Ibrachy & Dermarkar

Ibrachy & Dermarkar

Show options

Global

News and developments

Data Protection

Overview of the Executive Regulations of the Egyptian Personal Data Protection Law

I. Purpose, Scope, and Analytical Framework Law No. 151 of 2020 established Egypt’s first comprehensive statutory framework for the protection of personal data. From the outset, however, the Law was intentionally principles-based and explicitly dependent on its Executive Regulations to define the mechanics of implementation, supervision, and enforcement. For several years following the Law’s issuance, this absence created a structural gap between legislative intent and practical enforceability. During this interim period, controllers, processors, and regulators alike operated in a state of legal incompleteness. Core obligations existed in theory, but the absence of binding technical standards, licensing structures, procedural timelines, and documentation requirements rendered full compliance difficult to define and enforcement inherently uncertain. In practice, the delayed issuance of the Executive Regulations limited the Law’s operational impact and constrained the development of a predictable compliance environment. Executive Regulations No. 816 of 2025 therefore represent not merely the final step in implementing Law No. 151 of 2020, but a necessary regulatory inflection point. The Regulations transform the Law from a framework of general principles into a functioning regulatory system by introducing enforceable operational standards, graduated licensing regimes, inspection mechanisms, and detailed procedural obligations. II. General Principles Governing the Collection and Processing of Personal Data (as Developed by the Executive Regulations) While Law No. 151 of 2020 establishes the core legality conditions for the collection and processing of personal data, the Executive Regulations No. 816 of 2025 materially develop those conditions by converting high-level statutory principles into binding technical, procedural, and documentation requirements. The Executive Regulations therefore function not merely as interpretive guidance, but as the primary instrument defining how compliance is practically achieved. A. Licensing, Purpose Specification, and Regulatory Control of Lawfulness The Executive Regulations reinforce the licensing requirement contained in the Law by making it an operational precondition for any data collection, processing, retention, or securing activity, regardless of whether the entity is otherwise authorized under sector-specific legislation. In practice, this elevates licensing from a formal requirement into a continuous compliance condition. A key regulatory development introduced by the Executive Regulations is the tight coupling of purpose specification to licensing scope. Collection and processing must not only be lawful and declared, but must remain strictly within the purpose expressly approved by the competent authority. Any functional expansion, even if commercially logical or technically incidental, requires renewed consent and regulatory alignment. The Executive Regulations further introduce an express recognition of implied consent in narrowly defined circumstances. A natural person is deemed to have implicitly consented where processing is strictly necessary to deliver a lawful service or transaction expressly requested by the data subject. This represents a material clarification not expressly articulated in the Law. However, the Regulations simultaneously restrict this concept by expressly prohibiting any secondary or unrelated use of data obtained on the basis of implied consent, thereby preventing functional creep. B. Consent Formalization, Transparency, and Enforceable Awareness Although consent remains the principal legal basis under the Law, the Executive Regulations significantly raise the evidentiary and procedural threshold for valid consent. Consent is no longer assessed solely as a legal condition, but as a documented, auditable process. Entities are now required to implement consent mechanisms capable of demonstrating, at any time, the form, timing, scope, and validity of consent, including guardian consent for children. This requirement transforms consent from a transactional act into a compliance asset subject to inspection. The Executive Regulations also operationalize transparency obligations by requiring that data subject rights be communicated at the point of collection, not merely through general privacy notices. This embeds transparency directly into data collection workflows and exposes entities to regulatory risk where rights are technically available but practically obscured. C. Data Minimization, Retention Mapping, and Purpose-Linked Time Limits The Executive Regulations materially strengthen the data minimization and retention principles by imposing a forward-looking planning obligation. Entities must now determine, in advance, retention periods for each category of personal data and formally link those periods to the stated purpose of collection. This represents a shift from outcome-based compliance to design-based compliance. Retention is no longer assessed only after the fact, but at the architectural stage of data systems and processes. Retention beyond the purpose period is expressly prohibited unless supported by an independent legal justification. D. Security Measures and Mandatory Documentation While the Law imposes a general duty to protect personal data, the Executive Regulations introduce enforceable technical and organizational compliance expectations by requiring adherence to security measures issued by the competent authority. These measures apply comprehensively to all devices, systems, platforms, and storage media used in any stage of data handling. A central regulatory innovation introduced by the Executive Regulations is the mandatory maintenance of secure electronic records. These records must document, at a minimum, consent, data categories, retention periods, and applied security measures, and must be structured in a manner that enables direct regulatory inspection. Compliance is therefore no longer assessed solely through outcomes, but through demonstrable internal governance. III. Controller and Processor Obligations (Expanded and Operationalized by the Executive Regulations) The Executive Regulations significantly recalibrate the obligations of data controllers and processors by transforming the general duties set out in Law No. 151 of 2020 into detailed operational, organizational, and record-keeping requirements. In doing so, the Regulations materially increase both compliance complexity and regulatory exposure. A. Obligations of the Data Controller Licensing Scope and Purpose Discipline The Executive Regulations elevate licensing from a formal authorization into a substantive constraint on operational behavior. Controllers are prohibited not only from unlicensed processing, but from any use of personal data that exceeds the licensed purpose, even where such use would otherwise appear compatible with the controller’s business model. Controllers are further required to align the volume and categories of collected data with what is expressly permitted under the laws governing their activity. Where such laws are silent on retention, security, or transfer, the Personal Data Protection framework applies by default, closing regulatory gaps that previously existed. Accuracy Verification, Retention Termination, and Anonymization Duties The Executive Regulations introduce a positive obligation on controllers to actively verify the accuracy and currency of personal data, including through review of its source. This shifts responsibility away from passive reliance on initial collection. Upon expiry of the collection purpose, controllers must not only delete data, but must notify data subjects and ensure that any legally retained data is rendered non-identifiable. Where retention is justified by legal or national security considerations, the Regulations impose a clear obligation to anonymize or render data unreadable and to permanently delete it once justification ceases. Authority-Approved Mechanisms for Data Subject Rights A major regulatory development is the requirement that controllers establish authority-approved mechanisms enabling data subjects to exercise their rights. Rights are no longer assessed in abstraction; controllers must demonstrate that mechanisms are functional, documented, and verifiable. This creates direct exposure where rights exist legally but are operationally ineffective. Confidentiality, Internal Controls, and Inspection Readiness The Executive Regulations expressly require controllers to bind all personnel involved in data handling to confidentiality obligations and to implement organizational controls capable of withstanding regulatory inspection. Cooperation with inspectors is framed not as a procedural courtesy, but as a substantive obligation. Foreign controllers without a local presence are required to appoint an approved local representative or agent, reinforcing regulatory reach beyond territorial boundaries. Mandatory Electronic Registers Controllers must maintain detailed electronic registers documenting data subject requests, retention decisions, and legally retained data. These registers must be structured to allow inspection without enabling third-party identification, reflecting a balance