classification Check
        → Major? → YES → Art.14 communication workflow ACTIVE
                → NO → Internal handling, no Art.14 obligation
    → Art.19 parallel reporting workflow (separate track)

Content by Disclosure Target:

TargetWhat to CommunicateWhenChannel
ClientsNature of incident (non-technical), services affected, expected resolution, protective actions available≤24h after major classificationEmail, in-app, SMS, secure message
CounterpartsBusiness impact, affected integrations, expected recovery, whether data shared with them was involved≤4h from incident confirmationSecure email, dedicated B2B contact
PublicGeneral nature of incident (if material public interest), actions taken, how to get more infoOnly if significant client base or systemic riskPress release, website, regulator-coordinated

Template Structure for Client Notification:

Subject: [FINANCIAL ENTITY NAME] — Service Disruption Update — [DATE]

We are writing to inform you of an ICT incident that occurred on [DATE/TIME].

Affected services: [LIST]
Impact: [BRIEF NON-TECHNICAL DESCRIPTION]
Current status: [CONTAINED / RECOVERING / RESOLVED]
Protective steps you may take: [IF APPLICABLE]
Expected resolution: [TIMEFRAME OR "UNDER INVESTIGATION"]

For questions: [DEDICATED CONTACT / LINK]
Further updates: [SCHEDULE — e.g., every 4 hours until resolved]

[ENTITY NAME] [DATE/TIME OF THIS MESSAGE]

Vulnerability Communication (Art.14(1) also covers vulnerabilities): This is frequently overlooked. Art.14(1) also requires a plan for communicating significant ICT vulnerabilities — before an incident occurs. This is distinct from the incident notification flow and requires a separate procedure governing:


3. Art.14(2): Internal and External Communication Policy

The Obligation

"Financial entities shall implement, as part of their ICT risk management framework, a communication policy for internal staff and for external stakeholders. Communication policies for staff shall take into account the need to differentiate between staff involved in ICT risk management, in particular the staff responsible for response and recovery, and staff that needs to be informed." — DORA Art.14(2)

Two policies in one provision: internal (staff) and external (clients, counterparts, press, regulators). The internal policy has an explicit requirement to differentiate between operational staff (those managing the incident) and informational staff (those who need situational awareness but are not in the response chain).

Internal Communication Policy: Staff Differentiation Matrix

DORA Art.14(2) requires explicit role differentiation. Failure to distinguish between operational and informational staff creates two failure modes observed in NCA inspections:

  1. Over-communication to responders — non-incident staff flooding response channels with questions, degrading the response team's effectiveness
  2. Under-communication to affected teams — client-facing staff unaware of the incident, giving contradictory information to clients

Recommended Staff Tier Model:

TierRoleCommunication ChannelUpdate Frequency
T1: Incident ResponseCISO, SOC lead, IR team, affected system ownersWar-room channel (Slack/Teams incident channel, dedicated bridge)Real-time, every 15–30 min during active phase
T2: Operational AwarenessCEO/CRO/CCO, Legal, Compliance, Communication OfficerSecure management dashboard or dedicated Tier-2 channelEvery 60 min or on material change
T3: InformationalClient-facing staff, front-office, branch networkPre-approved talking points via email or intranetBefore client contact begins; updated if material change
T4: General StaffAll other employeesBrief internal notice after incident containedPost-containment only
T5: BoardBoard membersCISO or CEO direct briefingFor major incidents only; after initial containment

Communication Silence Rule: T3/T4/T5 staff must not be informed until the Art.14(3) communication officer approves the message. This prevents unofficial communications leaking to clients or press before the controlled disclosure.

