DORA7 min read

DORA Register of Information: Requirements and Preparation

The RoI is one of DORA's most tangible requirements with specific submission deadlines, making preparation a priority for compliance efforts.

The DORA Register of Information (RoI) is a mandatory database that financial entities must maintain documenting all contractual arrangements with ICT third-party service providers. This register serves multiple purposes: internal risk monitoring, supervisory oversight, and input for designating Critical ICT Third-Party Providers.

Key Takeaways

Point Summary
Mandatory register All financial entities must maintain an RoI
All ICT providers Covers all ICT third-party service providers, not just critical ones
Regulatory submission Must be submitted to competent authorities
Multiple levels Required at entity, sub-consolidated, and consolidated levels
Standardized format ESAs have specified the data fields and format

Quick Answer: The Register of Information is a structured database of all contractual arrangements with ICT third-party service providers that financial entities must maintain and submit to regulators. It must include provider identification, contract details, services provided, criticality classification, data locations, and sub-outsourcing information. The register enables internal risk monitoring, supports supervisory oversight, and provides input for CTPP designation decisions. First submissions are scheduled for 2025/2026.

Purpose of the Register

Internal Use

The RoI serves as an internal risk management tool:

Purpose Benefit
Visibility Complete view of ICT third-party landscape
Risk assessment Input for concentration and dependency analysis
Due diligence Support for provider reviews
Exit planning Foundation for transition planning
Incident response Quick identification of affected providers

Supervisory Use

Competent authorities use submitted registers to:

Purpose Activity
Oversight Monitor ICT third-party risk across supervised entities
Concentration analysis Identify sector-wide concentration risks
CTPP designation Input for identifying critical providers
Examination planning Inform supervisory priorities

ESA Use

The European Supervisory Authorities use aggregated data to:

  • Identify candidates for Critical ICT Third-Party Provider designation
  • Analyze systemic risks from ICT concentration
  • Coordinate cross-sector oversight

Required Data Fields

Provider Information

Field Description
Provider name Legal name of the ICT service provider
LEI Legal Entity Identifier (where available)
Headquarters location Country of provider's registered office
Parent undertaking Parent company information
Registration details Company registration numbers
Contact information Key contact details

Contract Information

Field Description
Contract identifier Unique reference for the arrangement
Contract start date When the arrangement began
Contract end date Scheduled termination (if applicable)
Contract value Annual cost of services
Governing law Jurisdiction governing the contract
Termination provisions Notice period and termination rights

Service Information

Field Description
Service description Nature of ICT services provided
Service type Classification of service category
Functions supported Business functions relying on the service
Critical function indicator Whether service supports critical/important functions
Data types Categories of data processed
Data locations Where data is processed and stored

Sub-Outsourcing

Field Description
Sub-contractor details Information on material sub-contractors
Sub-contracted services Services provided by sub-contractors
Sub-contractor locations Where sub-contractors process data

Risk Assessment

Field Description
Substitutability assessment Ease of replacing the provider
Concentration indicator Contribution to concentration risk
Last assessment date When provider was last reviewed

Scope of Coverage

Which Providers to Include

The register must include all ICT third-party service providers:

Include Examples
Cloud services IaaS, PaaS, SaaS providers
Software vendors Core banking, trading systems
Data services Market data, reference data
Infrastructure Network, telecommunications
Security services Managed security, SOC services
Support services IT support, maintenance
Specialized services Payment processing, custody

Criticality Classification

Distinguish between services supporting:

Classification Impact
Critical or important functions Enhanced RoI requirements, additional scrutiny
Other functions Standard RoI requirements

Critical functions are those whose disruption would materially impair:

  • Financial performance
  • Soundness or continuity
  • Compliance with authorization conditions
  • Regulatory obligations

Register Structure

Entity Level

Each legal entity must maintain its own register covering:

  • All ICT arrangements directly contracted by that entity
  • Services consumed by that entity