between oversight and data protection. B. Obligations of the Data Processor The Executive Regulations materially expand the compliance footprint of processors, who are no longer treated as operational extensions of controllers but as independently regulated actors. Processors must operate within a licensed scope, implement authority-approved processing mechanisms, and document data categories, purposes, durations, and consent where applicable. Processing outside the controller’s licensed purpose is prohibited, subject only to narrowly defined and heavily conditioned exceptions. The explicit regulation of artificial intelligence and emerging technologies constitutes a notable regulatory development. Processors must ensure that data use in such contexts complies with recognized principles and does not result in harm, introducing a risk-based and ethical compliance dimension not previously articulated in the Law. Processors are also subject to robust security, incident preparedness, register-keeping, and foreign representation requirements equivalent in substance to those imposed on controllers. IV. Obligations in the Event of a Personal Data Breach (Procedural Intensification under the Executive Regulations) While the Law establishes the obligation to report personal data breaches, the Executive Regulations significantly intensify this obligation by prescribing the reporting channel, content, documentation standards, and timelines. Controllers and processors must report breaches through a designated electronic register within seventy-two hours of knowledge, with immediate notification required where national security considerations arise. The Regulations impose detailed content requirements and introduce a parallel obligation to notify affected data subjects within a defined timeframe using pre-agreed communication methods. V. Cross-Border Transfer and International Processing of Personal Data (Regulatory Expansion Beyond the Law) Although Law No. 151 of 2020 establishes the principle of adequacy and prior authorization, the Executive Regulations construct a comprehensive regulatory regime governing cross-border data flows. This regime introduces structured adequacy assessments, country-specific licensing, detailed application requirements, and enforceable safeguards, transforming international data transfer from an exception-based concept into a regulated operational activity. A. General Prohibition and Licensing Requirement As a general rule, personal data collected or prepared for processing within Egypt may not be transferred, stored, shared, made available, or processed outside Egypt unless the controller or processor has obtained a license or permit from the competent authority. This requirement applies irrespective of whether the transfer is permanent or temporary and covers all forms of cross-border data handling. In all cases, the data subject’s consent is required prior to the cross-border transfer of personal data, unless a statutory exception applies. Consent must be informed and specific to the transfer activity. Controllers and processors remain responsible for ensuring that personal data transferred across borders is protected at a level consistent with the scope, nature, and sensitivity of the data, in accordance with the conditions and safeguards set out in the issued license or permit. Transfers may only be made to the foreign state or states expressly identified in the relevant license or permit. Any subsequent addition of destination countries during the validity period of the authorization requires prior amendment or renewal of the license or permit. B. Adequacy of Data Protection in the Recipient Country The Executive Regulations adopt an adequacy-based approach to international data transfers. The competent authority is responsible for determining whether a foreign state provides a sufficient level of personal data protection, based on approved policies and subject to periodic review. In assessing adequacy, the authority considers, in particular: The existence of personal data protection legislation or regulatory frameworks and their consistency with the principles of the Personal Data Protection Law. The availability of technical and security measures ensuring effective data protection. The presence of legal mechanisms enabling compensation for damage suffered by data subjects as a result of misuse of their personal data. Where these criteria are met, the authority may approve the issuance of licenses or permits allowing transfers to such foreign states. C. Transfers to Countries Lacking Adequate Protection (Statutory Exceptions) By way of exception, personal data may be transferred to a country that does not provide an adequate level of protection, provided that the explicit consent of the data subject or their legal representative has been obtained and that the transfer falls within one of the statutorily defined cases, including: Protection of the data subject’s life or provision of medical care or health services. Establishment, exercise, or defense of legal rights before judicial authorities. Conclusion or performance of a contract concluded in the interest of the data subject. Execution of international judicial cooperation procedures. Fulfilment of a legal obligation or protection of the public interest. Execution of cross-border monetary transfers in accordance with applicable legislation. Implementation of an international treaty or agreement to which Egypt is a party. These exceptions are interpreted restrictively and do not dispense with the requirement to implement appropriate technical and organizational safeguards. D. Disclosure of Personal Data to a Foreign Controller or Processor Personal data may be made available to another controller or processor located outside Egypt only pursuant to a license issued by the competent authority and subject to additional substantive conditions. Such disclosure is permitted where there is compatibility or integration between the activities of the relevant entities, or unity of purpose in obtaining the personal data, and where a legitimate interest exists for the transferring entity, the recipient entity, or the data subject. In all cases, the level of legal and technical protection applied by the foreign controller or processor must not be lower than the level applicable within Egypt. E. Conditions for Licensing Cross-Border Transfers a) Legal Persons Without prejudice to the general licensing requirements, legal persons seeking authorization to transfer personal data across borders must, at a minimum, provide: Identification of the destination country or countries. Information on the nature of the activity of the foreign controller or processor. Description of the categories and nature of the personal data to be transferred. Details of security systems, storage locations (temporary and permanent), and protective measures applied during transfer and storage. Evidence of compliance with applicable cross-border data protection standards. Specification of the purpose of the transfer. Adequate information on storage locations in accordance with authority-issued templates. Description of data categories, volume, and retention periods. b) Natural Persons Natural persons applying for authorization must provide: Description, nature, volume, and purpose of the personal data to be transferred. Identification of the recipient entity and applicable retention period. Details of security systems, storage locations, and protection measures. Evidence of compliance with applicable cross-border data protection standards. Adequate information on storage locations in accordance with authority-issued templates. F. Licensing Procedures and Regulatory Review Applications for licenses or permits to transfer personal data across borders must be submitted electronically through the designated portal, accompanied by all required information and supporting documentation. The competent authority reviews applications through specialized technical teams and may request additional information where necessary. Applicants are notified of the authority’s decision within a period not exceeding ninety working days from the date of completion of all required documentation. Failure to respond within this period constitutes an implicit rejection of the application. VI. Direct Digital Marketing (Regulatory Expansion under the Executive Regulations) While Law No. 151 of 2020 establishes a general prohibition on direct electronic marketing without prior consent, the Executive Regulations No. 816 of 2025 fundamentally restructure this activity by subjecting it to a standalone regulatory and licensing regime. The Regulations move beyond consent as a sufficient compliance condition and treat direct digital marketing as a high-risk processing activity requiring prior authorization, enhanced documentation, and continuous regulatory oversight. A. Direct Digital Marketing as a Licensed Activity A central development introduced by the Executive Regulations is the requirement that any entity engaging in direct electronic marketing, whether acting as a controller, processor, or marketing intermediary, must obtain a specific license or permit dedicated to direct electronic marketing activity. This obligation applies independently of any license held by the entity in its capacity as a controller or processor and therefore constitutes an additional layer of regulatory