External Communication Policy

The external policy governs how the entity communicates with non-employee stakeholders:

StakeholderPolicy Element
ClientsPre-drafted template library by incident type; approved channels; single-voice principle (no competing messages from different departments)
Counterparts / B2BDedicated B2B communication officer or procedure; confidentiality of operational details; coordination on mutual incident impact
RegulatorsThis is governed by Art.19 (separate reporting regime); Art.14 external policy should cross-reference Art.19 procedures
Media / PressAll media enquiries → Art.14(3) designated officer only; no-comment default until press release approved
Social mediaMonitoring procedure for social mentions; single-account policy; Art.14(3) officer authorises responses

4. Art.14(3): Designated Communication Officer

The Obligation

"At least one person in the financial entity shall be tasked with implementing the communication strategy for ICT-related incidents and fulfil the public relations and media role for that purpose." — DORA Art.14(3)

This is the most frequently non-compliant element in NCA inspections. Many entities have communication plans but no named, trained individual whose primary incident responsibility is communication. DORA Art.14(3) makes this designation mandatory.

Who Can Be the Designated Communication Officer?

Art.14(3) says "at least one person" without specifying a title or minimum seniority. However, effective and NCA-compliant implementation requires:

RequirementWhy It Matters
Named in the ICT risk management frameworkNCA will ask for the name during inspection; "we will assign someone" is non-compliant
Trained in crisis communicationsUntrained officers make unforced disclosure errors under pressure; NCA expects evidence of training
Authority to approve external communicationsCannot fulfil the role without authority to issue client notifications and press statements
Available 24/7 (or clear backup chain)ICT incidents do not respect business hours; the plan must name a primary + backup
Not the same person as the incident response leadDual-role failure: a CISO managing a live incident cannot simultaneously manage media enquiries

Common Mistakes:

Recommended Designation Structure:

Primary Communication Officer: [Name, Title]
Backup Communication Officer: [Name, Title]
Escalation Contact (Board-level): [Name, Title]
Last Review / Reconfirmation: [DATE — must be refreshed at least annually]

Scope of the Art.14(3) Role

The communication officer is responsible for:

  1. Approving all external communications (client notifications, press releases, counterpart messages)
  2. Handling media enquiries — sole spokesperson for ICT-related incidents
  3. Monitoring press and social media for incident mentions requiring response
  4. Coordinating with Legal and Compliance before any public statement
  5. Post-incident comms review — was the communication timely, accurate, compliant?
  6. Annual review of Art.14(2) policies and Art.14(1) plans

5. Art.14 × Art.19 Integration: Communication vs. Regulatory Reporting

DORA creates two parallel but distinct workflows for major ICT incidents:

DimensionArt.14 (Communication)Art.19 (Reporting)
AudienceClients, counterparts, public, internal staffNational Competent Authority (EBA/ECB/national regulator)
TriggerMajor ICT incident or significant vulnerabilityMajor ICT incident (same classification)
Timeline≤24h for client notification (best practice)4h initial notification → 24h intermediate → 5 days final
ContentWhat happened, impact, protective steps, recovery ETATechnical details, financial impact, RCA, remediation plan
OwnerArt.14(3) Communication OfficerCISO / Compliance / ICT Risk Function
FormatFree-form, client-appropriate languageEBA/ESMA/EIOPA-prescribed reporting template
ConfidentialityClient communication can be publicRegulatory report is confidential; regulator controls disclosure

Critical Sequencing Issue: NCAs have cited entities that filed the Art.19 regulatory report but delayed client notification — or worse, that sent client notifications with more detail than the regulatory report. The Art.14 communication officer and Art.19 reporting function must coordinate before any external communication is sent.

