Regulation Archives - SHIP IP LTD

The U.S. Coast Guard is set to publish this week its final rule covering maritime security regulations by establishing minimum cybersecurity requirements for U.S.-flagged vessels, outer continental shelf facilities, and facilities subject to the Maritime Transportation Security Act of 2002 regulations. This final rule addresses current and emerging cybersecurity threats in the marine transportation system by adding minimum cybersecurity requirements to help detect risks and respond to and recover from cybersecurity incidents.

In a final rule scheduled for publication in the Federal Register, the Department of Homeland Security through the Coast Guard aims to enhance cybersecurity within the marine transportation system. The proposal includes mandates to create and uphold a Cybersecurity Plan, appoint a Cybersecurity Officer, and implement various strategies to ensure cybersecurity is maintained. Additionally, the Coast Guard is inviting feedback on a possible extension for the implementation timelines for U.S.-flagged vessels.

The final rule aims to protect the marine transportation system from cybersecurity threats by establishing minimum cybersecurity requirements. These requirements are designed to detect, respond to, and recover from risks that could lead to transportation security incidents (TSIs). The rule specifically targets risks arising from the increased interconnectivity and digitalization of the marine transportation system, addressing current and emerging cybersecurity threats to maritime security.

The Coast Guard noted that with this final rule, it has to finalize the requirements that were proposed in the notice of proposed rulemaking (NPRM), ‘Cybersecurity in the Marine Transportation System,’ published last February 22. The agency also responded to the public comments that we received to the NPRM and made several clarifications regarding the regulatory framework.

The Cybersecurity Plan must include seven account security measures for owners or operators of a U.S.-flagged vessel, facility, or outer continental shelf facility enabling of automatic account lockout after repeated failed login attempts on all password protected IT systems; changing default passwords (or implementing other compensating security controls if unfeasible) before using any IT or operational technology (OT) systems; and maintaining a minimum password strength on IT and OT systems technically capable of password protection.

It also covers implementing multi-factor authentication on password-protected IT and remotely accessible OT systems; applying the principle of least privilege to administrator or otherwise privileged accounts on both IT and OT systems; maintaining separate user credentials on critical IT and OT systems; and removing or revoking user credentials when a user leaves the organization.

The U.S. Coast Guard outlined that the Cybersecurity Plan also must include four device security measure requirements. They are developing and maintain a list of any hardware, firmware, and software approved by the owner or operator that may be installed on IT or OT systems; ensure that applications running executable code are disabled by default on critical IT and OT systems; maintain an accurate inventory of network-connected systems including those critical IT and OT systems; and develop and document the network map and OT device configuration information.

Additionally, the Cybersecurity Plan must include two data security measure requirements that ensure that logs are securely captured, stored, and protected and accessible only to privileged users, and deploy effective encryption to maintain confidentiality of sensitive data and integrity of IT and OT traffic when technically feasible.

The U.S. Coast Guard prescribed that owners or operators of U.S.-flagged vessels, facilities or outer continental shelf facilities must also prepare and document a Cyber Incident Response Plan that outlines instructions on how to respond to a cyber incident and identifies key roles, responsibilities, and decision-makers amongst personnel.

Furthermore, owners or operators must also designate a Cybersecurity Officer (CySO) who must ensure that U.S.-flagged vessel, facility, or outer continental shelf facility personnel implement the Cybersecurity Plan and the Cyber Incident Response Plan. The CySO must also ensure that the Cybersecurity Plan is up-to-date and undergoes an annual audit. The CySO must also arrange for cybersecurity inspections, ensure that personnel have adequate cybersecurity training, record and report cybersecurity incidents to the owner or operator, and take steps to mitigate them.

The Coast Guard estimates that this final rule creates costs for industry and government of about US$1.2 billion total and $138.7 million annualized, discounted at 2 percent (2022 dollars). This increased estimate from the NPRM is primarily driven by increases to our estimates of costs related to cybersecurity drills, exercises, and penetration testing. Cost estimates are also increased due to updated affected population data.