approval. The Regulations further differentiate between marketing conducted for the entity’s own goods or services and marketing conducted on behalf of third parties. This distinction is not merely descriptive but carries regulatory consequences, including differentiated licensing categories and increased scrutiny for third-party marketing service providers. The structure reflects a clear regulatory assessment that outsourced and intermediary-based marketing presents heightened compliance and abuse risks. B. Consent as a Condition for Operation, Not Merely Lawfulness Although prior consent is already required under the Law, the Executive Regulations materially intensify the legal effect of consent in the marketing context. Consent must be explicit, purpose-specific, and demonstrably linked to direct electronic marketing communications. More importantly, the Regulations impose a mandatory obligation to erase personal data without delay in two situations: (i) where the data subject withdraws consent to marketing, or (ii) where the retention period or marketing purpose expires, whichever occurs first. This requirement departs from more flexible evidentiary retention approaches under the Law and reflects a stricter application of purpose limitation in the marketing context. C. Absolute Purpose Limitation and Prohibition of Secondary Use The Executive Regulations expressly prohibit the use of personal data collected for direct electronic marketing for any other purpose, including processing, sharing, or circulation, unless new explicit consent is obtained from the data subject. This provision closes a practical gap that previously allowed marketing data to be reused for analytics, profiling, or affiliated commercial purposes under broad or bundled consent language. Under the Executive Regulations, marketing data is legally ring-fenced and confined to its declared promotional purpose. D. Mandatory Content and Functional Requirements for Marketing Communications The Executive Regulations substantially expand the formal requirements applicable to the structure and content of marketing communications. Every direct electronic marketing message must clearly identify the sender, specify the marketing purpose, and provide the data subject with a continuous and unrestricted ability to refuse or withdraw consent at any time. Withdrawal and refusal mechanisms must be accessible through any communication channel approved by the competent authority, including digital platforms, messaging services, email, telephone communications, or other technical means. This approach ensures that informal or platform-based outreach falls fully within the regulatory framework and cannot be used to bypass compliance obligations. E. Regulation of Marketing Intermediaries and Data Provenance A notable regulatory development introduced by the Executive Regulations is the express regulation of marketing intermediaries. Where marketing is conducted through an intermediary, that intermediary bears an independent obligation to verify that valid consent was originally obtained by the controller or processor and that the marketing activity aligns with the declared purpose. Intermediaries must also retain evidence of the source of the personal data and the data subject’s consent to receive marketing communications. This eliminates reliance on contractual disclaimers and significantly increases compliance exposure for outsourced marketing providers by imposing direct accountability for consent provenance. F. Mandatory Electronic Registers and Audit Exposure The Executive Regulations impose dedicated record-keeping obligations specific to direct electronic marketing. Entities must maintain secure electronic registers documenting the method and timing of consent, the specific marketing purpose, requests for erasure or modification of consent, and the technical and organizational measures used to secure marketing data. These registers must be made available to the competent authority upon request and operate independently from general processing records. Their purpose is not merely administrative but to enable targeted inspections and enforcement actions in response to complaints or suspected non-compliance. G. Complaint-Driven Enforcement Mechanism As an additional regulatory measure, the Executive Regulations require the competent authority to designate specific communication channels for receiving complaints related to direct electronic marketing practices. This introduces a direct enforcement pathway driven by data subjects rather than solely by regulatory audits, increasing the likelihood of investigation based on consumer-level grievances. VII. Licensing and Permitting Regime under the Executive Regulations One of the most significant regulatory shifts introduced by the Executive Regulations No. 816 of 2025 is the establishment of a comprehensive, graduated licensing and permitting regime governing all personal data processing activities. While Law No. 151 of 2020 requires controllers and processors to obtain authorization from the competent authority, the Executive Regulations fundamentally restructure this requirement by introducing differentiated license types, time-limited permits, quantitative fee scaling based on data volume, and detailed procedural and documentary thresholds. A. Consolidated Controller/Processor License for Legal Persons The Executive Regulations introduce a consolidated “Controller/Processor” license for legal persons, replacing the previously ambiguous distinction between controller-only and processor-only authorizations. This consolidated license recognizes the operational reality that many entities perform both roles concurrently. Licensing fees under this regime are directly linked to the volume of personal data records processed, measured by the number of individual data subject records held by the applicant. The Regulations establish a progressive fee structure that scales with data volume, introducing predictability while simultaneously discouraging excessive or unjustified data accumulation. Annual Licensing Fees for Controller/Processor (Up to One Million Records): Number of Personal Data Records Annual Licensing Fee (EGP) From 1 to 10,000 Exempt From 10,001 to 200,000 200 From 200,001 to 300,000 300 From 300,001 to 400,000 400 From 400,001 to 500,000 500 From 500,001 to 600,000 600 From 600,001 to 700,000 700 From 700,001 to 800,000 800 From 800,001 to 900,000 900 From 900,001 to 1,000,000 1,000   Annual Licensing Fees for Controller/Processor License (Above One Million up to Two Million Records): Number of Personal Data Records Annual Licensing Fee (EGP) From 1,000,001 to 1,100,000 5,000 From 1,100,001 to 1,200,000 10,000 From 1,200,001 to 1,300,000 15,000 From 1,300,001 to 1,400,000 20,000 From 1,400,001 to 1,500,000 25,000 From 1,500,001 to 1,600,000 30,000 From 1,600,001 to 1,700,000 35,000 From 1,700,001 to 1,800,000 40,000 From 1,800,001 to 1,900,000 45,000 From 1,900,001 to 2,000,000 50,000   Annual Licensing Fees for Controller/Processor License (Above Two Million up to Three Million Records): Number of Personal Data Records Annual Licensing Fee (EGP) From 2,000,001 to 2,100,000 60,000 From 2,100,001 to 2,200,000 70,000 From 2,200,001 to 2,300,000 80,000 From 2,300,001 to 2,400,000 90,000 From 2,400,001 to 2,500,000 100,000 From 2,500,001 to 2,600,000 110,000 From 2,600,001 to 2,700,000 120,000 From 2,700,001 to 2,800,000 130,000 From 2,800,001 to 2,900,000 140,000 From 2,900,001 to 3,000,000 150,000   Annual Licensing Fees for Controller/Processor License (Above Three Million up to Four Million Records): Number of Personal Data Records Annual Licensing Fee (EGP) From 3,000,001 to 3,100,000 165,000 From 3,100,001 to 3,200,000 180,000 From 3,200,001 to 3,300,000 195,000 From 3,300,001 to 3,400,000 210,000 From 3,400,001 to 3,500,000 225,000 From 3,500,001 to 3,600,000 240,000 From 3,600,001 to 3,700,000 255,000 From 3,700,001 to 3,800,000 270,000 From 3,800,001 to 3,900,000 285,000 From 3,900,001 to 4,000,000 300,000   Annual Licensing Fees for Controller/Processor License (Above Four Million up to Five Million Records): Number of Personal Data Records Annual Licensing Fee (EGP) From 4,000,001 to 4,100,000 320,000 From 4,100,001 to 4,200,000 340,000 From 4,200,001 to 4,300,000 360,000 From 4,300,001 to 4,400,000 380,000 From 4,400,001 to 4,500,000 400,000 From 4,500,001 to 4,600,000 420,000 From 4,600,001 to 4,700,000 440,000 From 4,700,001 to 4,800,000 460,000 From 4,800,001 to 4,900,000 480,000 From 4,900,001 to 5,000,000 500,000 For data volumes exceeding five million personal data records, the Executive Regulations impose a statutory maximum annual licensing fee, capped at EGP 2,000,000, payable annually for a total of three years. Where an entity applies for a controller-only or processor-only license, the applicable fee is reduced to 50% of the corresponding amount indicated in the tables, reflecting reduced functional scope. B. Temporary and Purpose-Specific Processing Permits In addition to permanent licenses, the Executive Regulations introduce time-limited processing permits for specific and temporary purposes, valid for a period not exceeding one calendar year. The competent authority is granted discretion to assess the continuing necessity of the permitted purpose as a condition for renewal or continuation. Unlike licenses, permits automatically lapse once the authorized purpose expires, without the need for formal revocation. Permit fees are calculated based on both data volume and permit duration, introducing a granular fee matrix that did not exist under the Law. Permit Fees Based on Data Volume and Duration: Number of Records > 3 months to 1 year > 1 month to 3 months > 1 week to 1 month < 1 week 1 to 25,000 Exempt Exempt Exempt Exempt 25,001 to 250,000 50,000 37,500 25,000 12,500 250,001 to 1,000,000 100,000 75,000 50,000 25,000 1,000,001 to 2,000,000 200,000 150,000 100,000 50,000 2,000,001 to 3,000,000 300,000 225,000 150,000 75,000 3,000,001 to 4,000,000 400,000 300,000 200,000 100,000 4,000,001 to 5,000,000 500,000 375,000 250,000 125,000 Above 5,000,000 Statutory maximum applies Statutory maximum applies Statutory maximum applies Statutory maximum applies   Where the data volume exceeds the statutory threshold, the maximum permit fee prescribed by law applies regardless of duration. As with licenses, permits issued to controller-only or processor-only applicants are subject to a 50% fee reduction relative to the consolidated rate. C. Conditions Applicable to Natural Persons For natural persons, the Executive Regulations introduce a tailored but still rigorous permitting framework. Applicants must demonstrate lawful purpose, technical capacity, and compliance readiness proportionate to the scale of processing, including consent mechanisms, security measures, and compliance with inspection and oversight requirements. D. Cross-Border Data Transfer Licensing as an Extension of the Core Regime The Executive Regulations expressly link cross-border data transfer authorization to the underlying controller/processor licensing regime. Any license or permit for international data transfer is priced at 50% of the applicable controller/processor licensing fee, reflecting the heightened risk profile of cross-border processing. E. Application Procedures and Regulatory Review A key procedural innovation introduced by the Executive Regulations is the mandatory use of a centralized electronic licensing portal for all license and permit applications. Applications are reviewed by specialized technical teams, and the authority may request supplementary information as needed. The Regulations impose a definitive review timeline of 90 working days from completion of documentation, with silence constituting an implicit rejection, thereby eliminating regulatory uncertainty through inaction. F. Expanded Documentation Requirements The Executive Regulations substantially increase the documentary burden on applicants, particularly legal persons. Required submissions now extend beyond corporate identification to include detailed technical, operational, and security documentation relating to data infrastructure, hosting environments, certifications, and compliance controls. An applicant that is a legal person must submit the following data and documents in order to obtain a license or permit: A copy of the commercial register of the legal person, together with its address, details of its legal representative, organizational structure, nature of activity, and contact information, including telephone number and email address. A clear specification of the category of license or permit requested. A description of the nature and volume of personal data processed, including identification of any sensitive personal data. The retention period applicable to the personal data. A description of the security measures applied to the transfer of personal data. An explanation of the mechanisms for erasure or modification of personal data in accordance with the data subject’s request or as required by law. A description of the method used to store personal data. Identification of the appointed Data Protection Officer. A description of the mechanism used to obtain the data subject’s consent. Full technical details of the infrastructure used, including the classification of data centers or the types of servers used, any technical certifications or accreditations obtained, and confirmation that the infrastructure complies with the technical and operational requirements prescribed by the Centre. Copies of the technical certifications and accreditations obtained in relation to the security of personal data storage and processing, specifying the issuing authority, date of issuance, and validity period. An applicant that is a natural person must submit the following data and documents in order to obtain a permit: A copy of the national identification card, a criminal record certificate, academic qualifications, and a description of the professional activity carried out by the applicant. A specification of the type and category of permit requested. A statement of the purpose for which the permit is requested. A description of the nature and volume of personal data processed, including identification of any sensitive personal data. The retention period applicable to the personal data. An explanation of the mechanisms for erasure or modification of personal data in accordance with the data subject’s request or as required by law. A description of the method used to store personal data. A description of the mechanism used to obtain and record the data subject’s consent. Full technical details of the infrastructure used, including the types of devices used and any technical certifications or accreditations obtained, together with confirmation that the infrastructure complies with the technical and operational requirements prescribed by the Centre. Copies of the technical certifications and accreditations obtained in relation to the security of personal data storage and processing, specifying the issuing authority, date of issuance, and validity period. Conclusion The issuance of Executive Regulations No. 816 of 2025 marks the effective activation of Egypt’s personal data protection regime. While Law No. 151 of 2020 articulated foundational rights and duties, its practical relevance was necessarily limited in the absence of implementing regulations capable of translating those duties into operational reality. The prolonged delay in issuing the Executive Regulations underscored the extent to which modern data protection frameworks depend on technical and procedural detail rather than statutory principle alone. Without defined licensing categories, measurable security standards, structured consent mechanisms, and enforceable documentation requirements, compliance remained largely theoretical and enforcement necessarily restrained. The Executive Regulations close this gap. They convert the Law’s abstract obligations into concrete systems of compliance and oversight. Licensing becomes a structural condition of legality. Consent becomes an auditable process. Retention and minimization are embedded at the design level. Controllers and processors are treated as independently accountable regulatory subjects. Cross-border data transfers are governed through structured adequacy assessments and country-specific authorizations. Direct digital marketing is elevated to a regulated activity in its own right. Collectively, these developments signal a clear regulatory transition. The Personal Data Protection framework is no longer aspirational or transitional. It is operational. For regulated entities, this shift carries both risk and clarity. Regulatory exposure increases, but so does predictability. The Executive Regulations provide the long-awaited reference point against which compliance can be assessed, systems can be designed, and enforcement expectations can be anticipated. In practical terms, Executive Regulations No. 816 of 2025 now constitute the core compliance instrument under Egypt’s personal data protection regime. Any assessment of legal risk, operational readiness, or regulatory strategy must therefore begin with the Regulations themselves. Their issuance not only completes the legislative architecture initiated in 2020, but finally enables the Personal Data Protection Law to function as a living regulatory system rather than a deferred legal promise.     Annex - Executive Regulations Compliance Checklist  A. Governance & Registration ☐ Determine whether you act as controller, processor, or both ☐ Register with the Personal Data Protection Center ☐ Obtain required licenses or permits before processing ☐ Appoint internal data protection responsibility (DPO-like role) B. Data Mapping & Legal Basis ☐ Map all personal and sensitive data processed ☐ Identify lawful basis for each processing activity ☐ Ensure explicit consent mechanisms are documented ☐ Separate treatment for sensitive and biometric data C. Policies & Documentation ☐ Privacy notices aligned with Regulation requirements ☐ Records of processing activities ☐ Processor agreements with confidentiality and security clauses ☐ Data retention and deletion schedules D.Security & Risk Management ☐ Implement technical and organizational safeguards ☐ Conduct risk assessments for high-risk processing ☐ Restrict internal access to personal data ☐ Maintain breach-response protocols E.Data Breach Response ☐ Notify PDPC within required timelines ☐ Notify affected data subjects where risk exists ☐ Document breach causes and remedial actions F. Cross-Border Transfers ☐ Assess destination country’s protection level ☐ Obtain prior PDPC approval ☐ Secure explicit data-subject consent where required ☐ Maintain transfer documentation  
12 January 2026
Press Releases

