Legal Shield for Digital Security: Turkey's First Cyber Security Law
The Cyber Security Law No. 7545, which came into force on March 19, 2025, aims to prevent cyber threats, determine national strategies, and establish the Cyber Security Board for all public and private individuals and institutions operating in cyberspace in Turkey. The law sets out obligations for authorities to adopt cybersecurity measures, report notifications, use authorized products and be open to audits, while also imposing heavy prison sentences and high administrative fines in the event of violations. The law, which grants broad powers to the Cyber Security Presidency, also regulates the protection of personal data. A one-year compliance period has been granted, and individuals and institutions that fail to fulfill their obligations by the end of this period may face a ban on their activities.
21.10.2025

Introduction
The Cyber Security Law No. 7545 (“Law”) entered into force upon its publication in the Official Gazette dated March 19, 2025 and numbered 32846.[1] The purpose of the Law is to prevent cyber threats, reduce the impact of cyber threats, protect individuals and authorities from cyberattacks, determine national cyber security strategies and policies, and establish the Cyber Security Board (“Board”).
Persons within the Scope of the Law
The scope of the Law is broadly defined. It applies to public authorities and institutions, professional institutions with public authority status, natural and legal persons, and institutions without legal personality that exist, operate, or provide services in cyberspace.
The Law defines cyberspace as the environment encompassing all information systems directly or indirectly connected to the internet, electronic communications, or computer networks, as well as the connections between such networks. and the networks connecting them, it follows that everyone conducting commercial activities today must comply with the Law. However, intelligence activities, are expressly excluded from its scope.
Regulations Introduced by the Law
(i) Basic Principles:
The Law establishes a set of fundamental principles governing cybersecurity. For example, it includes basic principles for providing cybersecurity, such as conducting institutional, continuous, and sustainable work, paying attention to the principle of accountability, and protecting basic rights and liberties, the rule of law, and privacy. The Law also emphasizes the creation of a secure cyberspace, the pursuit of continuous improvement, and efforts to increase qualified human resources in this field have been listed among the basic principles.
All public authorities and institutions, as well as natural and legal persons, are responsible for implementing cybersecurity policies and strategies and taking the necessary measures to prevent cyberattacks or mitigate their effects. The Law further provides that domestic and national products shall be prioritized in efforts to ensure cybersecurity and underscores that cybersecurity constitutes an integral component of national security.
(ii) Those who provide services, collect data, process data, and carry out similar activities using information systems:
The obligations and responsibilities of those who provide services, collect and process data, and carry out similar activities using information systems within the scope of the law, in other words, all persons operating in cyberspace within the scope of their activities, have been determined. These obligations and responsibilities are summarized as follows:
- Providing the Cyber Security Presidency (“Presidency”) with all requested data, information and documents, etc. relevant to its duties and activities in a timely and prioritized manner.
- Complying with the precautions required by legislation regarding cybersecurity, immediately reporting any vulnerabilities or cyber incidents detected in the area where they provide services to the Presidency,
- Supplying cybersecurity products, systems, and services to be used in public authorities and institutions and critical infrastructure from cybersecurity companies authorized and certified by the Presidency,
- Obtain the approval of the Presidency within the framework of existing regulations before starting operations, as required by relevant cybersecurity companies, and
- Fulfilling the requirements and taking the necessary precautions in the policies, strategies, action plans developed by the Presidency, and other regulatory procedures published to increase cyber maturity.
Accordingly, all public authorities and institutions operating in cyberspace in Turkey, as well as natural persons, legal persons, and entities without legal personality, are required to comply with these responsibilities.
(iii) Presidency and Board:
The Presidency was established by Presidential Decree and its responsibilities are defined in the relevant Law. The Presidency is responsible for increasing the cyber resilience of critical infrastructure and information systems, establishing a cyber incident response team, setting security standards, and conducting testing and certification. It also has audit authority, as well as has a right to request information and documents from relevant individuals and institutions when necessary. Those from whom information and documents are requested will not be able to refuse to provide them by claiming that they are not subject to the relevant legislation.
It is also provided that personal data processed in the scope of the Law shall be processed in accordance with the basic principles set forth in the Personal Data Protection Law No. 6698. In addition, it is stated that personal data and trade secrets obtained shall be destroyed ex officio when the reasons requiring access to such data no longer exist.
The Law also sets out that a Board will be established. The Board's responsibilities and authorities include making decisions regarding regulatory procedures related to cyber security and the implementation of the roadmap prepared by the Presidency.
(iv) Audit:
The Law states that the Presidency may, when necessary, audit the acts and transactions under the Law and conduct on-site inspections. However, the Law does not define the situations in which such audits are considered necessary.
It is also regulated that local authorities, law enforcement officers, and officials of other public institutions are obligated to provide every kind of convenience and assistance to those assigned to conduct investigations or inspections.
Those assigned to conduct audits may, but only within the scope of the audit activity, examine electronic data, documents, infrastructure, devices, systems, software, and hardware; take copies or samples; request written or verbal explanations; prepare reports; and inspect the relevant facilities. Those subject to inspection are obligated to provide all information and documents, keep relevant systems and devices accessible for inspection, and provide the necessary infrastructure.
Searches can only be conducted in homes, workplaces, and non-public enclosed areas with a court order or, in urgent cases where delay would cause harm, with a written order from the public prosecutor, for the purposes of national security, public order, or preventing crime or cyberattacks. During searches, copying and seizure of items may be executed. The procedures for searches, copying, and seizure are explained in the Law.
