This document is under active development and has not been finalised.
Skip to content

Penalties and Fines (Art. 64)

Overview

The CRA provides for significant penalties for violations. The fines follow the GDPR framework and are tiered according to the severity of the violation. The determination and imposition is the responsibility of the national Market Surveillance authorities of the Member States.

LEGAL BASIS

Art. 64 CRA: The Member States shall lay down rules on penalties and take all necessary measures to ensure their enforcement. The penalties shall be effective, proportionate, and dissuasive.

Fine Framework

Tier 1 -- Serious Violations (Art. 64 Para. 2)

Up to EUR 15,000,000 or 2.5% of global annual turnover (whichever is higher)

Violations of:

  • Art. 10 -- Manufacturer obligations (essential requirements, conformity assessment, technical documentation)
  • Art. 13 -- Information obligations (SBOM, support period, contact details)
  • Art. 14 -- Reporting Obligations (ENISA 24h/72h/14d)
  • Annex I -- Essential cybersecurity requirements
  • Annex VII -- Technical documentation

Tier 2 -- Other Violations (Art. 64 Para. 3)

Up to EUR 10,000,000 or 2% of global annual turnover

Violations of:

Tier 3 -- False Information (Art. 64 Para. 4)

Up to EUR 5,000,000 or 1% of global annual turnover

  • False, incomplete, or misleading information to authorities
  • Refusal to cooperate with Market Surveillance authorities
  • Obstruction of inspections

Special Provision: OSS Stewards (Art. 64 Para. 5)

Up to EUR 5,000,000 or 1% of global annual turnover

Overview Table

Violation CategoryMaximumTypical Triggers
Tier 1EUR 15 million / 2.5%No SBOM, no conformity assessment, no ENISA reporting, known vulnerabilities not remediated
Tier 2EUR 10 million / 2%Missing CE marking, Importer without verification, no DoC
Tier 3EUR 5 million / 1%False information to authorities, refusal to cooperate

Assessment Criteria

When determining the amount of the fine, the authorities take into account:

Aggravating Factors

  • Severity of the violation -- How serious were the consequences?
  • Duration -- How long did the violation persist?
  • Intent -- Was the violation intentional?
  • Repetition -- Were there previous violations?
  • Affected users -- How many users were affected?
  • Damage -- What actual damage occurred?

Mitigating Factors

  • Cooperation -- Active collaboration with authorities
  • Self-reporting -- Voluntary disclosure of the violation
  • Corrective measures -- Rapid remediation of the problem
  • Compliance programme -- Demonstrable compliance management
  • First violation -- No previous violations
  • Company size -- Proportionality for SMEs

Comparison with Other Regulations

RegulationMaximum FineCalculation
CRAEUR 15 million / 2.5%Per violation
GDPREUR 20 million / 4%Per violation
NIS2EUR 10 million / 2%Per violation
AI ActEUR 35 million / 7%Per violation

Risk Minimisation

Compliance as Protection

A documented and actively practised compliance programme significantly reduces the risk of fines. The following measures serve as mitigating factors:

  1. Complete documentation -- This handbook and all referenced processes
  2. Proactive reporting -- Comply with ENISA deadlines (Reporting Process)
  3. Active vulnerability management -- CVE monitoring, rapid patches (Vulnerability Management)
  4. Regular audits -- Internal review of compliance
  5. Training -- Employees are aware of the CRA requirements
  6. Readiness to cooperate -- Documented process for authority requests (Market Surveillance)

Priority Compliance Areas

The highest fine risks exist for:

PriorityAreaRisk
1No ENISA reporting for actively exploited vulnerabilityTier 1
2Known exploitable vulnerabilities not remediatedTier 1
3No SBOM created (Art. 13 Para. 23)Tier 1
4No conformity assessment carried outTier 1
5No technical documentation (Annex VII)Tier 1
6No cooperation with authoritiesTier 3

TIMELINE

The penalty provisions apply from 11.12.2027 (full applicability). The Reporting Obligations under Art. 14 apply from 11.09.2026.

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT