{"id":72529,"date":"2025-09-02T14:37:19","date_gmt":"2025-09-02T12:37:19","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/"},"modified":"2025-09-02T14:37:19","modified_gmt":"2025-09-02T12:37:19","slug":"red-3-3-essential-cybersecurity-requirements-for-radio-equipment","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/","title":{"rendered":"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment"},"content":{"rendered":"<header id=\"header\" class=\"header header--low\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first header__first--alone\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tRED 3.3: Essential Cybersecurity Requirements for Radio Equipment\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t<div id=\"pl-6458\"  class=\"panel-layout\" ><div id=\"pg-6458-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-6458-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-6458-0-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-6458-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>As of August 1, 2025, the <strong>Radio Equipment Directive (RED) Articles 3.3(d), 3.3(e) and 3.3(f)<\/strong> have been activated, introducing mandatory cybersecurity requirements for radio equipment placed on the EU market. For embedded developers and manufacturers of connected devices, these regulations represent a critical compliance milestone that cannot be ignored.<\/p>\n<h4>Understanding RED 3.3<\/h4>\n<p>The <strong>radio equipment directive 2014\/53\/EU (RED)<\/strong> establishes a regulatory framework for placing radio equipment on the market. It ensures a single market for radio equipment by setting essential requirements for safety and health, electromagnetic compatibility, and the efficient use of the radio spectrum. The <strong>newly activated Article 3.3<\/strong> provisions specifically address cybersecurity concerns for internet-connected radio equipment.<\/p>\n<h4>Key Requirements<\/h4>\n<p>The three essential cybersecurity requirements under RED 3.3 are:<\/p>\n<p><strong>Article 3.3(d): Network Protection<\/strong> Radio equipment that can communicate over the internet, either directly or via any other equipment must not harm networks or cause unacceptable service degradation by misusing network resources.<\/p>\n<p><strong>Article 3.3(e): Personal Data Protection<\/strong> Equipment capable of processing personal, traffic or location data, excluding radio equipment designed or intended exclusively for childcare, equipment covered under the <strong>Toys Directive (2009\/48\/EC)<\/strong> and radio equipment designed or intended to be worn on, strapped to or hung from the body or clothing must include safeguards to protect user privacy and personal data.<\/p>\n<p><strong>Article 3.3(f): Fraud Prevention<\/strong> Internet connected<strong> radio equipment<\/strong> that enables the holder or user to transfer money, monetary value or virtual currency must support capabilities that ensure protection against fraud.<\/p>\n<h4>Affected Products<\/h4>\n<p>RED 3.3 applies to a wide range of connected devices including:<\/p>\n<ul>\n<li><strong>IoT devices<\/strong> and smart home equipment<\/li>\n<li>Communication <strong>modules<\/strong> and <strong>routers<\/strong><\/li>\n<li><strong>Wearable devices<\/strong> (with exceptions for body-worn equipment under Article 3.3(e))<\/li>\n<li><strong>Payment systems<\/strong> and <strong>POS devices<\/strong><\/li>\n<li><strong>Emergency response equipment<\/strong><\/li>\n<li><strong>Connected monitoring systems<\/strong><\/li>\n<\/ul>\n<p>Medical devices under<strong> Regulations (EU) 2017\/745<\/strong> and <strong>(EU) 2017\/746<\/strong> are exempt from <strong>Articles 3.3(d)<\/strong>, <strong>3.3(e)<\/strong> and<strong> 3.3(f)<\/strong>. Civil aviation equipment under Regulation <strong>(EU) 2018\/1139<\/strong>, motor vehicles under Regulation <strong>(EU) 2019\/2144<\/strong> and road toll systems under Directive <strong>(EU) 2019\/520<\/strong> are exempt from article <strong>3.3(e)<\/strong> and <strong>3.3(f)<\/strong>, however, <strong>Article 3.3(d)<\/strong> still applies to them.<\/p>\n<h4>Compliance Standards<\/h4>\n<p>The <strong>CENELEC<\/strong> standards<strong> EN18031-1<\/strong>, <strong>EN18031-2<\/strong> and <strong>EN18031-3<\/strong> have been published in the Official Journal of the European Union; however, they were published with restrictions. These harmonized standards provide the framework for compliance:<\/p>\n<ul>\n<li><strong>EN 18031-1<\/strong>: General cybersecurity requirements for Article 3.3(d)<\/li>\n<li><strong>EN 18031-2<\/strong>: Privacy and data protection requirements for Article 3.3(e)<\/li>\n<li><strong>EN 18031-3<\/strong>: Fraud prevention requirements for Article 3.3(f)<\/li>\n<\/ul>\n<h4>Implementation Requirements<\/h4>\n<p>In accordance with <strong>RED Article 17<\/strong>, a Notified Body is required if a manufacturer does not apply harmonized standards or has not fully applied them (ie applied only part of a harmonized standard). This means manufacturers must either:<\/p>\n<ol>\n<li><strong>Self-declare compliance<\/strong> by fully applying the relevant EN 18031 standards<\/li>\n<li><strong>Engage a Notified Body<\/strong> for third-party assessment when standards aren&#039;t fully applied or don&#039;t cover all requirements<\/li>\n<\/ol>\n<h4>Essential Compliance Elements<\/h4>\n<p>To meet RED 3.3 requirements, manufacturers must ensure:<\/p>\n<ul>\n<li><strong>Network efficiency<\/strong>: Prevent network overloads and abusive signaling<\/li>\n<li><strong>Data protection<\/strong>: Implement encryption, authentication, and access controls<\/li>\n<li><strong>Fraud prevention<\/strong>: Include secure boot, device signatures, and anti-tampering measures<\/li>\n<li><strong>Technical documentation<\/strong>: Maintain comprehensive compliance records for 10 years<\/li>\n<li><strong>CE marking<\/strong>: Apply proper marking after successful conformity assessment<\/li>\n<\/ul>\n<h4>Logic Technology&#039;s Role in RED 3.3 Compliance<\/h4>\n<p>At Logic Technology, we understand the complexity of <strong>implementing cybersecurity measures in embedded radio equipment.<\/strong> Our solutions help embedded developers navigate <strong>RED 3.3<\/strong> requirements by:<\/p>\n<ul>\n<li><strong>Security-by-design integration<\/strong>: Incorporating cybersecurity principles early in the development process<\/li>\n<li><strong>Compliance testing tools<\/strong>: Providing static analysis and vulnerability assessment capabilities<\/li>\n<li><strong>Standards alignment<\/strong>: Supporting development practices that align with EN 18031 requirements<\/li>\n<li><strong>Documentation support<\/strong>: Enabling comprehensive traceability and compliance documentation<\/li>\n<\/ul>\n<p>The transition period has ended, and compliance is now mandatory. Manufacturers who haven&#039;t prepared for these requirements<strong> face potential market access restrictions<\/strong>, product recalls, and significant penalties.