The final rule also notes that its benefits include reduced risk and mitigation of cyber incidents to protect impacted entities and downstream economic participants, and improved protection of marine transportation system business operations to build consumer trust and promote increased commerce in the U.S. economy. Additional benefits include improved minimum standards of cybersecurity to protect the marine transportation system, which is vital to the nation’s economy and national security, and to avoid supply chain disruptions.

The U.S. Coast Guard also requires owners and operators of U.S.-flagged vessels, facilities, and outer continental shelf facilities to segment their IT and OT networks, and log and monitor connections between them. Based on information from CGCYBER, CG-CVC, and NMSAC, network segmentation can be particularly difficult in the marine transportation system, largely due to the age of infrastructure in the affected population of U.S.- flagged vessels, facilities, and outer continental shelf facilities. The older the infrastructure, the more challenging network segmentation may be.

The document also laid down that it will require owners and operators of U.S.-flagged vessels, facilities, and outer continental shelf facilities to limit physical access to IT and OT equipment; secure, monitor, and log all personnel access; and establish procedures for granting access on a by-exception basis.

Last July, the DHS’ Office of Inspector General (OIG) published a final report identifying that the U.S. Coast Guard has made progress in enhancing the cyber posture of the marine transportation system by establishing maritime cybersecurity teams over the past two years, in line with statutory requirements. Based on its findings, the report proposes four recommendations to improve the Coast Guard’s cyber readiness and precautions to secure the U.S. supply chain. The DHS has concurred with four recommendations.

 

Source : Industrial Cyber


As Industry 4.0 continues to redefine operations, the lines between Information Technology (IT) and Operational Technology (OT) systems are increasingly blurred. Marine terminals now face unique cybersecurity risks to both types of systems, each requiring tailored defenses.

IT Systems: Protecting Data and Networks

IT systems manage critical business data and communication infrastructure. Cybersecurity risks for IT systems include malware, phishing attacks, and data breaches. Employing strong network security protocols, regular software updates, and staff training are essential for safeguarding sensitive data.

OT Systems: Securing Operational Processes

OT systems, which control equipment and automation at marine terminals, face distinct risks. These include attacks on Industrial Control Systems (ICS) and vulnerabilities in legacy systems. Protecting OT involves ensuring real-time monitoring, regular upgrades, and physical security to prevent unauthorized access.

Best Practices for Marine Terminals:

  • For IT systems: Implement multi-factor authentication, regularly update software, and train employees to spot phishing attempts.
  • For OT systems: Maintain an inventory of all assets, update outdated systems, and ensure secure remote access.

With both IT and OT systems now interconnected, a unified approach to cybersecurity is crucial. Protecting these systems is not just about safeguarding data but also ensuring the continued safe operation of critical infrastructure.


Modern commercial ports are a critical infrastructure which is highly dependent on information systems. The security of a port thus relies on the integrity of both physical and cyber assets. Despite evidence that ports are becoming targets for hackers, whose attacks can affect both cyber and physical assets and halt operations, too many ports have inadequate cybersecurity. Physical threats, incidents, and accidents to the physical assets (e.g., terminals, gates, buildings) of the maritime infrastructures or cyber threats and attacks to the cyber assets (e.g., Port Community Systems, navigation systems) can jeopardise the maritime operations, disrupt supply chains and destroy international trade and commerce.

 

https://rusieurope.eu/wp-content/uploads/2024/02/cybersecurity-in-maritime-critical-infrastructure-crimson-report-english.pdf


🔒 Strengthening Maritime Cybersecurity: The Importance of OT Inventory for Ships 🚢

With evolving cybersecurity regulations like the IMO’s MSC-FAL.1/Circ.3 and upcoming EU NIS2 Directive, ships must enhance their Operational Technology (OT) security to prevent cyber threats. A crucial step in compliance and risk mitigation is maintaining an accurate OT inventory.

📌 Why is OT Inventory Important?

Regulatory Compliance – Authorities require clear documentation of OT assets onboard.
Vulnerability Management – Knowing what systems exist helps identify security risks.
Incident Response – A complete inventory speeds up recovery from cyber incidents.
Network Segmentation – Mapping OT systems helps separate critical assets from IT networks.

🔹 How to Build an Effective OT Inventory?