Penal Provisions and Fines
Within the scope of the Law, many violations are subject to different penal provisions and fines ranging from TRY 100,000 to TRY 100,000,000. In addition, the Law provides for administrative fines of up to 5% of gross sales revenue in a certain case. These are listed below:
Violation |
Sanction |
Except for public authorities and institutions, those who fail to provide information, documents, software, data, and equipment requested by the authorities and inspectors authorized by the Law, or those who prevent them from being obtained |
Imprisonment for one to three years and a judicial fine of 500 to 1500 days* |
Those who operate without obtaining the necessary approvals, authorizations, or permits required by law |
Imprisonment for two to four years and a judicial fine of 1000 to 2000 days* |
Those who fail to fulfill their confidentiality obligation |
Imprisonment for four to eight years* |
Those who, without the permission of individuals or institutions, make available, share, or sell personal or critical public service-related corporate data previously exposed in a data leak in cyberspace, whether for a fee or free of charge. |
Imprisonment for three to five years*
|
Those who create or spread false content about data leaks related to cybersecurity with the aim of creating anxiety, fear, and panic among the public, or targeting institutions or individuals, even though they know there has been no data leak in cyberspace. |
Imprisonment for two to five years* |
Those who commit cyber-attacks against the national power of the Republic of Turkey in cyberspace or who store any data obtained as a result of such attacks in cyberspace (unless the act constitutes another crime punishable by a heavier penalty) |
Imprisonment for eight to twelve years*
|
Those who spread, send elsewhere, or sell any data obtained as a result of the attack described above in cyberspace |
Imprisonment for ten to fifteen years* |
Those who have served in the Presidency and, without obtaining permission from the Presidency, have worked in the field of cybersecurity for two years, as well as those who engage in trade in this field or publish any information, documents, or similar data obtained within the scope of their duties and activities at the Presidency. |
Imprisonment for three to five years* |
* If the crime described in the above paragraphs is committed by a public official, the penalties shall be increased by one-third; if committed by more than one person, the penalties shall be increased by half; and if committed within the scope of an organization's activities, the penalties shall be increased by half to twice the amount. |
|
Those who violate the forbidden provisions in Article 12 of the Law |
Imprisonment for three to five years |
Those who abuse their duties and powers provided by law, or who cause data breaches by acting contrary to the requirements of their duties in the context of protecting critical infrastructure against cyberattacks. |
Imprisonment for one to three years |
(i) Those who fail to take the precautions stipulated by legislation for the purposes of national security, public order, or the provision of public services in relation to cybersecurity, and those who fail to promptly report any vulnerabilities or cyber events they detect in the area in which they provide services to the Presidency, and (ii) Those who do not supply cybersecurity products, systems, and services to be used in public institutions and authorities and critical infrastructures from cybersecurity experts, manufacturers, or companies authorized and certified by the Presidency. |
Administrative fines ranging from TRY 1,000,000 to TRY 10,000,000 |
Those who fail to fulfill the duties and responsibilities mentioned in Article 18 of the Law regarding cybersecurity products and companies |
Administrative fines ranging from TRY 10,000,000 to TRY100,000,000 |
Those subject to inspection who fail to keep the relevant devices, systems, software, and hardware available for inspection within the specified periods, who fail to provide the necessary infrastructure for inspection, and who fail to take the necessary measures to keep them in working condition. |
Administrative fines ranging from TRY 100,000 to TRY 1,000,000 |
If the above-mentioned misdemeanour is committed by commercial companies |
An administrative fine of up to 5% of the gross sales revenue stated in the annual financial statements audited by an independent auditor, provided that it is not less than TRY 100,000. |
Before the application of administrative fines, a letter is notified to the parties concerned, informing them that they have 30 days from the date of notification to present their defense. If no defense is presented within the specified period, the party concerned is considered to have waived their right to defense.
Administrative fines shall be paid within one month from the date of notification. Administrative fines that remain unpaid and become final shall be collected by tax offices Appeals may be lodged with the administrative courts against decisions imposing administrative fines issued in accordance with the law.
Compliance and Transition Process
Regulations to be implemented under the Law will come into effect within one year. Authorities such as associations and commercial companies operating in the field of cybersecurity must complete their authorization procedures within one year. Otherwise, they will not be able to operate in this field. Legal entities that fail to fulfill their obligations by the end of the period may be terminated by court order. Commercial companies that fail to fulfill their obligations within the same period must remove references to cybersecurity from their company contracts or enter into liquidation proceedings for the purpose of being removed from the commercial register.
Conclusion
Considering that the scope of the Law is broad and that regulations regarding its implementation will come into force within a year, those operating in cyberspace, providing services using information systems, and conducting similar activities must bring their systems into compliance with the Law without delay. In today's world, where cyber threats are increasing, compliance with the Law is not only an obligation but also a necessity for the sustainability of digital assets. Furthermore, it is important for institutions to comply with the Law in order to protect their reputation, avoid high administrative fines and sanctions, and achieve a resilient structure against cyber-attacks.
[1] (Only in Turkish) The Cyber Security Law No. 7545, 2025
-
Kemal Altuğ Özgün
Managing Partner
-
Sena Karaduman İşlek
Mid-Level Associate
-
Şevval Lafçı
Associate