<\/p>\n<p><strong>Ready to ensure RED 3.3 compliance?<\/strong> Contact Logic Technology to learn how our embedded development solutions can help you build secure, compliant radio equipment that meets the <strong>EU&#039;s cybersecurity standards<\/strong> while maintaining optimal performance and reliability.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-6458-0-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-6458-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-6458-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-6458-1-0-0\" class=\"so-panel widget widget_rtw-expert-widget panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-rtw-expert-widget so-widget-rtw-expert-widget-base\"\n\t\t\t\n\t\t><section class=\"o-expert\">\n\t<div class=\"container\">\n\t\t<div class=\"o-expert__wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__wrapper-left\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"o-expert__wrapper-right\">\n\t\t\t\t<div class=\"top\">\n\t\t\t\t\t<div class=\"expert\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t\tGevorg Melikdjanjan\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t\tSecurity | Reliability | DataSolutions\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"bottom\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\tWould you like to receive the data sheet?\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__actions\">\n\t\t\t\t\t\t<div class=\"o-expert__contact-links\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__contact-links-separator\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:g.melikdjanjan@logic.nl\" target=\"_blank\" title=\"E-mail\">\n\t\t\t\t\t\t\t\t\t\t<svg class=\"svg--interface--icon-email-dims\"><use xlink:href=\"https:\/\/logic.nl\/wp-content\/themes\/logic-technology\/images\/svg\/svg-sprite.svg#interface--icon-email\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+31778200955\" target=\"_blank\" title=\"Phone\">\n\t\t\t\t\t\t\t\t\t\t<svg class=\"svg--interface--icon-phone-dims\"><use xlink:href=\"https:\/\/logic.nl\/wp-content\/themes\/logic-technology\/images\/svg\/svg-sprite.svg#interface--icon-phone\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"a-button button calendly\" href=\"https:\/\/calendly.com\/logic_gevorgmelikdjanjan\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tSchedule a meeting\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"a-button button chat\" href=\"https:\/\/voice-logic.my3cx.nl:5001\/gevorgmelikdjanjan\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tChat now\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section><\/div><\/div><\/div><\/div><div id=\"pg-6458-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-6458-2-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-6458-2-1\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-6458-2-2\"  class=\"panel-grid-cell panel-grid-cell-empty panel-grid-cell-mobile-last\" ><\/div><div id=\"pgc-6458-2-3\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><p>The post <a href=\"https:\/\/logic.nl\/knowledge-center\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/\">RED 3.3: Essential Cybersecurity Requirements for Radio Equipment<\/a> appeared first on <a href=\"https:\/\/logic.nl\">Logic Technology<\/a>.<\/p>\n<p>Source: <a href=\"https:\/\/logic.nl\/knowledge-center\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/\">https:\/\/logic.nl\/knowledge-center\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/<\/a><\/p>\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/logic-technology-b-v\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/compacte-dubbele-circuit-schakelaar\/\" data-id=\"72351\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Compact double-circuit switch<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tElincom Electronics BV\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tAugust 29, 2025\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/producentenvertrouwen-industrie-stijgt-weer-in-oktober\/\" data-id=\"44243\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Industry producer confidence rises again in October<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tFHI, Federation of Technology Industries\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tNovember 29, 2018\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":0,"template":"","branches":[],"events":[],"secretariat":[],"categories":[],"themes_tax":[],"content_types":[],"class_list":["post-72529","news","type-news","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RED 3.3: Essential Cybersecurity Requirements for Radio Equipment - FHI, federatie van technologiebranches<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/\",\"url\":\"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/\",\"name\":\"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"datePublished\":\"2025-09-02T12:37:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment - FHI, federation of technology industries","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/","og_locale":"en_GB","og_type":"article","og_title":"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment - FHI, federatie van technologiebranches","og_url":"https:\/\/fhi.nl\/en\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/","og_site_name":"FHI, federatie van technologiebranches","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/","url":"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/","name":"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment - FHI, federation of technology industries","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"datePublished":"2025-09-02T12:37:19+00:00","breadcrumb":{"@id":"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/nieuws\/red-3-3-essential-cybersecurity-requirements-for-radio-equipment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"RED 3.3: Essential Cybersecurity Requirements for Radio Equipment"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/72529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/72529\/revisions"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=72529"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=72529"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=72529"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=72529"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=72529"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=72529"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=72529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}