Identify & Categorize – List all OT systems (e.g., ECDIS, VDR, engine control, ballast systems).
Document Connectivity – Map each device’s network connections to spot potential weak points.
Assess Cyber Risks – Regularly evaluate vulnerabilities and update security measures.
Monitor & Update – Keep inventory updated to reflect new installations or modifications.

🌍 Take Action Now!
With cyber threats rising in maritime operations, a well-managed OT inventory is a key first step to ensuring compliance and safeguarding your vessel. Start today to protect your fleet from cyber risks!


Recent reports indicate a significant escalation in cyber threats targeting the maritime industry. Marlink’s Security Operations Center observed a sharp increase in malicious activities during the first half of 2024, with over 23,400 malware detections and 178 ransomware incidents. Phishing remains the primary method attackers use to breach corporate networks, and there’s a notable rise in sophisticated botnet attacks leveraging AI to target IoT devices.

In response to these growing threats, the International Maritime Cyber Security Organisation (IMCSO) has been established. This non-profit entity aims to standardize cybersecurity risk assessments across the maritime sector. IMCSO offers certification programs for security consultants and maintains a professional register to assist shipping organizations in selecting qualified personnel. Additionally, it will validate and standardize report outputs, storing them in a central database accessible to authorities and third parties for assessing vessel risk.

These developments underscore the critical importance of robust cybersecurity measures in maritime operations. Organizations are urged to stay vigilant, update their security protocols, and invest in advanced threat detection capabilities to safeguard their operations against evolving cyber threats.


Regulation Jan 2025 Feb 2025 Mar 2025 Apr 2025 May 2025 Jun 2025 Jul 2025 Aug 2025 Sep 2025 Oct 2025 Nov 2025 Dec 2025 2026
IMDG Code Amendments 🟢
IMSBC Code Amendments 🟢
STCW Electronic Certificates 🟢
MARPOL Annex I & V (Red Sea & Gulf of Aden) 🟢
Ballast Water Record Book (BWM Convention) 🟢
Mediterranean SOx Emission Control Area 🟢
Hong Kong Ship Recycling Convention 🟢
MARPOL Annex VI – Low-Flashpoint Fuels & Reporting 🟢
Electronic Ballast Water Record Books 🟢
More 2026 Regulations 🔵

🟢 = Regulation comes into force
🔵 = Future regulations for 2026 and beyond

1. International Maritime Dangerous Goods (IMDG) Code Amendments (42-24)

  • Effective Date: January 1, 2025
  • Key Changes:
    • Enhanced classification and handling protocols for lithium batteries, including new entries for lithium-powered vehicles.
    • Stricter regulations for the transport of charcoal and carbon products to mitigate fire risks.
    • Introduction of guidelines for sodium-ion batteries, aligning them with existing safety standards.
  • Reference: Marine Mirror

2. International Maritime Solid Bulk Cargoes (IMSBC) Code Amendments (07-23)

  • Effective Date: January 1, 2025
  • Key Changes:
    • Mandatory declaration of bulk density by shippers, as per SOLAS regulation XII/10.
    • Addition of new cargo entries, including baryte and brown fused alumina, each with specific handling requirements.
    • Reclassification of certain cargoes, such as stabilized fish meal, to non-dangerous goods, simplifying certification processes.
  • Reference: Maritime Cyprus

3. Amendments to the Standards of Training, Certification, and Watchkeeping (STCW) Convention

  • Effective Date: January 1, 2025
  • Key Changes:
    • Authorization for the issuance of electronic seafarer certificates, specifying minimum information requirements.
    • Guidelines provided for the use and acceptance of electronic certificates to support global digitalization efforts.
  • Reference: Maritime Cyprus

4. MARPOL Annex I and V Amendments – Red Sea and Gulf of Aden Special Areas

  • Effective Date: January 1, 2025
  • Key Changes:
    • Designation of the Red Sea and Gulf of Aden as Special Areas under MARPOL Annexes I and V, enforcing stricter discharge controls for oil, oily mixtures, and garbage.
    • Ships must comply with enhanced discharge regulations, including the prohibition of certain discharges unless specific conditions are met.
  • Reference: Maritime Cyprus