Recommended Integration Workflow:

[Major Incident Confirmed — Art.18 Classification]
         │
    ┌────┴────┐
    │         │
Art.19       Art.14
Reporting    Communication
Workflow     Workflow
    │         │
4h NCA       Pre-draft client
Initial     notification
Report       (do not send)
    │         │
         Legal/Compliance Review
         + Art.19 report alignment
                  │
         Art.14(3) Officer Approves
                  │
         Client Notification Sent
         (≤24h from major classification)

6. Python DORACommChecker Implementation

from dataclasses import dataclass, field
from typing import Optional
import datetime

@dataclass
class CommunicationPlan:
    """Art.14(1): Crisis communication plan."""
    plan_document_ref: str
    last_reviewed: datetime.date
    covers_major_incidents: bool
    covers_significant_vulnerabilities: bool
    client_notification_procedure: bool
    counterpart_notification_procedure: bool
    public_notification_procedure: bool
    major_incident_thresholds_defined: bool
    template_library_exists: bool
    art19_coordination_documented: bool

@dataclass
class InternalCommPolicy:
    """Art.14(2) internal: Staff communication policy with tier differentiation."""
    policy_document_ref: str
    t1_response_team_channel_defined: bool
    t2_operational_awareness_channel_defined: bool
    t3_informational_staff_procedure_defined: bool
    communication_silence_rule_documented: bool
    communication_officer_approval_required: bool

@dataclass
class ExternalCommPolicy:
    """Art.14(2) external: External stakeholder communication policy."""
    policy_document_ref: str
    client_policy_defined: bool
    counterpart_policy_defined: bool
    media_policy_defined: bool
    social_media_policy_defined: bool
    single_voice_principle_documented: bool
    regulator_policy_cross_references_art19: bool

@dataclass
class CommunicationOfficer:
    """Art.14(3): Designated communication officer."""
    primary_officer_name: str
    primary_officer_title: str
    backup_officer_name: Optional[str]
    backup_officer_title: Optional[str]
    officer_documented_in_framework: bool
    officer_has_approval_authority: bool
    officer_crisis_comms_trained: bool
    last_training_date: Optional[datetime.date]
    twentyfour_seven_availability_documented: bool

@dataclass
class AssessmentResult:
    check_name: str
    status: str  # "COMPLIANT", "NON_COMPLIANT", "PARTIAL"
    finding: str
    recommendation: Optional[str] = None

@dataclass
class DORACommCheckerReport:
    entity_name: str
    assessment_date: datetime.date
    results: list[AssessmentResult] = field(default_factory=list)

    def add(self, result: AssessmentResult):
        self.results.append(result)

    def summary(self) -> dict:
        compliant = sum(1 for r in self.results if r.status == "COMPLIANT")
        partial = sum(1 for r in self.results if r.status == "PARTIAL")
        non_compliant = sum(1 for r in self.results if r.status == "NON_COMPLIANT")
        return {
            "compliant": compliant,
            "partial": partial,
            "non_compliant": non_compliant,
            "total": len(self.results),
            "score_pct": round((compliant + 0.5 * partial) / len(self.results) * 100, 1) if self.results else 0
        }

    def to_markdown(self) -> str:
        s = self.summary()
        lines = [
            f"# DORA Art.14 Compliance Assessment: {self.entity_name}",
            f"**Date:** {self.assessment_date}",
            f"**Score:** {s['score_pct']}% ({s['compliant']} compliant, {s['partial']} partial, {s['non_compliant']} non-compliant)",
            "",
            "| Check | Status | Finding |",
            "|---|---|---|",
        ]
        for r in self.results:
            icon = "✅" if r.status == "COMPLIANT" else ("⚠️" if r.status == "PARTIAL" else "❌")
            lines.append(f"| {r.check_name} | {icon} {r.status} | {r.finding} |")
        return "\n".join(lines)


class DORACommChecker:
    def __init__(
        self,
        entity: str,
        plan: CommunicationPlan,
        internal_policy: InternalCommPolicy,
        external_policy: ExternalCommPolicy,
        officer: CommunicationOfficer,
    ):
        self.entity = entity
        self.plan = plan
        self.internal_policy = internal_policy
        self.external_policy = external_policy
        self.officer = officer