Punitive aspects related to the Intellectual Property Rights in the executive order on reciprocal tariffs dated 2 April, 2025 by Donald Trump.

Punitive aspects related to the Intellectual Property Rights in the executive order on reciprocal tariffs dated 2 April, 2025 by Donald Trump. By: Emma Sainsbury, and Mostafa Ahmed Ibrachy & Dermarkar Law Firm | Est. 1932 May, 2025 The executive order of 2 April 2025 sparked interesting debates and discussions in the national and international media. Most of these debates focus on the announced aim for the executive order which is addressing the current account deficit. The discussions however overlooked the punitive aspect related to infringing the Intellectual Property rights owned by the US. Historical Use of Tariffs as Punitive Trade Measures: Interestingly, despite widespread global unrest and shock in relation to this new order, it is not the first time that the White House has used tariff related measures under such circumstances. Punitive use of the tariff can be traced to as far back as 1828, when the US Congress passed what became known as the ‘abomination tariff’. As implied by its name, its unprecedented high rates, in an attempt to rectify trade imbalances, received heavy criticism, which led to their nullification just 4 years later. It exemplified an early executive use of the tariff as a solution to restore the commercial balance sheet in favour of domestic trade, but in this case ultimately led to its nullification just 5 years later. Trump’s recent tariff, passed with a similar intent of rectifying the trade imbalance, can now be analysed in a 21st century framework, where intellectual property rights have a significant part to play on the international playing field. Intellectual Property Deficiencies as Non-Tariff Barriers With reference to the recent declaration, it is extrapolated from the text of the executive order issued by Donald Trump on 2 April, 2025 that it indeed addresses "inadequate patent, copyright, trade secret, and trademark regimes and inadequate enforcement of intellectual property rights" as non-tariff barriers. While the term "punitive measures" in direct connection with intellectual property might not be explicitly detailed in text of the executive order, the Order's central mechanism of "reciprocal tariffs" designed to "rectify trade practices" (which include those related to inadequate IP protection), can be analysed for its implicitly punitive aspect concerning enforcement of US Intellectual Property. Why It's Important for IP Law: This is a key question because it examines the growing trend of using trade measures to enforce IP protection goals. This could affect how international IP agreements, such as the TRIPS Agreement (which sets global Intellectual Property rules) , are applied. In relation to this, on 4 March 2025 the US indefinitely paused financial contribution to WTO. It's also vital for understanding how trade law and IP law interact when one country uses trade actions based on its assessment of another country's IP system. Looking at the penalty aspect is crucial for seeing how such actions might influence global IP standards, the creation of new inventions, and access to international markets for IP-intensive goods and services. Identification and Legal Interpretation of IP-Related Provisions • Close Reading of the Executive Order: The executive order referencing intellectual property, includes terms like "inadequate patent, copyright, trade secret, and trademark regimes," and "inadequate enforcement of intellectual property rights. Comprehensive Overview of Non-Tariff Barriers in the Executive Order: The transcript of the executive order states that: “Similarly, non-tariff barriers also deprive U.S. manufacturers of reciprocal access to markets around the world. The 2025 National Trade Estimate Report on Foreign Trade Barriers (NTE) details a great number of non-tariff barriers to U.S. exports around the world on a trading-partner by trading-partner basis. These barriers include import barriers and licensing restrictions; customs barriers and shortcomings in trade facilitation; technical barriers to trade (e.g., unnecessarily trade restrictive standards, conformity assessment procedures, or technical regulations); sanitary and phytosanitary measures that unnecessarily restrict trade without furthering safety objectives; inadequate patent, copyright, trade secret, and trademark regimes and inadequate enforcement of intellectual property rights; discriminatory licensing requirements or regulatory standards; barriers to cross-border data flows and discriminatory practices affecting trade in digital products; investment barriers; subsidies; anticompetitive practices; discrimination in favor of domestic state-owned enterprises, and failures by governments in protecting labor and environment standards; bribery; and corruption.” Framing IP Deficiencies as Trade Asymmetries Affecting U.S. Manufacturing: The executive order framed inadequate intellectual property protections as a form of asymmetries in trade relationships actively weaken domestic production capacity, particularly within the U.S. manufacturing . These same imbalances also negatively impact U.S. producers' ability to export, which consequently reduces their incentive to produce. Such lopsided trade dynamics are thus a direct cause of and contribute significantly to the development of trade deficits. The executive order states that: “These asymmetries also impact U.S. producers’ ability to export and, consequentially, their incentive to produce. Specifically, such asymmetry includes not only non-reciprocal differences in tariff rates among foreign trading partners, but also extensive use of non-tariff barriers by foreign trading partners, which reduce the competitiveness of U.S. exports while artificially enhancing the competitiveness of their own goods. These non-tariff barriers include technical barriers to trade; non-scientific sanitary and phytosanitary rules; inadequate intellectual property protections; suppressed domestic consumption (e.g., wage suppression); weak labor, environmental, and other regulatory standards and protections; and corruption. These non-tariff barriers give rise to significant imbalances even when the United States and a trading partner have comparable tariff rates.” Trade Deficits and Non-Tariff Barriers from IP Inadequacies: Inadequate intellectual property protections, inadequate patent, copyright, trade secret, and trademark regimes and inadequate enforcement of intellectual property rights; discriminatory licensing requirements or regulatory standards are framed by the executive order as "non-tariff barriers" or practices contributing to trade deficits targeted by the Order. Executive Order’s Classification of IP Shortcomings as Trade Barriers: The Executive Order frames inadequate intellectual property (IP) protection in trade partner countries as a significant non-tariff barrier that directly contributes to U.S. trade deficits by fostering unfair competition and distorting trade flows. This framing asserts that when trading partners have lax IP regimes or fail to enforce IP rights, their domestic companies can illicitly exploit U.S. IP rights, such as patents, copyrights, trade secrets, and trademarks, trade names—thereby avoiding substantial research and development costs or avoiding licensing royalties. These practices constitute infringement against US IP rights, allowing the domestic infringers in the trade partner companies to utilise US IP rights as free ride on the expense of US IP holders. This effectively creates an unfair competitive advantage, allowing these infringing entities to produce and export goods more cheaply. Such weak IP protection acts as a non-tariff barrier by undermining the competitiveness of U.S. businesses that have invested heavily in innovation, restricting their market access due to fears of infringement, and ultimately devaluing U.S. intellectual assets. The Executive Order then links these IP-related non-tariff barriers to the trade deficit by arguing that they suppress U.S. exports (as companies become wary of selling in infringing markets), increase U.S. imports of unfairly priced or counterfeit goods, hence resulting in lost licensing revenue and royalties for U.S. IP holders. Consequently, the Order positions these IP deficiencies not just as isolated infractions but as systemic trade practices that contribute to the targeted trade imbalances, thereby justifying the consideration of measures like reciprocal tariffs to rectify these conditions. Causal Link Between Reciprocal Tariffs and IP-Related Trade Practices: The authority to impose "reciprocal tariffs" under the Executive Order can be directly linked to identified IP deficiencies in trading partners because the Order is designed to rectify "trade practices" contributing to trade deficits, and it frames inadequate IP protection as a non-tariff barrier—a type of trade practice. By defining these IP deficiencies as harmful trade practices that contribute to the U.S. trade deficit through mechanisms like unfair competition, suppressed exports, and increased infringing imports, the Order establishes a direct causal pathway. Consequently, if a trading partner's IP regime is deemed deficient and thus a contributor to the trade deficit as per the Order's criteria, the "reciprocal tariffs" can be applied as a direct response aimed at rectifying those specific IP-related issues. Legal Justification for Sanctions: Section 301 and the Focus on China: Section 301 of the Trade Act of 1974 explicitly justifies trade sanctions as a response to ‘unreasonable’ acts that may burden U.S. commerce. Trump’s administration in particular, has cited this law several times, as seen in the recent Executive Order, to target such foreign trade practices. A 2017 investigation conducted by the Secretary Trade under his administration, confirmed harmful IP-related trade barriers, with an emphasis on China, placed at the top of its priority watch list . This would explain the particularly high rates aimed at China in the President’s recent policy, and begs the question as to whether such measures are appropriate to tackle severe infringements on US Intellectual Property. Special 301 Report: Evaluating Foreign IP Enforcement in 2025: In this context, on 29 April 2025, the Office of the United States Trade Representative (USTR) released its 2025 Special 301 Report on the adequacy and effectiveness of U.S. trading partners’ protection and enforcement of intellectual property (IP) rights. Unilateral U.S. Determination of “Inadequate” IP Protections: The provided Executive Order clearly states that "inadequate intellectual property protections" in other countries are a type of unfair trade practice (a non-tariff barrier) that harms the U.S. However, the Order doesn't give a specific checklist or detailed definition of what makes IP protection "inadequate." Instead, the meaning is implied: the U.S. government itself will likely decide if another country's IP protection is insufficient based on its own laws, standards, and what it believes is needed to protect American businesses and national security. While international rules like the TRIPS Agreement might be a starting point for these judgments, the Order suggests the U.S. will look for stronger protections than just those minimums, ultimately basing its view of "inadequate" on whether U.S. interests are being properly safeguarded, especially regarding the actual enforcement of IP rights. Divergence from Global IP Norms: U.S. Push for TRIPS-Plus Standards: The Executive Order very clearly sets the stage for the United States to unilaterally decide what it considers "inadequate intellectual property protection" in other countries, without needing their agreement or that of international bodies. This U.S.-only interpretation is highly likely to differ from the global consensus on IP rules, such as those in the TRIPS Agreement. Specifically, the U.S. would probably demand stronger IP protections than current international minimums require (so-called "TRIPS-plus" standards), might object to other countries using internationally permitted flexibilities in IP law if it harms U.S. interests, and would generally prioritize American economic benefits over the more balanced approach favoured by multilateral IP systems. This go-it-alone approach essentially bypasses established international cooperation and dispute settlement processes for IP issues.  
21 July 2025
Press Releases

