← Back to all briefings
Data Strategy 6 min read Published Updated Credibility 89/100

Data Strategy — EU regulation

EU Data Act connected products roadmap clarifies IoT data access implementation. Manufacturers need to enable user access to device-generated data in portable formats. This shapes product design requirements for the EU market.

Verified for technical accuracy — Kodi C.

Data strategy pillar illustration for Zeph Tech briefings
Data strategy, stewardship, and privacy briefings

The Data Act applies from , but Article 50 clarifies that the Article 3(1) user-access obligation binds connected products and related services placed on the market after . Manufacturers and service providers shipping vehicles, devices, machinery, or platforms in 2026 must design telemetry access, dashboards, and dispute workflows now. This roadmap ties to the pillar hub, the Data Act readiness guide, and recent briefs on general application and cloud switching.

Timeline for connected-product obligations

DateMilestoneImplication
Data Act applicabilityGovernance, contract fairness, and data processing service switching provisions activate.
Article 3(1) for new productsConnected products and related services placed on the market after this date must deliver user access to data by default.
Service portfolio remediationLegacy offerings updated or sunset; competent authorities can request evidence of design changes and user channels.

Design requirements to implement

  • Data-by-design. Article 3(1) expects connected products to be designed and manufactured so users can directly access, retrieve, and use data generated during use.
  • Related services. Service data associated with the product (for example, analytics dashboards, maintenance platforms) must expose equivalent access channels.
  • Sharing with third parties. Article 5 requires, upon user request, sharing with designated third parties under fair, reasonable, and non-discriminatory terms.
  • Compensation and trade secrets. Cost-based compensation is allowed for B2B sharing; trade secrets must be protected through NDAs and technical safeguards without blocking access.
  • Unfair contract terms. Articles 13–15 void clauses that unilaterally restrict access or impose excessive liability on SMEs.

Diagram — user data access flow

Flow showing a user requesting device data, authorization, export, and audit capture.
        User → Auth portal → Scope selection → Data export API → Audit log → User download/forward
         ↓ ↑
         Device twin sync -------------------------------
         

Product and service control checklist

AreaControlOwnerEvidence
Telemetry captureData schemas documented; purpose, units, frequency, and provenance recorded.Product EngineeringSchema registry, data catalog entries, firmware specs.
User accessAuthenticated portals/APIs allow retrieval in commonly used, machine-readable formats.Platform EngineeringAPI specs, SDKs, export samples, authentication logs.
Third-party sharingDelegation and consent flows support user-designated recipients.Privacy/LegalConsent records, data sharing agreements, audit trails.
Security & safetyAccess controls, rate limiting, and safety guardrails prevent misuse and maintain integrity.SecurityDPIAs, penetration test results, safety test reports.
Support & dispute handlingClear SLAs and appeals for data access denials; multilingual support where marketed.Customer OperationsTicket queues, resolution metrics, template communications.
Sub-processor governanceData location, subprocessors, and onward transfers documented; notice workflows set.Vendor ManagementProcessor lists, transfer impact assessments, change logs.

Testing and validation

  • Access path testing. Validate API and portal access for consumers and SMEs with real product data; include throttling and error handling.
  • Format conformance. Provide exports in machine-readable formats (for example, JSON, CSV, standard telematics schemas) and verify compatibility with common industry tools.
  • Delegation scenarios. Simulate user-approved third-party access, revocation, and incident response.
  • Safety and security. Confirm that access does not compromise operational safety or cybersecurity; document risk mitigations.

Operational roadmap (2025–2026)

  1. Q2 2025: Inventory and scoping. catalog all connected products and related services; identify data elements and storage locations.
  2. Q3 2025: Design reviews. Embed data-by-design requirements into hardware, firmware, and software pipelines; approve schemas and access interfaces.
  3. Q4 2025: Build and pilot. Build access portals/APIs, delegation flows, and dashboards; pilot with selected customers and capture feedback.
  4. Q1 2026: Contract and policy uplift. Update ToS, DPAs, and product disclosures to reflect user access rights, compensation rules, and dispute paths.
  5. Q2–Q3 2026: Scale and evidence. Roll out access features across products; collect logs, DPIAs, and support metrics to satisfy competent authorities.