    def check_crisis_plan_completeness(self) -> AssessmentResult:
        issues = []
        if not self.plan.covers_major_incidents:
            issues.append("major incident scope missing")
        if not self.plan.covers_significant_vulnerabilities:
            issues.append("vulnerability communication missing")
        if not self.plan.major_incident_thresholds_defined:
            issues.append("major incident thresholds not defined")
        if not self.plan.art19_coordination_documented:
            issues.append("Art.19 coordination procedure missing")
        days_since_review = (datetime.date.today() - self.plan.last_reviewed).days
        if days_since_review > 365:
            issues.append(f"plan review overdue ({days_since_review}d)")

        if not issues:
            return AssessmentResult("Art.14(1) Crisis Plan", "COMPLIANT", "Plan complete and current.")
        if len(issues) <= 2:
            return AssessmentResult("Art.14(1) Crisis Plan", "PARTIAL", f"Gaps: {'; '.join(issues)}", "Close gaps before next NCA inspection.")
        return AssessmentResult("Art.14(1) Crisis Plan", "NON_COMPLIANT", f"Multiple gaps: {'; '.join(issues)}", "Full plan overhaul required.")

    def check_internal_policy(self) -> AssessmentResult:
        issues = []
        if not self.internal_policy.t1_response_team_channel_defined:
            issues.append("T1 response channel not defined")
        if not self.internal_policy.t3_informational_staff_procedure_defined:
            issues.append("informational staff procedure missing")
        if not self.internal_policy.communication_silence_rule_documented:
            issues.append("silence rule not documented")

        if not issues:
            return AssessmentResult("Art.14(2) Internal Policy", "COMPLIANT", "Staff tiers and communication rules documented.")
        return AssessmentResult("Art.14(2) Internal Policy", "PARTIAL" if len(issues) == 1 else "NON_COMPLIANT", f"Gaps: {'; '.join(issues)}")

    def check_external_policy(self) -> AssessmentResult:
        issues = []
        if not self.external_policy.client_policy_defined:
            issues.append("client communication policy missing")
        if not self.external_policy.media_policy_defined:
            issues.append("media/press policy missing")
        if not self.external_policy.single_voice_principle_documented:
            issues.append("single-voice principle not documented")
        if not self.external_policy.regulator_policy_cross_references_art19:
            issues.append("Art.19 cross-reference missing from external policy")

        if not issues:
            return AssessmentResult("Art.14(2) External Policy", "COMPLIANT", "External stakeholder policies complete.")
        return AssessmentResult("Art.14(2) External Policy", "PARTIAL" if len(issues) == 1 else "NON_COMPLIANT", f"Gaps: {'; '.join(issues)}")

    def check_communication_officer(self) -> AssessmentResult:
        issues = []
        if not self.officer.officer_documented_in_framework:
            issues.append("officer not named in ICT risk framework")
        if not self.officer.officer_has_approval_authority:
            issues.append("approval authority not formally granted")
        if not self.officer.officer_crisis_comms_trained:
            issues.append("no crisis communication training on record")
        if not self.officer.backup_officer_name:
            issues.append("no backup officer designated")
        if not self.officer.twentyfour_seven_availability_documented:
            issues.append("24/7 availability not documented")

        if not issues:
            return AssessmentResult("Art.14(3) Comm. Officer", "COMPLIANT", f"{self.officer.primary_officer_name} designated with backup.")
        if len(issues) <= 2:
            return AssessmentResult("Art.14(3) Comm. Officer", "PARTIAL", f"Gaps: {'; '.join(issues)}")
        return AssessmentResult("Art.14(3) Comm. Officer", "NON_COMPLIANT", f"Critical gaps: {'; '.join(issues)}", "Designate and train officer immediately.")

    def check_template_library(self) -> AssessmentResult:
        if self.plan.template_library_exists:
            return AssessmentResult("Communication Templates", "COMPLIANT", "Template library documented in crisis plan.")
        return AssessmentResult("Communication Templates", "NON_COMPLIANT", "No pre-approved templates.", "Pre-draft and approve templates for top 5 incident types.")

