Publication
Legalseas
Our shipping law insights provide legal and market commentary, addressing the key questions and topics of interest to our clients operating in the shipping industry, helping them to effectively manage risk.
EMEA | Publication | November 2025
In the past decade the video gaming industry has grown immensely. This, in combination with a number of unique factors, makes the video gaming industry a very interesting target for cyber criminals.
In response, regulators across the globe have sought to either bring video gaming into scope of critical infrastructure legislation (either directly, or indirectly by regulating gaming infrastructure) or have adopted sector-specific rules.
Here we provide a brief overview of some of the cyber risks and an impact analysis of EU cybersecurity legislation applicable in relation to the video gaming industry.
In-game integrity: Protecting fair play and digital assets
In the early days cybersecurity in the context of video gaming mostly focused on ensuring the integrity of gameplay. Cheating tools, for example, disrupt the competitive balance of games, undermining the player experience, and in some cases, their use can result in criminal or civil wrongs. Game companies work continuously to detect and prevent these threats to maintain a fair gaming environment.
In addition to gameplay integrity, protecting in-game currencies and digital items is also a pressing concern. Malicious actors may attempt to exploit bugs or vulnerabilities in order to duplicate valuable in-game items, disrupting virtual economies and damaging the reputation of the game.
| In-game NFTs For information non-fungible tokens as in-game digital assets, see our thought leadership hub, NFTs. |
Data breaches and confidentiality
Game companies, like other businesses, are vulnerable to cyber threats, with some being exposed to a higher risk due to the ‘tech-savviness’ of their user base.
A notorious example is the data breach that occurred with Rockstar Games in 2022, where confidential information about Grand Theft Auto VI was leaked online. Such breaches can lead to significant financial losses, reputational damage and legal liabilities, particularly in cases involving user data or trade secrets.
The video gaming industry’s vulnerability to cyberattacks is further compounded by the high volume of personal data stored by companies, including payment information, personal identifiers and player behaviour analytics. Game companies are required to adhere to strict data protection regulations, such as the General Data Protection Regulation (GDPR) in the EU and implement robust security measures to safeguard sensitive information.
|
Data, privacy and the metaverse
|
EU legislation on cybersecurity, such as the NIS2 Directive and the recently adopted Cyber Resilience Act, imposes additional cybersecurity requirements on certain businesses, potentially including video game companies.
NIS2 Directive
The NIS2 Directive introduces a new standard of cybersecurity in the EU, designed to strengthen security requirements and enforcement and replacing the NIS Directive 2015/1148/EC.
The NIS2’s applicability to an entity is subject to three cumulative requirements:
As regards the second requirement above, it is important to note that the video gaming sector itself is not explicitly listed as an in-scope sector under the NIS2 Directive.
However, the reach of NIS2 extends beyond the sectors named directly in its annexes, as it applies to a range of digital infrastructure and digital service providers that may underpin or be integrated into gaming services.
For example, if a video game company provides, or relies on, cloud computing services, content delivery networks or data centre services as part of its operations, these elements may bring the company within the scope of NIS2. This is because such services are specifically referenced in Annex I of the Directive as part of the "digital infrastructure" sector.
As a result, while the core activity of game development or publishing may not trigger NIS2 obligations, the use or provision of certain digital services that are essential to the delivery of gaming experiences can bring game companies within the scope of the Directive’s requirements. Such indirect applicability means that many game companies, particularly those of medium or large size, must carefully assess their service offerings and operational dependencies to determine whether NIS2 compliance is required.
|
Five key requirements To the extent that a game company falls within scope of NIS2, it must adhere to the following five key requirements:
|
NIS2 was due to be transposed into national law in all Member States by 17 October 2024. However, as at the date of this publication, implementation legislation has not yet been adopted in several Member States.
| NIS2 Directive and network and information security For more information on NIS2 and network and information security , see our summary, NIS2. |
Cyber Resilience Act
In addition to the NIS2 Directive, another recently adopted piece of EU legislation that may become relevant for video game companies is the Cyber Resilience Act (CRA). The CRA:
|
Categories of products under the Cyber Resilience Act The CRA categorises products with digital elements into four categories:
|
The CRA requires that applicable security standards be integrated throughout the entire development process, starting from the design phase. Products must undergo regular vulnerability testing and have the benefit of timely security updates to maintain system integrity and protect users from emerging threats.
Furthermore, any identified security vulnerabilities must be promptly reported to the European Union Agency for Cybersecurity (ENISA), especially if actively exploited.
Non-compliance can lead to substantial fines and administrative sanctions, increasing the regulatory burden on video game companies operating in the EU.
The CRA entered into force on 10 December 2024. A transition period of 36 months is applicable, giving companies until 2027 to comply.
Existing products are subject to the CRA only if they undergo substantial modifications.
Technical descriptions of the four categories of products with digital elements, set out above, are yet to be adopted by the EU Commission (ultimately this is required to be done by 11 December 2025).
What should game companies be doing in relation to the CRA right now?
For game companies developing, manufacturing or distributing products with digital elements in the EU, it is crucial to begin timely compliance efforts. Even non-critical software like video games will need to be subject to a self-assessment and be able to maintain cybersecurity standards, while hardware products with connectivity face more demanding requirements.
Given the increasing cyber threats targeting the video games industry – including account takeovers, malware, and ransomware attacks – adhering to the CRA will not only ensure legal compliance but will also enhance consumer trust and product security in a rapidly evolving digital landscape.
The adage in cybersecurity is not if a company will be hacked, but when. By implementing pro-active cybersecurity measures, game companies can better protect themselves against attacks and minimise the impact of breaches when they occur, while at the same time comply with NIS2 and the CRA (whether or not these are actually applicable in a particular instance).
| Want more information? For more information in relation to the legal and regulatory considerations in relation to video gaming, see our thought leadership hub, Insights: Gaming. |
Publication
Our shipping law insights provide legal and market commentary, addressing the key questions and topics of interest to our clients operating in the shipping industry, helping them to effectively manage risk.
Publication
Our 23rd report spotlights landmark legislative reforms such as the UK’s new Arbitration Act 2025 and South Africa’s rise as a regional arbitration hub. We examine procedural innovations, enforcement challenges, and the evolving role of tribunals in promoting settlement.
Subscribe and stay up to date with the latest legal news, information and events . . .
© Norton Rose Fulbright LLP 2025