Metrics and assurance

  • Access fulfillment time. Median days to deliver user data requests; target ≤14 days.
  • Coverage. Percentage of connected products with live access channels; target 100% of new launches by September 2026.
  • Format readiness. Share of datasets with published schemas and export samples.
  • Appeal outcomes. Rate of upheld vs. overturned access denials; track root causes.
  • Third-party onboarding. Number of approved delegates and incident rate associated with delegated access.

Dispute and safety handling

  • Define safety exceptions where immediate access could compromise critical operations; log and justify each invocation.
  • Offer transparent appeals with human review; set escalation timelines and multilingual support.
  • Maintain kill-switch procedures to pause access if cybersecurity threats arise, with rapid restoration once mitigated.

Evidence package for regulators

  1. Product design documents showing data-by-design decisions and schema diagrams.
  2. API/portal documentation, sample exports, and authentication/authorization flows.
  3. DPIAs and threat models addressing access, sharing, and safety considerations.
  4. Customer communications explaining rights, request channels, and compensation models.
  5. Logs of access requests, fulfillment times, delegations, and appeals.

Cited sources

Sector considerations

SectorAccess nuanceAdditional safeguards
Automotive and mobilityVehicle-generated data may include driver behavior and location; ensure role-based views and consent granularity.Pseudonymisation, geofence-aware disclosures, coordination with UNECE cyber/safety rules.
Industrial/OTOperational data from machinery can reveal production secrets; isolate trade-secret elements while providing operational metrics.Segmentation between business and safety networks, NDAs aligned to Article 4(6).
Healthcare devicesData may be personal or health-specific; integrate GDPR lawful basis and DPIAs with Article 35 considerations.Role-based consent, clinician oversight, clear appeals for safety-related denials.
Consumer IoTHigh volume of SME and individual requests; self-service portals with multilingual support reduce burden.Rate limits, privacy-preserving defaults, parental controls where minors are users.

Architecture reference

Reference architecture linking device telemetry to governed access channels.
        [Device/Firmware] → [Edge/Cloud Ingestion] → [Data Lake + Catalog] → [Access API/Portal]
         ↓
         [Consent & Delegation]
         ↓
         [Audit & Compliance]
         

Governance cadence

  • Monthly. Review access request volumes, fulfillment SLAs, and appeals; monitor errors and abuse signals.
  • Quarterly. Reassess schemas, export formats, and third-party integration performance; update processor lists and notices.
  • Semi-annual. Tabletop safety and cybersecurity scenarios that invoke access pauses; verify recovery procedures.
  • Annual. Management review of Data Act compliance posture, including risk assessments and resource planning for new product lines.

Customer and regulator communications

  • Publish product-level transparency pages detailing available datasets, refresh rates, formats, and request channels.
  • Issue change notices before altering schemas, subprocessors, or access SLAs; keep archives for audit.
  • Provide regulator-ready packets summarizing Article 3 compliance, safety exceptions, and metrics.

Readiness checklist before 2026 launches

  1. Design reviews completed with Article 3 requirements baked into hardware, firmware, and service specifications.
  2. Access and delegation interfaces deployed to staging and validated with external testers.
  3. Contracts and privacy notices updated to explain rights, compensation rules, and dispute routes.
  4. Support playbooks, multilingual templates, and escalation contacts trained and staffed.
  5. Evidence vault populated with DPIAs, tests, and communications, ready for competent authority requests.

Enforcement posture

  • Track member-state guidance on connected-product scope and provide rapid translations of technical evidence.
  • Log and resolve any customer or SME complaints about access barriers; treat them as early warning for supervisory action.
  • Coordinate with cloud-switching teams to ensure related services support exit and portability consistent with Chapter VI.

Continue in the Data Strategy pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Cited sources

  1. Regulation (EU) 2023/2854 (Data Act) — Official Journal of the European Union
  2. European Commission Data Act policy page — European Commission
  3. ISO 8000-2:2022 — Data Quality Management — International Organization for Standardization
  • EU regulation
  • Connected products
  • Data access
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.