For the past 40 years, product liability laws have been static while technology has evolved exponentially—but the law is catching up. In early 2024, the EU updated its product liability directive (PLD) to give consumers the legal tools to hold companies liable in court if they sell defective products, including software products. EU member states are expected to enact the directive by 2026.
This update has significant implications for software companies operating in the EU. Companies must implement robust security and software development practices, which could be challenging given the rapidly approaching deadline. In this blog post, we’ll unpack the biggest changes from the new directive and how companies should approach cybersecurity to best prepare for this regulatory shift.
The new PLD introduces these critical changes for software vendors:
Let’s take a closer look at each of these changes.
The new PLD applies to any product operating in the EU, including digital products. However, it excludes free and open-source (FOSS) software products to maintain competitiveness.
The regulation defines a defective product as one that “does not provide the safety that a person is entitled to expect or that is required.” It explicitly stipulates software safety issues, including:
The directive has also increased the liability period to 25 years—accounting for outlier defects that might slowly emerge.
The directive expands the definition of physical damage to include medically recognized damage to psychological health. Additionally, it adds a new property of damage: destruction or corruption of personal data. If the corrupted data was used for professional reasons or a mix of professional and personal reasons, it is not in scope.
The PLD has made several changes to the litigation process to make it easier for consumers to bring forth and defend their claims. Here are the most significant changes:
The new PLD marks a significant evolution in consumer protection regulations for software products, especially regarding safety. Companies bear more responsibility when software vulnerabilities are exploited, and consumers have more avenues to seek compensation for a broader range of damages. Legal experts predict that these changes will likely increase product liability litigation throughout the EU.
To minimize this heightened liability risk, software companies must rapidly modernize their cybersecurity infrastructure by diversifying their security strategy. Relying only on human-driven point-in-time testing can create windows of exploitability, and continuous scanning will only find the most common vulnerabilities. . Instead, their security teams need to adopt a comprehensive, continuous approach that layers continuous discovery of critical vulnerabilities on top of point-in-time and automated testing.
Proven approaches include crowdsourced security measures like vulnerability disclosure programs (VDPs) or managed bug bounty programs (MBBs). In these methods, organizations partner with hackers to continuously identify and fix common critical vulnerabilities that traditional testing will often miss. This gives organizations a safety net across all areas of their software product, especially as they ship new code. The diverse security community also brings unique skills and perspectives that can help uncover new or unconventional threats. These measures provide more robust protection against an evolving threat environment, reducing liability risks.
Companies don’t have to embark on this journey alone. Bugcrowd offers expertise in developing and implementing comprehensive security strategies tailored to meet these evolving regulatory requirements. To get started, chat with a Bugcrowd security expert today.