Why software maintenance is non-negotiable – including on legacy systems?

06 February 2026 | 5 min read | Decommissioning of Legacy Systems, Enterprise Legacy System Application (ELSA), SAP Data Management

In today’s regulatory landscape, software maintenance has evolved from a purely technical concern into a critical compliance obligation. Organisations can no longer treat security updates as optional tasks to be addressed when convenient. The consequences of neglecting maintenance are becoming increasingly severe. Regulators across Europe are taking a harder stance, and recent enforcement actions demonstrate that excuses whether related to resource constraints or system age will not shield organisations from accountability. This shift demands a fundamental change in how businesses approach their entire software estate, including those legacy systems that often slip through the cracks of modern security practices. 

On 22 December 2025, the French data protection authority (CNIL) issued a significant fine of €1.7 million against an IT company for failing to implement appropriate security measures. The application in question, a PCRM system used by public social services, had been handling sensitive personal data without adequate protection. But what led to this massive amount of fine?  

The root causes leading to CNIL levying a fine on the company were persistent security vulnerabilities, known gaps against state-of-the-art security standards, and significant delays in implementing corrective actions. Most critically, audits had identified these issues well before any data exposures occurred. Moreover, what comes as shocking here is the fact that the organisation knew about the problems but failed to act decisively. 

Consequently, this sends a clear message to all organisations that awareness without action is no defence. Regulators will scrutinise not just whether you identified vulnerabilities, but how quickly and effectively you addressed them. 

Waiting for incidents or complaints before taking action is never a logical solution. As per Article 32 of EU’s data privacy law, GDPR, it requires organisations to implement appropriate technical and organisational measures that reflect current threats and technology baselines. This obligation is a non-negotiable, ongoing process and not a one-time checkbox exercise. As threats evolve and new vulnerabilities emerge, your security measures must adapt accordingly. Reactive approaches leave dangerous windows of exposure that can be exploited easily. 

One of the most significant aspects is that software maintenance extends far beyond system stability. It is fundamentally a compliance activity, which is essential to protect personal data and limit risk from known exploits. In fact, when patches are available for known vulnerabilities, delays in deployment become increasingly difficult to justify. Each day a known vulnerability remains unaddressed, the riskier your IT landscape gets – a concern that regulators will scrutinise if a breach occurs. 

Many organisations invest significantly in security audits, believing this demonstrates due diligence. While investing in security measures is important, it is noted that identifying vulnerabilities through such security measures is merely the first step. Regulatory scrutiny focuses on what happens after audit findings are delivered, such as – how quickly were fixes deployed, were resources allocated appropriately, and so on. These questions will determine whether an organisation is deemed compliant or negligent. 

Legacy systems frequently lack vendor support, modern security controls, and integration capabilities with contemporary security tools. They are regularly highlighted in breach reports and regulatory findings as high-risk environments. These systems were often designed in an era when cybersecurity threats were less sophisticated. Their architecture may not support modern encryption standards, access controls, or monitoring capabilities, which makes them easy targets for attackers and concerning priorities for regulators.  

Whether software is new, old, custom-built, or off-the-shelf, the obligation to ensure adequate security remains constant. CNIL guidance on maintenance and control of third-party interventions reinforces this lifecycle responsibility. As a matter of fact, the age of a system does not diminish an organisation’s duty of care. If anything, older systems require more attention precisely because they lack built-in protections that modern platforms provide. Regulators understand these challenges but expect organisations to implement compensating controls or make difficult decisions about system retirement. 

Legacy platforms typically house sensitive historical data and are integrated into broader business processes. Their compromise can cascade into wider systems, creating ripple effects across the organisation. This interconnected risk means that a breach in a seemingly isolated legacy system can expose current operations, customer data, and business continuity. Decommissioning legacy systems should therefore be viewed not as an optional modernisation project, but as a critical cybersecurity imperative. 

It is extremely important to ensure that your maintenance policy leaves no system behind. The policy must define clear triggers for refresh cycles, patch deployment, and strategic decisions on decommissioning legacy systems. Make sure to align these policies with CNIL (GDPR authority in France), GDPR with any other local authority, or requirements pertaining to the data privacy laws of the region for documented measures, ensuring you can demonstrate compliance during audits. 

Prioritise systems handling sensitive data for more frequent security updates and reviews. In fact, obsolete systems must be included in vulnerability management programs, not exempted due to their age or perceived isolation. 

Records of interventions, fixes, and decisions become key artefacts in audits and internal governance. Maintain comprehensive documentation that demonstrates your organisation’s commitment to ongoing security maintenance. 

For legacy systems that cannot be adequately secured, decommissioning may be the safest path forward. Modern decommissioning platforms enable organisations to retire outdated systems whilst maintaining access to historical data for compliance purposes. This approach eliminates the security risks of maintaining vulnerable systems without sacrificing data accessibility. 

The CNIL’s €1.7 million fine represents a significant moment for software maintenance obligations. Regulators have become stringent their compliance checkpoints and expect organisations to implement security practices across full software and IT landscapes. 

Legacy systems, often overlooked in modernisation efforts, are precisely where regulatory attention will focus. Failure to enforce robust maintenance at scale leads to meaningful sanctions and lasting reputational damage. 

For organisations grappling with legacy systems that pose ongoing security risks, decommissioning offers a strategic solution. TJC Group’s Enterprise Legacy System Application (ELSA) provides a safe, compliant path forward. This SAP-certified solution enables organisations to decommission 100% of their legacy systems, from a single ERP to hundreds of applications, while maintaining easy access to historical data whenever needed. 

Through the ELSA gateway, businesses can quickly retrieve any legacy data, reports, and documents required for regulatory compliance, without the risk and expense of maintaining outdated systems. ELSA also maintains traceability logs to ensure ongoing compliance with tax requirements and data privacy laws such as GDPR. 

Contact us today to discover how ELSA can help you reduce compliance risk and strengthen your security posture.