New Legal Insight: Ultimate Beneficial Ownership Identification in Egypt

New Legal Insight: Ultimate Beneficial Ownership Identification in Egypt   The Central Bank of Egypt (CBE) has issued on January 8, 2025 a Guiding Manual on Identifying Ultimate Beneficial Owners (UBOs). This manual sets a critical regulatory framework for banks to enhance transparency, combat financial crimes, and comply with international anti-money laundering (AML) and counter-terrorist financing (CFT) standards. Our article provides a comprehensive analysis of this critical development, including: Key regulatory requirements for banks Definition and verification of UBOs Common techniques used to obscure ownership Risk indicators for concealed UBOs Compliance measures and international best practices This initiative aligns Egypt’s financial sector with global transparency standards, ensuring a robust framework for financial integrity. Table of contents The Egyptian Central Bank of Egypt Issues a Guiding Manual on Ultimate Beneficial Ownership Identification Objective and Legal Framework Key Requirements for Banks Definition of Ultimate Beneficial Ownership Methods Used to Conceal Ultimate Beneficial Ownership Identifying Ultimate Beneficial Owners in Different Scenarios Verification Procedures for Ultimate Beneficial Owners Indicators for Concealed Ultimate Beneficial Ownership Conclusion FAQs The Egyptian Central Bank of Egypt Issues a Guiding Manual on Ultimate Beneficial Ownership Identification On January 8, 2025, the Central Bank of Egypt (CBE) issued a guiding manual aimed at identifying the ultimate beneficial owners of bank clients. This initiative aligns with international standards for combating money laundering and terrorist financing, emphasizing the necessity for banks to ascertain the true identity of ultimate beneficial owners. Various methods are often used to obscure the identity of ultimate beneficial owners, facilitating illicit financial activities. Objective and Legal Framework: The manual, developed in collaboration with the Anti-Money Laundering and Terrorist Financing Unit, provides comprehensive guidelines on identifying ultimate beneficial owners and recognizing the techniques used to conceal their identities. This initiative aims to establish a robust framework for banks to obtain accurate and updated data on ultimate beneficial owners in compliance with the local legislative and regulatory framework, particularly: The Anti-Money Laundering Law No. 80 of 2002 and its executive regulations issued by Prime Ministerial Decree No. 951 of 2003, along with their amendments. The Central Bank and Banking System Law No. 194 of 2020. Due diligence measures for bank customers issued by the Anti-Money Laundering and Terrorist Financing Unit. Regulatory controls concerning anti-money laundering and terrorist financing. Key Requirements for Banks: The guiding manual stipulates that banks must incorporate, at a minimum, the following measures within their internal procedures: Verification of Ownership and Control Structure: Banks must collect necessary documentation to assess the ownership structure and control mechanisms of their clients, whether individuals, legal entities, or legal arrangements. Identification and Verification of Ultimate Beneficial Owners: For natural persons identified as ultimate beneficial owners, banks must apply due diligence measures issued by the Anti-Money Laundering and Terrorist Financing Unit. Ongoing Monitoring and Updates: Banks must regularly update customer information in accordance with regulatory guidelines, adjusting procedures based on the level of risk associated with concealing ultimate beneficial ownership. Definition of Ultimate Beneficial Ownership: The manual defines an ultimate beneficial owner as “any natural person who ultimately owns or exercises actual control over a client, either directly or indirectly, or on whose behalf transactions are conducted.” Legal ownership and ultimate beneficial ownership are distinct concepts, as a natural person may be considered an ultimate beneficial owner based on the actual control they exercise over a legal entity. For legal entities, ownership structures are typically clear through shareholders and partners, whose information can be verified via official documents, such as general assembly minutes and board resolutions. In the case of trusts and similar structures, certain individuals may hold contractual roles with rights and obligations under a trust deed, despite not being legal owners. Methods Used to Conceal Ultimate Beneficial Ownership: The manual highlights several techniques used to obscure the identity of ultimate beneficial owners, including: Declaring false ultimate beneficial owners. Using shell companies or dormant companies. Establishing complex ownership structures. Appointing nominee shareholders or directors. Utilizing bearer shares, fraudulent loans, and fictitious invoices. Identifying Ultimate Beneficial Owners in Different Scenarios Ultimate Beneficial Owners of Natural Persons: The client is typically the ultimate beneficial owner unless another natural person is authorized to act on their behalf through power of attorney, delegation, or legal representation. If a designated representative manages the account’s operations in a manner suggesting ultimate control, banks must assess whether this individual is the true ultimate beneficial owner. Ultimate Beneficial Owners of Legal Entities: For corporations, commercial entities, institutions, non-profit organizations, and similar entities, ultimate beneficial owners are identified as follows: A natural person holding controlling ownership interests. A natural person exercising control through other means. If no individuals meet the above criteria, a senior management official is identified as the ultimate beneficial owner. Ultimate Beneficial Owners of Legal Arrangements: The identification process mirrors that of legal entities, considering the structural differences in legal arrangements, which may lack ownership control through equity stakes. Additionally, the money laundering and terrorist financing risks associated with such structures vary. Verification Procedures for Ultimate Beneficial Owners The manual outlines essential procedures for verifying ultimate beneficial ownership: Reviewing relevant documents such as trust deeds or letters of wishes. Obtaining information from reliable sources, including regulatory authorities, financial institutions, and corporate service providers. Conducting continuous assessments of transaction patterns, country risks, and the sources of funds linked to ultimate beneficial owners. Indicators for Concealed Ultimate Beneficial Ownership The manual categorizes suspicious indicators into three groups: Indicators related to Individuals: Reluctance to provide personal information. The client's reluctance or inability to explain his business activities and organizational history, the identity of the real