Sub-Consolidated Level

For groups, sub-consolidated registers aggregate:

  • Registers of entities within sub-consolidation scope
  • Cross-entity provider relationships

Consolidated Level

The ultimate parent must maintain a consolidated register:

  • Complete group-wide view
  • All ICT third-party relationships across the group
  • Identification of group-wide concentration risks

Preparation Process

Phase 1: Discovery

Activity Output
Contract inventory List of all ICT-related contracts
Provider identification Deduplicated list of providers
Service mapping Services provided by each provider
Function mapping Business functions supported

Phase 2: Data Collection

Activity Output
Provider data Complete provider information
Contract data Contract terms and details
Service data Service descriptions and classifications
Location data Data processing and storage locations

Phase 3: Classification

Activity Output
Criticality assessment Critical function identification
Concentration analysis Concentration risk assessment
Substitutability review Replaceability evaluation

Phase 4: Validation

Activity Output
Data quality review Accuracy verification
Completeness check Coverage confirmation
Format alignment ESA template compliance

Submission Requirements

Timeline

Event Date
DORA applicable January 17, 2025
Submission window February 16 - March 13, 2026 (approximate)
Authority submission to ESAs March 31, 2026

Exact dates are announced by competent authorities.

Format

The ESAs have specified:

  • Standardized data templates
  • Required data fields and formats
  • Technical specifications for submission

Frequency

Following initial submission:

  • Regular updates (likely annual)
  • Notifications of material changes
  • Ongoing maintenance requirement

Common Challenges

Provider Cooperation

Challenge: Obtaining complete information from providers

Solutions:

  • Engage providers early about data requirements
  • Include information requirements in contracts
  • Use questionnaires aligned with RoI fields
  • Escalate where cooperation is lacking

Group Complexity

Challenge: Aggregating data across multiple entities

Solutions:

  • Standardize data collection processes
  • Implement central register management
  • Coordinate across group entities
  • Use automation where possible

Data Quality

Challenge: Ensuring accuracy and completeness

Solutions:

  • Validate data against contracts
  • Cross-reference with procurement and finance
  • Implement data governance
  • Regular quality reviews

Classification Consistency

Challenge: Consistent critical function determination

Solutions:

  • Develop clear classification criteria
  • Document classification rationale
  • Review classifications periodically
  • Train staff on criteria

Ongoing Maintenance

Updates Required

The register must be updated for:

Event Action
New arrangements Add to register
Contract changes Update relevant fields
Terminations Update or remove entry
Provider changes Update provider information
Function changes Revise criticality classification

Review Cadence

Activity Frequency
Data accuracy review Quarterly
Completeness check Semi-annually
Classification review Annually
Full register audit Annually

Common Questions

Do we need to include all ICT providers, even minor ones?

Yes. The register should include all ICT third-party service providers, though the level of detail and scrutiny may vary based on criticality and risk.

What about intragroup ICT services?

ICT services provided within the group should be documented, particularly where they support critical functions. The treatment depends on specific arrangements and regulatory guidance.

How granular should service descriptions be?

Service descriptions should be sufficient to understand what the provider does and which business functions depend on it. For critical functions, more detail is expected.

Can we use existing contract management systems?

Yes, if they can capture required data fields and produce outputs in the required format. Many organizations enhance existing systems or implement dedicated solutions.

What happens if data is incomplete at submission?

Incomplete submissions may attract supervisory attention. Document known gaps and remediation plans. Focus on completeness for critical function providers.

How Bastion Helps

Bastion supports financial entities in preparing and maintaining the Register of Information:

  • Gap assessment: Evaluate current third-party documentation against RoI requirements
  • Data collection: Support gathering required information from providers
  • Classification: Assist with critical function and concentration analysis
  • Template population: Prepare submissions in required formats
  • Ongoing maintenance: Processes for keeping the register current

Ready to prepare your Register of Information? Talk to our team


Sources