5. Ballast Water Management (BWM) Convention – Revised Ballast Water Record Book

  • Effective Date: February 1, 2025
  • Key Changes:
    • Implementation of a revised format for the Ballast Water Record Book to enhance clarity and address common deficiencies.
    • Ships are required to adopt the new record-keeping format to improve compliance during inspections.
  • Reference: Maritime Cyprus

6. Mediterranean Sea Emission Control Area (ECA) for Sulphur Oxides (SOx)

  • Effective Date: May 1, 2025
  • Key Changes:
    • Enforcement of a 0.10% m/m sulphur content limit for fuel oil used by ships operating within the Mediterranean Sea ECA.
    • Alternatively, ships may use approved exhaust gas cleaning systems (EGCS) to meet the emission requirements.
  • Reference: Gard’s Insights

7. Hong Kong International Convention for the Safe and Environmentally Sound Recycling of Ships

  • Effective Date: June 26, 2025
  • Key Changes:
    • Requirement for ships over 500 GT engaged in international voyages to maintain an Inventory of Hazardous Materials (IHM).
    • Ships must be recycled at authorized facilities that comply with the convention’s safety and environmental standards.
  • Reference: Gard’s Insights

8. MARPOL Annex VI Amendments – Low-Flashpoint Fuels and Data Reporting

  • Effective Date: August 1, 2025
  • Key Changes:
    • Clarification of regulations concerning gas and low-flashpoint fuels, including updated definitions and bunker delivery note requirements.
    • Reclassification of replacing steam systems with marine diesel engines as major conversions, necessitating compliance with emission standards.
    • Enhanced fuel consumption data reporting requirements, including total onshore power supplied and transport work metrics.
  • Reference: Maritime Cyprus

9. Ballast Water Management (BWM) Convention – Electronic Record Books

  • Effective Date: October 1, 2025
  • Key Changes:
    • Authorization for the use of electronic Ballast Water Record Books, aligning with practices under MARPOL Annexes and the NOx Technical Code.
    • Guidelines provided for the implementation and use of electronic record-keeping systems.
  • Reference: [Maritime Cyprus](https://maritimecyprus.com/2024/11

 

SHIPIP INVENTORY OF HAZARDOUS MATERILA MAINTENANCE


 

Dublin, Dec. 31, 2024 (GLOBE NEWSWIRE) — The “Europe Maritime Cybersecurity Market: Focus on End User, Solution, Service, Threat Type, and Country-Wise Analysis – Analysis and Forecast, 2023-2033” report has been added to ResearchAndMarkets.com’s offering.

The Europe maritime cybersecurity market is projected to reach $3.49 billion by 2033 from $972.3 million in 2023, growing at a CAGR of 13.64% during the forecast period 2023-2033

Protecting digital assets and networks in the maritime industry from online threats is the main goal of maritime cybersecurity in Europe. As maritime operations depend more and more on digital technologies, cybersecurity has become crucial to ensuring efficiency, safety, and risk mitigation. These dangers range from widespread cyberattacks like viruses and scams to more complex attacks that target shore-based infrastructure and vessel systems. Serious repercussions, including interruptions in business operations, monetary losses, harm to the environment, and even death, can result from cybersecurity breaches. Shipping firms, port authorities, regulatory agencies, and trade associations are important participants in the European maritime cybersecurity market.

Techniques like risk assessment, access control, incident response planning, and continuous employee training are necessary for effective cybersecurity management. Global rules, like those established by the International Maritime Organization (IMO) and the International Ship and Port Facility Security (ISPS) Code, provide frameworks for improving cybersecurity within the maritime sector. Collaboration between public and private sectors, along with technological innovation and information sharing, is crucial to address cyber threats effectively. As the maritime industry continues its digital transformation, robust cybersecurity measures will be vital for ensuring resilience and sustainability across European maritime operations.

Market Introduction

The maritime sector’s growing dependence on digital technologies for communication, navigation, and operations is driving a notable expansion in the European maritime cybersecurity market. Strong cybersecurity is crucial to protecting ships, ports, and associated infrastructure because of the increased susceptibility to cyberattacks that comes with this increased digitization. These dangers can cause operational disruptions, monetary losses, environmental harm, and threats to human safety. They range from viruses and phishing scams to more sophisticated attacks that target vital systems.