beneficiary, or the source of his wealth and funds, as well as clarifying his financial transactions. The nature of his business dealings with other parties such as suppliers or customers. Insisting on using an intermediary for all transactions without sufficient justification. Persistent avoidance of personal contact with the commercial registry of the legal entity or legal arrangement without sufficient justification. Foreigners who do not have significant dealings in the country where they obtain professional or financial services. Refusal to cooperate or provide information, data and documents normally required to clarify the transaction. Inability to make decisions and requesting time to take necessary actions or required behaviors. Conducting transactions that are not appropriate for the client's age, especially for underage clients. Previous conviction for fraud, tax evasion or other offenses. Being under investigation or being associated with criminals. Having a person authorized to sign the company's accounts without sufficient justification. Conducting financial activities and transactions that are not in line with due diligence procedures. Declaring income that does not correspond to their assets or financial transactions. Indicators related to Legal Entities and Arrangements: Long period of inactivity after incorporation, followed by a sudden and unexplained increase in the volume of activity and financial transactions. Absence of any information on the internet or popular social media platforms. Registration under a name that does not refer to the company's activity. Registering under a name similar to another company, especially well-known multinationals. The company's registered address does not match the identification model. The address is not verifiable or accessible. The company's address is shared with several other companies or legal arrangements, indicating that it may be used as a mailbox address only. Lack of an active role for the company's CEO. Declaring a large number of bona fide beneficiaries. Authorizing numerous authorized signatories without sufficient explanation or business justification. Incorporating in a country considered high risk for money laundering and terrorist financing. Incorporating in a country with favorable tax laws. Regularly sending money to low-tax countries or international business or financial centers. Conducting financial activities and transactions that are disproportionate to the size and nature of the company. Conducting a large number of transactions with a small number of beneficiaries. Conducting a small number of high-value transactions with a small number of beneficiaries. Conducting regular transactions with international companies without commercial justification. Establishing relationships with foreign professional intermediaries in the absence of business activities in the country where the professional intermediary operates. Receiving disproportionate amounts of capital funding after incorporation, which is spent or transferred in a short period of time with no business purpose. Maintaining a near-zero bank balance, despite frequent incoming and outgoing transactions. Incorporating in a country that does not require companies to report real beneficiaries to a centralized registry or allows for shareholder anonymity. Operating using bank accounts in countries other than the country where the company is registered without a clear justification. Engaging multiple shareholders, each with an ownership interest just below the minimum threshold required for declaration or enhanced due diligence. Indicators related to Transactions: Executing financial transactions without a legitimate business justification. Transactions involving two legal persons with the same executives, shareholders, or real beneficiaries. Sending or receiving funds from a foreign country without a clear relationship between the country and the client. Unjustified use of powers of attorney or other authorization processes, (e.g., use of representative offices) Unwarranted use of trusts, and unclear or unwarranted relationships between the beneficiaries and the trustee. Conclusion The issuance of the guiding manual by the Central Bank of Egypt marks a significant step toward enhancing transparency and mitigating financial crimes. By implementing the prescribed measures, banks can strengthen their due diligence frameworks, ensuring compliance with regulatory obligations while contributing to global efforts against money laundering and terrorist financing. Written by: Mona Osama  &  Amr Lotfy FAQs: What is the purpose of the Central Bank of Egypt's (CBE) new Guiding Manual on Identifying Ultimate Beneficial Owners (UBOs)? The manual, issued on January 8, 2025, aims to establish a robust regulatory framework for banks in Egypt. Its primary goals are to enhance transparency, combat financial crimes, and ensure compliance with international anti-money laundering (AML) and counter-terrorist financing (CFT) standards. This initiative helps align Egypt’s financial sector with global transparency efforts. What is the definition of an Ultimate Beneficial Owner (UBO) according to the manual? The manual defines a UBO as "any natural person who ultimately owns or exercises actual control over a client, either directly or indirectly, or on whose behalf transactions are conducted". It emphasizes that legal ownership and ultimate beneficial ownership are distinct concepts, as actual control is the determining factor. What are some common techniques used to conceal Ultimate Beneficial Ownership? The manual highlights various methods used to obscure UBO identities, facilitating illicit financial activities. These include declaring false UBOs, utilizing shell or dormant companies, establishing complex ownership structures, and appointing nominee shareholders or directors. Other techniques involve bearer shares, fraudulent loans, and fictitious invoices. What are the key regulatory requirements for banks regarding UBO identification? Banks are required to incorporate several measures into their internal procedures. These include verifying the ownership and control structure of clients by collecting necessary documentation. They must also identify and verify UBOs by applying due diligence measures, and continuously monitor and update customer information based on the risk of UBO concealment. How does this new manual align Egypt's financial sector with international standards? The issuance of this manual aligns Egypt's financial sector with global transparency standards. It is a significant step towards enhancing transparency and mitigating financial crimes, ensuring compliance with international standards for combating money laundering and terrorist financing. By implementing these measures, banks strengthen their due diligence frameworks and contribute to global efforts against financial illicit activities.
21 July 2025
Press Releases

Egypt’s New Medical Liability Law (2025)

