If you supply the NHS or want to, the compliance bar just went up significantly. Between June 2024 and March 2025, two major ransomware attacks on NHS suppliers caused catastrophic service disruption, including one confirmed patient death. The ICO responded by issuing its first-ever fine against a data processor: £3.07 million to Advanced Computer Software Group. A second supplier, Capita, was fined £14 million in October 2025.
NHS England's message is clear: weak supplier security is no longer tolerable. New requirements now in force for 2025-26 mean that suppliers without the right certifications, controls, and evidence will lose contracts or be blocked from new ones.
This blog tells you exactly what you need to do, by when, and what happens if you don't.
You need to comply with NHS supplier requirements if you:
This includes private companies, social enterprises, charities, and any subcontractors processing NHS data on your behalf.
What it is: The Data Security and Protection Toolkit is an annual self-assessment proving you meet the National Data Guardian's 10 Data Security Standards.
Your deadline: 30 June 2026 for the 2025-26 assessment (DSPT Version 8)
Category 2 suppliers (large IT suppliers: 50+ staff or £10M+ turnover, classified as Operators of Essential Services under NIS):
Category 3 suppliers (smaller digital health companies, software providers, pharmacies):
Why it matters: DSPT "Standards Met" is a contractual requirement under NHS Standard Contract Clause 21.2. Without it, NHS organisations are in breach of contract if they continue using your services.
Action required:
What it is: Government-backed certification proving you have technical controls against commodity cyber attacks.
Your deadline: Required now under Procurement Policy Note 014 (PPN 014) issued in 2024
What you must prove:
Why it matters: NHS Supply Chain has stated explicitly: "ISO 27001 cannot be offered as an alternative." Without Cyber Essentials Plus, you'll face an Information Security Third Party Questionnaire from September 2025 onwards—and you may not pass it.
Action required:
What it is: International standard for information security management systems.
Who must have it:
Why it matters: ISO 27001 demonstrates mature security governance and is increasingly requested in NHS procurement processes. While not universally mandatory, it significantly strengthens your position.
Action required:
What it is: Assessment framework for digital health technologies covering clinical safety, data protection, interoperability, and technical security.
Who must comply: All suppliers of apps, platforms, clinical systems, and digital therapeutics
What you must prove:
Action required:
What it is: Eight mandatory expectations launched in May 2025 by NHS England and DHSC.
What you must demonstrate:
Why it matters: From early 2026, NHS England is proactively contacting suppliers to verify these controls. NHS Supply Chain is developing a process to flag "insecure" suppliers across the NHS procurement network.
Action required:
Loss of Contracts
DSPT non-compliance is a breach of NHS Standard Contract. NHS organisations cannot lawfully continue using your services if you have "Standards Not Met" status. You will lose existing contracts.
Blocked from New Business
NHS Supply Chain has warned: "Not meeting the requirements could mean losing opportunities with the NHS." Procurement teams now check DSPT status, Cyber Essentials Plus, and Charter compliance before awarding contracts.
ICO Enforcement
The Advanced fine (£3.07M) and Capita fine (£14M) proved the ICO will fine data processors directly for security failures. You cannot hide behind "we're just a processor" anymore. Maximum fines under UK GDPR: £17.5 million or 4% of global turnover.
NIS Regulations Penalties
If you're an Operator of Essential Service, NIS penalties reach £17 million—and can be imposed for inadequate security measures alone, even without a breach.
Now (February 2026)
March 2026
April-May 2026
By 30 June 2026
After June 2026
Both the Advanced (August 2022) and Synnovis (June 2024) ransomware attacks succeeded because of the same failures:
The ICO and NHS England are now benchmarking supplier security against NCSC Cyber Essentials and ISO 27002. If you fall below these widely available standards, you have no credible defence.
Mike Fell, NHS England's cyber operations director, summarised it: "Time and again we see the absence of foundational controls being the root cause—the absence of multi-factor authentication, the absence of monitoring, and not hardening systems against known vulnerabilities."
The 2025-26 cycle is not business as usual. The ICO has proved it will fine processors directly. NHS England is actively investigating supplier security postures. The Cyber Security and Resilience Bill will create statutory enforcement powers with penalties that dwarf current fines.
For NHS suppliers, complacency is now the highest risk. Every requirement listed in this blog is achievable with the right planning and resources. The suppliers who act now will protect their market position. Those who delay will find themselves locked out of the largest healthcare procurement market in Europe.