The increasing use of cloud computing, automation, and Internet of Things (IoT) devices in the maritime industry is propelling the market. In order to adhere to international standards like the ISPS Code and the regulations of the International Maritime Organization (IMO), major industry participants, including shipping companies, port authorities, and regulatory bodies, are concentrating on fortifying their cybersecurity frameworks. Furthermore, tackling changing cybersecurity challenges requires cooperation between the public and private sectors, improvements in threat detection, and continual staff training. The need for efficient cybersecurity solutions is anticipated to increase as Europe continues to embrace digital transformation in the maritime industry, guaranteeing safer and more robust operations.

How can this report add value to an organization?

Product/Innovation Strategy: The product segment helps the reader understand the different types of services available for deployment and their potential in Europe region. Moreover, the study provides the reader with a detailed understanding of the Europe maritime cybersecurity market by products based on solution, service, and threat type.

Growth/Marketing Strategy: The Europe maritime cybersecurity market has seen major development by key players operating in the market, such as business expansion, partnership, collaboration, and joint venture. The favored strategy for the companies has been partnerships to strengthen their position in the Europe maritime cybersecurity market

Competitive Strategy: Key players in the Europe maritime cybersecurity market analyzed and profiled in the study involve maritime cybersecurity products and service offering companies. Moreover, a detailed competitive benchmarking of the players operating in the Europe maritime cybersecurity market has been done to help the reader understand how players stack against each other, presenting a clear market landscape. Additionally, comprehensive competitive strategies such as partnerships, agreements, and collaborations will aid the reader in understanding the untapped revenue pockets in the market.

Companies Featured

  • SAAB AB
  • Thales
  • Leonardo S.p.A.
  • Airbus SE
  • BAE Systems
  • Terma
  • Westminster Group Plc
  • Kongsberg Digital
  • Smiths Group plc
  • Nettitude Ltd.
  • HGH

Key Attributes:

Report Attribute Details
No. of Pages 73
Forecast Period 2023 – 2033
Estimated Market Value (USD) in 2023 $972.3 Million
Forecasted Market Value (USD) by 2033 $3490 Million
Compound Annual Growth Rate 13.6%
Regions Covered Europe

Key Topics Covered:

1 Markets
1.1 Trends: Current and Future Impact Assessment
1.1.1 Artificial Intelligence and Machine Learning in Cybersecurity
1.1.2 Increased Connectivity
1.1.3 Zero Trust Architecture (ZTA)
1.2 Supply Chain Overview
1.3 Regulatory and Environmental Considerations
1.3.1 Regulatory Implications
1.4 Ecosystem/Ongoing Programs
1.4.1 Series of Assessments, including Threat Modeling and Open-Source Intelligence, Performed by NCC Group
1.5 Startup Funding Summary
1.6 Market Dynamics Overview
1.6.1 Business Drivers
1.6.1.1 Increasing Cyber Threats and Attacks
1.6.1.2 Digitalization of Maritime Operations
1.6.1.3 Global Supply Chain Reliance on Maritime Transport
1.6.2 Business Challenges
1.6.2.1 Lack of Trained Personnel
1.6.2.2 Complex Regulatory Environment
1.6.3 Business Opportunities
1.6.3.1 Cybersecurity for Autonomous Vessels
1.6.3.2 Integration of Internet of Things (IoT) and Operational Technology (OT) Security

2 Regions
2.1 Regional Summary
2.2 Drivers and Restraints
2.3 Europe
2.3.1 Regional Overview
2.3.2 Driving Factors for Market Growth
2.3.3 Factors Challenging the Market
2.3.4 Application
2.3.5 Product
2.3.6 U.K.
2.3.7 Application
2.3.8 Product
2.3.9 Germany
2.3.10 Application
2.3.11 Product
2.3.12 France
2.3.13 Application
2.3.14 Product
2.3.15 Rest-of-Europe
2.3.16 Application
2.3.17 Product