    def run_all(self) -> DORACommCheckerReport:
        report = DORACommCheckerReport(entity_name=self.entity, assessment_date=datetime.date.today())
        report.add(self.check_crisis_plan_completeness())
        report.add(self.check_internal_policy())
        report.add(self.check_external_policy())
        report.add(self.check_communication_officer())
        report.add(self.check_template_library())
        return report


# --- Example Usage ---
plan = CommunicationPlan(
    plan_document_ref="ICT-RM-COM-001 v2.1",
    last_reviewed=datetime.date(2026, 2, 1),
    covers_major_incidents=True,
    covers_significant_vulnerabilities=True,
    client_notification_procedure=True,
    counterpart_notification_procedure=True,
    public_notification_procedure=True,
    major_incident_thresholds_defined=True,
    template_library_exists=True,
    art19_coordination_documented=True,
)

internal = InternalCommPolicy(
    policy_document_ref="ICT-RM-COM-002 v1.3",
    t1_response_team_channel_defined=True,
    t2_operational_awareness_channel_defined=True,
    t3_informational_staff_procedure_defined=True,
    communication_silence_rule_documented=True,
    communication_officer_approval_required=True,
)

external = ExternalCommPolicy(
    policy_document_ref="ICT-RM-COM-003 v1.1",
    client_policy_defined=True,
    counterpart_policy_defined=True,
    media_policy_defined=True,
    social_media_policy_defined=True,
    single_voice_principle_documented=True,
    regulator_policy_cross_references_art19=True,
)

officer = CommunicationOfficer(
    primary_officer_name="Head of Communications",
    primary_officer_title="VP Communications",
    backup_officer_name="Chief Risk Officer",
    backup_officer_title="CRO",
    officer_documented_in_framework=True,
    officer_has_approval_authority=True,
    officer_crisis_comms_trained=True,
    last_training_date=datetime.date(2025, 11, 15),
    twentyfour_seven_availability_documented=True,
)

checker = DORACommChecker("Example EU Bank SA", plan, internal, external, officer)
report = checker.run_all()
print(report.to_markdown())

7. DORA × NIS2 Art.21(2) Dual-Compliance Mapping

Entities regulated under both DORA and NIS2 must satisfy parallel communication regimes. DORA is lex specialis for financial entities, so DORA Art.14 takes precedence where there is conflict — but NIS2 Art.21(2) adds complementary obligations not covered by DORA Art.14 alone.

ObligationDORA Art.14NIS2 Art.21(2) / Art.23Dual-Compliance Action
Crisis communication planArt.14(1) — crisis plans for major incidentsArt.21(2)(c) — business continuity includes crisis commsSingle plan covering both frameworks
Communication officer designationArt.14(3) — at least one designated personArt.20 — management body responsible; no single officer requiredArt.14(3) officer also fulfils NIS2 management body comms mandate
Client/stakeholder notificationArt.14(1) — clients, counterparts, publicArt.23(4) — significant incidents: notify affected entitiesDORA plan covers NIS2 Art.23(4) if financial entity = essential entity
Staff communication policyArt.14(2) — internal policy requiredArt.21(2)(f) — security training and awareness policiesJoint staff awareness programme covering both frameworks
Regulator notificationArt.19 (separate from Art.14)Art.23 (NIS2 report to CSIRT/NCA)Parallel reports — DORA to ESMA/EBA/ECB; NIS2 to sector CSIRT
Vulnerability disclosureArt.14(1) includes "significant vulnerabilities"Art.12 — EU vulnerability database (DORA entities likely in scope)DORA vulnerability comms procedure + NIS2 Art.12 registration

lex specialis rule: Where DORA Art.14 is stricter than NIS2 (e.g., the requirement to communicate to counterparts with no equivalent in NIS2), DORA Art.14 applies. Where NIS2 adds obligations not in DORA Art.14 (e.g., NIS2 Art.23 CSIRT reporting), NIS2 applies additionally.