Egypt’s New Medical Liability Law (2025) Medical liability, also known as medical malpractice, refers to the legal responsibility of healthcare providers for harm caused to patients due to their actions or omissions during medical care. Replacing Law No.17 of 1986, the legislator intervened with the adoption of Law No. 13 of 2025, marking a fundamental transformation from the earlier provisions, which provided a general and limited framework for regulating medical conduct. I) An Improved Framework for Patient Protection One of the main purposes is to protect patients from potential malpractice. Hence, the law provides for the following: Right to safe medical care (Article 2): Ensures access to medical care in accordance with medical and ethical standards, such as transparency towards the patient. Strict conditions to surgical interventions (Article 7): The law specifies the conditions that must be met for medical practitioners to perform surgical interventions. Prompt review of complaints (Article 13): Any patient’s complaint must be reviewed by a technical subcommittee. Amicable dispute resolution (Article 15): Patients may resort to amicable dispute resolution through conciliation committees, in order to avoid lengthy legal proceedings. Access to compensation (Article 20): This article launches a state-managed insurance fund aiming to compensate patients for medical errors. Even though the principal goal is to protect patients, it is equally important to acknowledge the progress in terms of protection for medical practitioners, providing for a more thorough and just medical liability system.     II) Efficient Safeguard of the Medical Profession The new legislation is also designed to secure legal safeguards for medical practitioners. Accordingly, the law provides the following: Categorization of errors (Article 4): Unlike the previous law, the new one distinguishes between different types of errors, therefore offering a safer environment to practice medicine. It separates between unintentional, unavoidable complications from punishable negligence, since the Article defines the cases where practitioners are exempted from medical liability. This protects doctors from being held liable for natural risks. Hence, medical professionals can efficiently practice without fear of being convicted or falsely accused of a grander error rather than the appropriate one in its respective circumstance or a natural risk. Rules regarding reconciliation between patients and medical practitioners (Article 29): The right for victims to request the relevant court or investigation committee to establish its reconciliation with the accused, i.e. the medical practitioner. Technical review before legal action (Article 14): Where a complaint is submitted to the competent sub-committee, the Supreme Committee shall confirm the presence of medical fault and send its report to the complainant, who can then submit an appeal in accordance with the procedures and steps established by decision of the Supreme Committee. State insurance coverage (Article 20): The State provides mandatory insurance to compensate for medical errors, which protects doctors from personal financial difficulties. Other than the protection of the parties involved in any medical liability issue — patients and healthcare providers — there has been a major addition to the relevant legal system. The Supreme Committee for Medical Responsibility was created. III) The Supreme Committee for Medical Responsibility Paves the Road to an Effective Dispute Resolution Process (Articles 9–19) Chapter 3 of the law in question introduces the Supreme Committee for Medical Responsibility, protecting both patients and healthcare providers, ensuring an efficient process. The Committee is composed of medical, forensic, and legal experts tasked with reviewing any alleged error, regardless of its nature. The Prime Minister appoints one of the two medical experts as the chairperson and the other as deputy chairperson.     Article 10 of the law contains the Committee’s following powers and responsibilities: Assess complaints against medical professionals for alleged errors Refer established errors to investigative authorities or professional syndicates Approve reports and amicable settlements emitted by subcommittees (formed to examine specific complaints based on medical specialties) Review appeals against subcommittee reports Coordinate with syndicates and competent bodies to issue awareness guidelines for patients’ rights Create and manage a national database for medical errors While many countries had earlier enacted similar laws such as France with Law No. 2002-1577 of 30 December and Saudi Arabia with The Law of Practicing Healthcare Professions of 2005 ("The 2005 Law"), Egypt’s latest legislation concerning medical liability law is a significant step in reforming the legal framework that governs the health care sector. Even though the legislation is proper to the local, social, and legal context, this new legislation manifests a wider transition towards formalizing the responsibilities of medical professionals and protecting patient rights, aiming to strike a balance between the patient’s health and the physicians’ professional liability.
21 July 2025
Press Releases

The Trademark Registration Process in Egypt – Step by Step

The Trademark Registration Process in Egypt – Step by Step Trademark registration is essential for businesses seeking to protect their brand identity, products, and services in the Egyptian market. The process is regulated by articles from 63 to 118 of the Egyptian intellectual property law no. 82 for the year 2002, and articles from 70 to 115 of the executive regulation issued by the Prime Minister decree no. 1366 for the year 2003. The Egyptian Trademark Office (TMO) and follows specific legal and procedural steps. The following will outline each phase of the trademark registration process in Egypt, from document preparation to obtaining a certificate of registration, including options for appeals and opposition procedures. Required Documents for Trademark Application To file a new trademark application in Egypt, applicants must prepare and submit the following documents: Power of Attorney (POA) from the applicant. The POA must reflect the name of the applicant as reflected in their ID or Commercial registry if the applicant is a legal entity or a company. In the later event the POA shall indicate the legal form of the company, for example a joint sock company or a limited liability company ..etc. the POA must be signed, legalized and notarized at the Egyptian Consulate in the country of the applicant. Commercial Registration or Incorporation Documents: Includes the Certificate of Incorporation, Articles of Incorporation, or Memorandum of Association, duly legalized and notarized (if available). Trademark Logo: A clear copy of the trademark/logo. Specification of Goods or Services: A list describing the relevant  goods/services to be covered. The wording of the specification of the relevant goods or services must be according to the wording of NICE classification. NICE Classification is an international standard classification of goods and services. The Nice Classification is based on a multilateral treaty administered by the World Intellectual Property Organization WIPO. Priority Document (if applicable): if the applicant has filed the same trademark in a signatory country to  Paris Convention for the Protection of Industrial Property, the applicant is entitled to claim the priority when filing the same trademark within six months from the date of the filing in the country of origin[i].  The applicant shall annex an official true copy of the application as filed in the country of origin along with a certified translation into Arabic. Although article 4/D of Paris convention states that the copy of the priority document, certified as correct by the trademark office in the country of origin does not need any further authentication step, but the examiners in the Egyptian trademarks office occasionally require the priority document to legalized and notarized, along with a certified Arabic translation. Note: Documents (1) and (2) can be submitted within six months from the application filing date according to article 73 of the executive regulation. Failure to submit them within this statutory grace period will result in the application being considered lapsed. For claiming conventional priority, according to article 4/C of Paris Convention, and article 75 of Egyptian IP law and article 74 of the executive regulations, the application must be filed in Egypt within six months from the original filing date in the country of origin. While article 4/d (3) of Paris convention provides a statutory period of three months for submitting the priority document, article 73 of the executive regulations provides extended statutory period of six months for filing the priority documents in the subsequent application in Egypt. Trademark Registration Process The typical duration of the trademark registration process in Egypt is between 12 to 18 months, and involves the following steps: Step 1: Filing the Application Submit the application along with the trademark logo and any available documentation. Step 2: Grace Period for Completing Documents Applicants are granted a six-month grace period to submit late documents such as the POA, incorporation documents, or priority document (if applicable). Step 3: Examination of Application After the grace period, the application is examined by the TMO to ensure compliance with legal requirements. This stage typically takes 6 to 12 months. Step 4: Review by Senior Examiner Before a decision is issued, the case file and proposed examination result are reviewed by a senior examiner. Step 5: Decision Issued The TMO will issue one of the following: Acceptance Conditional Acceptance Refusal Step 6: Appeals for Conditional or Refused Applications If the decision is conditional acceptance or refusal, the applicant has 30 days from the date of acknowledgment of the decision to file an appeal before the Appeals Committee at the TMO. The decision of the Appeals Committee is challengeable within 60 days of the acknowledgment receipt before the Administrative Court with the State Council Judiciary. Step 7: Publication in the Official Gazette Upon acceptance, publication fees are paid. The trademark is then published in the Official Gazette, typically within 2 months. Step 8: Opposition Period Third parties with a legitimate interest have 60 days from the date of publication to file an opposition, the opposition must be grounded. Step 9: Opposition Procedure If an opposition is filed, the applicant is notified within 30 days. The applicant then has 30 days from the date of notification to submit a response to the opposition. Step 10: Opposition Outcome and Further Appeal If the Opposition Committee accepts the opposition and refuses the application: The applicant has 60 days from acknowledgment of the decision to file an appeal before the Administrative Court. Step 11: The Registration, No Opposition or Unsuccessful Opposition If no opposition is filed, or if an opposition is resolved in favor of the applicant: The applicant proceeds to pay the registration fees. A certificate of registration is issued within 15–20 working days. Step 12: Appeal Against Appeal Committee Decision If the Appeal Committee at the TMO refuses the trademark, the applicant can still appeal to the Administrative Court within 60 days from the acknowledgment of the refusal decision. The Administrative Court examines the application comprehensively on the merits. The total process of trademark registration following the steps above typically takes around 12 to 18 months. With careful preparation and legal compliance, businesses can navigate the Egyptian trademark system effectively and protect their intellectual property in one of the Middle East’s key markets. [i] < https://www.wipo.int/wipolex/en/text/288514 > accessed on 25 May 2025
21 July 2025
Content supplied by Ibrachy & Dermarkar