3 Markets – Competitive Benchmarking & Company Profiles
3.1 Next Frontiers
3.2 Geographic Assessment
3.2.1 Overview
3.2.2 Top Products/Product Portfolio
3.2.3 Top Competitors
3.2.4 Target Customers
3.2.5 Key Personnel
3.2.6 Analyst View
3.2.7 Market Share, 2022

4 Research Methodology

For more information about this report visit https://www.researchandmarkets.com/r/h66vja

About ResearchAndMarkets.com
ResearchAndMarkets.com is the world’s leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

 

 

Source: Research and Markets


IMDG code amendments (42-24) – MSC.556(108)

These amendments to the International Maritime Dangerous Goods (IMDG) code are in line with the 23rd edition of the UN Recommendations on the Transport of Dangerous Goods, and will enter into force on 1 January 2026. However, some contracting governments may apply these amendments (or parts thereof) on a voluntary basis from 1 January 2025. A summary of the significant changes are listed below for reference:

  • Lithium batteries continue to be a major focus, given their widespread use and associated risks. Key changes include:
    • Lithium cells and batteries are now more prominently classified under “articles containing dangerous goods, N.O.S. (Not Otherwise Specified).”
    • All lithium batteries must meet the stringent testing requirements outlined in the Manual of Tests and Criteria, including for pre-production prototypes.
    • New entries under Class 9 have been introduced:
      • 3556: Vehicle, lithium-ion battery powered.
      • 3557: Vehicle, lithium-metal battery powered.
    • Damaged or defective lithium batteries must be removed from articles and packaged separately under specialized instructions.
    • UN 3171 has been revised to exclude lithium batteries, applying now only to vehicles powered by wet batteries, metallic sodium batteries, or sodium alloy batteries.
  • Charcoal and Carbon cargoes: Changes in this category aim to reduce the risk of misdeclared shipments and fire hazards:
    • Special Provisions (SP) 925 and 223, which previously exempted some carbon products, are no longer applicable.
    • New provisions (SP 978 and SP 979) introduce stricter rules for packaging, stowage, and maintaining safe temperatures during transport.
  • Sodium-ion batteries, gaining popularity as an alternative to lithium-ion batteries, are now officially classified under Class 9. This ensures they adhere to the same safety standards, including testing and stowage requirements, to ensure safety during transport.
  • Expanded Definitions and Documentation Requirements: Improved clarity in definitions and documentation is another focus area:
    • Recycled plastics must now include detailed information about their previous use and contents as part of quality assurance programs.
    • New definitions, such as ‘Degree of Filling’, ‘Explosive or Pyrotechnic Effect’ and ‘Metal Powders’, have been introduced.
    • Stowage plans must be more detailed, clearly outlining both primary and subsidiary hazards, ensuring that everyone handling the cargo understands the risks involved.
    • Data loggers and tracking devices used with cargo must now be securely installed to prevent damage during transit.
  • Packaging and Labelling Enhancements:
    • For vehicles equipped with lithium batteries, additional packaging is not required if they are stable and secure for transport. For other cases, specialized bracing or framing may be needed.
    • Labelling and marking requirements have been strengthened to ensure all hazards are clearly visible and easy to identify, even for items in fully enclosed packaging.

Members involved in the transport of dangerous goods in packaged from a recommended to ensure compliance with the latest amendments.

IMSBC code amendments (07-23) – MSC.539(107)

Updates to the International Maritime Solid Bulk Cargoes (IMSBC) code, which has been applicable on a voluntary basis since 1 January 2024, will enter into force on 1 January 2025. These include, but are not limited to, the following changes:

  • The shippers are now required to declare the ‘bulk density’ of cargo, as required by SOLAS regulation XII/10 (MSC.1/Circ.1664).
  • The following changes have been affected in Appendix 1 (individual schedule of solid bulk cargoes):
    • New cargo entries
Bulk cargo shipping name (BCSN) Group Hazard
BARYTE, FLOTATION CHEMICAL GRADE A  
BROWN FUSED ALUMINA C  
CRUSHED GRANODIORITE FINES A  
DIRECT REDUCED IRON (D) (By-product fines with a moisture content of at least 2%) A and B MHB (WF and/or SH)
DUNITE C  
DUNITE FINES A  
ELECTRIC ARC FURNACE DUST, PELLETIZED A and B MHB (TX and CR)
GROUND GRANULATED BLAST FURNACE SLAG POWDER A  
MAGNESITE FINES A  
POTASSIUM NITRATE C  
SODIUM NITRATE C  
SODIUM NITRATE AND POTASSIUM NITRATE MIXTURE C  
CELESTINE CONCENTRATE (under Mineral Concentrates schedule) A  
FISH MEAL (FISH SCRAP), STABLISIZED ANTI-OXIDANT TREATED B MHB (SH)
  • Deleted cargoes from the solid bulk cargo list:
Bulk cargo shipping name (BCSN) Group Hazard
FISH MEAL (FISH SCRAP), STABILIZED UN 2216 ANTI-OXIDANT TREATED B This cargo has effectively been reclassified from Class 9 dangerous goods to an MHB cargo. The IMSBC Code carriage requirements remain the same, but ships will no longer require a dangerous goods certificate to carry the cargo.
  • The list of non-cohesive cargoes (Appendix 3 of the IMSBC Code) has been amended to include the following cargoes:
    • BARYTE, FLOTATION CHEMICAL GRADE
    • CRUSHED GRANODIORITE FINES
    • DUNITE
    • DUNITE FINES
    • ELECTRIC ARC FURNACE DUST, PELLETIZED
    • POTASSIUM NITRATE
    • SODIUM NITRATE
    • SODIUM NITRATE AND POTASSIUM NITRATE MIXTURE
    • SUPERPHOSPHATE

This means that the angle of repose for the above cargoes must be determined prior to loading so that the relevant trimming provisions under section 5 of the IMSBC Code are applied accordingly.

  • The list of Solid Bulk Cargoes for which a Fixed Gas Fire Extinguishing System may be exempted has been updated to its 6th revision to include the new cargo “ELECTRIC ARC FURNACE DUST, PELLETIZED” that can be exempted from having a fixed CO2 fire-fighting installation on board ships (MSC.1/Circ.1395/Rev.6).

Members involved in transporting solid bulk cargoes are recommended to ensure compliance with the latest IMSBC Code amendments.

Amendments to the STCW Convention and Code on Electronic Seafarers’ Certificates – MSC.540(107) & MSC.541(107)

To support the global digitalisation trend, these amendments to the STCW Convention (regulations I/1 and I/2) and STCW Code (section A-I/2) allow seafarers’ certification to be issued in electronic form and specify the minimum information that must be included on these certificates.

Members are recommended to refer to the MSC.1/Circ.1665 for guidelines on the use of electronic certificates of seafarers.

Amendments to MARPOL Annex I, Regulations 15.3, 15.5 and 34.3 to 34.5, on the establishment of the Red Sea and Gulf of Aden as Special Areas – MEPC.381(80)

Due to their significant marine ecological and environmental conditions, as well as their importance as a major route for maritime commerce, the Red Sea and Gulf of Aden regions were recognised as a ‘Special Area’ under regulation 1.11 of MARPOL Annex I. However, for the ‘Special Area’ status to take effect, adequate reception facilities had to be provided in the relevant ports of the coastal State Parties.

MEPC-80 confirmed that States in the Red Sea and Gulf of Aden areas, such as Djibouti, Egypt, Jordan, Israel, Saudi Arabia, Somalia, and Sudan, now provide adequate reception facilities and arrangements, including treatment facilities for oily wastes and residues at ports and terminals in these areas. Accordingly, the effective date for MARPOL Annex I Special Areas in the Red Sea and Gulf of Aden is set to be 1 January 2025.