8. Seven Common NCA Audit Failures for DORA Art.14

Based on published supervisory expectations from EBA, ECB/SREP, national NCAs (BaFin, AMF, DNB, FCA-equivalent conduct regulators), and the DORA JON guidelines:

Failure 1: Communication plan exists but thresholds not defined Plan says "notify clients in case of major incident" but does not define what constitutes a major incident. NCA finding: plan is not operational.

Failure 2: Art.14(3) officer not named — "TBD" in framework Entity has a crisis communication section in the ICT risk management framework but the officer field is blank or says "to be appointed." DORA requires a named person, not a role placeholder.

Failure 3: CISO simultaneously Art.14(3) officer CISO named as sole Art.14(3) officer. During a live incident the CISO is fully occupied with technical response. NCAs have flagged this as creating a single-point-of-failure in the communication chain.

Failure 4: No pre-approved communication templates Entity has a procedure but no templates. During a live incident, drafting messages from scratch leads to delays and legal review bottlenecks. NCA expectation: templates for top 5 incident types pre-approved.

Failure 5: Internal policy lacks staff tier differentiation Single communication policy for all staff with no distinction between response team and informational staff. Result: all employees receive same messages, creating noise in the response channel.

Failure 6: No Art.19 coordination procedure Art.14 external comms policy and Art.19 reporting procedure are developed independently. NCA inspectors routinely check whether the client notification and the regulatory report tell the same story — and whether the Art.14(3) officer reviewed the Art.19 report before client communication was sent.

Failure 7: Plan not tested or reviewed annually Art.14(1) crisis plan has not been tested in a tabletop exercise or live simulation since creation. Most NCAs require annual review evidence; EBA supervisory priorities 2025–2026 explicitly list communication plan testing as an inspection focus.


9. Communication Plan Testing: What NCAs Expect

Annual testing of the Art.14(1) crisis communication plan is not explicitly required in the DORA text but is firmly established in:

Minimum Acceptable Testing Evidence:

Test TypeFrequencyEvidence NCA Expects
Tabletop exercise — crisis comms scenarioAnnualExercise report with participants, scenario, findings, action plan
Notification template reviewAnnualTimestamp of legal/compliance approval; version history
Communication officer availability testAnnualTest call/page log; backup activation test
Art.19 + Art.14 coordination drillAnnualJoint exercise with reporting function; timeline adherence check
Post-incident review of actual Art.14 usageAfter each major incidentAssessment of actual notification timeliness and content quality

10. DORA Art.14 NCA Compliance Checklist (25 Items)

Art.14(1) — Crisis Communication Plan (10 items)

Art.14(2) — Communication Policies (8 items)

Art.14(3) — Communication Officer (7 items)


11. Implementation Timeline for DORA Art.14 Readiness

DORA has been in full application since January 17, 2025. Art.14 obligations are immediately enforceable. NCAs conducting DORA-focused inspections in 2025–2026 will review Art.14 compliance as part of Chapter II ICT Risk Management Framework assessments.

For entities not yet fully compliant:

WeekAction
Week 1–2Gap assessment using COM-01 to COM-25 checklist; document current state
Week 3–4Designate Art.14(3) officer (primary + backup); document in framework
Week 5–6Draft Art.14(1) crisis communication plan with defined thresholds
Week 7–8Develop client notification templates (minimum 5 incident types)
Week 9–10Draft internal staff communication policy with tier differentiation
Week 11–12Draft external communication policy; Art.19 coordination procedure
Week 13Legal/Compliance review and management body approval of all documents
Week 14Tabletop exercise: full Art.14 + Art.19 coordination drill
Week 15Close audit gaps identified in tabletop; final version documents
Week 16Annual review schedule established; testing calendar in ICT risk plan

See Also


sota.io is the EU-native PaaS for financial services developers building DORA-compliant infrastructure. Deploy to Frankfurt or Amsterdam, stay in EU jurisdiction, and meet DORA ICT risk management requirements by design.