Members with ships of 400 GT and above are advised that from 1 January 2025, the discharge of oil or oily mixtures into the sea will be prohibited within this region, except under the following conditions:

  1. The ship is enroute.
  2. The oily mixture has been processed through oil filtering equipment that meets the requirements of regulation 14.7 of Annex I.
  3. The oil content of the effluent, without dilution, does not exceed 15 parts per million.
  4. The oily mixture does not originate from cargo pump room bilges on oil tankers.
  5. In the case of oil tankers, the oily mixture is not mixed with oil cargo residues.
    • Fuel consumption per consumer, both while underway and at anchor

Additionally, members operating oil tankers in this region are informed that from 1 January 2025, any discharge of oil or oily mixtures from the cargo area of an oil tanker will be prohibited while in the Red Sea and Gulf of Aden Special Areas. This requirement does not apply to the discharge of clean or segregated ballast.

Amendments to MARPOL Annex V, Regulation 6, on the establishment of the Red Sea as Special Areas – MEPC.382(80)

The Red Sea area was recognised as a Special Area under Annex V (regulation 1.14.4) of MARPOL. However, for the ‘Special Area’ status to be effective, adequate reception facilities had to be provided in the relevant ports of the coastal State Parties.

At MEPC-80, the special area status was confirmed based on information about the necessary reception facilities for MARPOL Annex V wastes and residues at all ports and terminals in the region.

Members with ships transiting through the Red Sea area are advised that from 1 January 2025, the discharge of garbage into the sea shall only be permitted while the ship is enroute and in accordance with Regulation 6 (Discharge of garbage within special areas) of MARPOL Annex V.

 

SOURCE : https://www.ukpandi.com/news-and-resources/news/article/imo-regulatory-update-2025/


MARPOL Annex VI

Emissions Control Ara (ECA)

Effective from 1st May 2025, the Mediterranean sea will become part of an emissions control area under the IMO, reference MEPC.261(79). Vessels transiting this area will now require adherence to ECA regulations on sulphur oxides and particulate matter, burning compliant fuels of 0.1% Sulphur or having an approved EGCS in place. Vessels will need to obtain clear bunker delivery notes stating the sulphur content as well as recording this accurately into the Oil Record Book Part I.  Vessels will require a written procedure describing how the fuel changeover is to be carried out, taking into consideration the time taken to entirely change over to compliant fuel within the complete fuel system pipelines.

Further Amendments

Further amendments have been made to MARPOL Annex VI as per IMO resolution MEPC.385(81) which will come into force on 1st August 2025.

  • Regulations 2, 14 and Appendix I has been revised to bring clarity to the definition of gas fuels as well as stating that the onboard sampling points do not apply to gas/low flashpoint fuels.
  • Regulation 18 has been revised to include gas/low flashpoint fuels into the bunker delivery note (BDN) requirements. Vessels operating on gas/low flashpoint fuels should ensure the BDN received includes all required information as per Appendix V of MARPOL Annex VI.
  • Regulation 13.2.2 clarifies that replacing a steam engine with a diesel engine is considered a major conversion. Replacement engines must comply with Regulation 13 for Nitrogen Oxides. In the event that a Tier III engine is not possible, a Tier II engine can be used in line with resolution MEPC.396(81). The flag administration must report this to the IMO.
  • Regulation 27 – Amendments to this regulation allow the IMO to share ships fuel oil consumption data with analytical consultancies and research entities with the companies consent under strict confidentiality. Additionally, Appendix IX has been updated for the information to be submitted to the IMO. This allows for further granularity regarding fuel consumption and voyage data. Vessels over 5000GT should ensure their SEEMP Part II, for data collection, is modified to meet the new updates.

The International Maritime Organisation’s (IMO) Maritime Safety Committee has recently formally adopted new amendments to its Safety of Life at Sea (SOLAS) regulations.  and will require mandatory reporting of all containers lost at sea from 1st January 2026.

SOLAS Regulation 31 now mandates that the master of a ship involved in the loss of containers must immediately reports specific details to nearby ships, the nearest coastal state, and the vessel’s flag state. The flag state is then responsible for passing this information to the IMO via a new module in the Global Integrated Shipping Information System (GISIS). SOLAS Regulation 32 outlines the reporting process, stipulating that reports of containers lost at sea must be made as soon as possible, with updates provided as more information becomes available. A final count of lost containers must be confirmed after a thorough inspection. Mandatory details include the position of the lost containers, the number lost, and whether any contained dangerous goods.

 

Source: The Loadstar


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED