TGAAustraliaSaMDAIcomplianceenforcementARTGIEC 62304ISO 14971ISO 13485regulatory

TGA Compliance Principles 2026–2027 — SaMD Is Now an Explicit Enforcement Priority

Australia's TGA named Software as a Medical Device (SaMD) as an enforcement priority in its 2026–2027 Compliance Principles. Combined with the February 2026 AI/software guidance update, the message to device manufacturers is clear: lifecycle documentation is no longer optional. What ARTG holders and applicants need to do.

regMD TeamApril 17, 2026

TGA Compliance Principles 2026–2027 — SaMD Is Now an Explicit Enforcement Priority

Australia's Therapeutic Goods Administration (TGA) published its Compliance Principles 2026–2027 in January 2026 (effective January 1, 2026), naming Software as a Medical Device (SaMD) as one of the explicit enforcement priorities for the next two years. The TGA also refreshed its AI and software medical device regulation guidance in February 2026, pulling together the standards and expectations manufacturers need to meet.

Taken together, the two updates send one message: SaMD lifecycle documentation is no longer a nice-to-have. It's the specific surface TGA plans to enforce against.

What the Compliance Principles say about SaMD

TGA's Compliance Principles describe the risk-based framework the regulator uses to allocate its enforcement resources. The 2026–2027 edition calls out four focus areas:

  1. Software as a Medical Device (SaMD)
  2. Direct-to-consumer IVD kits
  3. Cybersecurity across medical devices
  4. Falsified therapeutic goods

SaMD and cybersecurity together point at the same underlying concern: connected, software-driven devices whose behaviour can change post-market (through updates, ML model retraining, or library drift) without the lifecycle controls expected of traditional medical devices.

TGA's framing is proactive and risk-based enforcement — that is, don't expect complaints to trigger action. Expect systemic sweeps of ARTG-listed SaMD products where documentation doesn't match the device's current state.

What the February 2026 AI/software guidance clarifies

The companion AI/software medical device guidance (section page updated February 5, 2026, with the detailed sub-page at tga.gov.au/manufacturing/artificial-intelligence-ai-and-medical-device-software-regulation) clarifies:

  • When software is a medical device (the intended-use test + therapeutic purpose).
  • Which standards apply for software lifecycle, risk management, usability, and QMS.
  • Continuous monitoring expectations for software updates post-market.

The standards to anchor against are not new — but their bundling into a single TGA-sanctioned reference list is:

StandardScopeWhy TGA cites it
IEC 62304Medical device software — software life cycle processesRequired development + maintenance process for any device containing software
ISO 14971Application of risk management to medical devicesRisk management over the full device lifecycle, including software-driven risks
IEC 62366-1Medical devices — Part 1: Application of usability engineeringUsability risk, human factors, and misuse-mitigation design
ISO 13485Quality management systems — Requirements for regulatory purposesQMS baseline for the manufacturer organisation

If your SaMD QMS already claims conformity to IEC 62304 + ISO 14971 + ISO 13485, you're structurally ready. The enforcement risk is whether the evidence actually backs up the claim — version-controlled software lifecycle files, maintained risk management files, documented post-market surveillance — as opposed to a one-time submission package that hasn't been updated.

Cybersecurity expectation — not separate, integrated

TGA treats cybersecurity as part of the SaMD lifecycle, not a separate workstream. Expect ARTG sponsors to demonstrate:

  • Threat modelling integrated with ISO 14971 risk management
  • Secure-by-design evidence in the software lifecycle (IEC 62304)
  • Vulnerability management processes with defined response timelines
  • Coordinated disclosure policy for security researchers
  • Post-market security monitoring + patching cadence

There is no single "cybersecurity standard" TGA mandates — they expect the manufacturer to justify the controls relative to the device's threat surface. For networked SaMD, that justification bar is meaningfully higher.

What this changes for ARTG sponsors today

If you already have ARTG-listed SaMD

  1. Audit your current technical file against the TGA standards list. If any of IEC 62304 / ISO 14971 / IEC 62366-1 / ISO 13485 are referenced but not demonstrably current, flag it for remediation.
  2. Verify your post-market surveillance evidence is actually collecting data. A PMS plan that exists on paper but doesn't show quarterly inputs is an enforcement finding waiting to happen.
  3. Check your cybersecurity incident response process. Is it documented, tested, and time-bounded? Do you have a coordinated disclosure channel?
  4. Review your software update process — every field-delivered update should map to a documented change control entry in your IEC 62304 files.

If you are preparing a new ARTG application

  1. Build your technical file from the standards list forward. The TGA guidance and the Compliance Principles are effectively the reviewer's checklist.
  2. Include a cybersecurity risk management file even if the device is "simple" — a standalone diagnostic algorithm still has inputs and outputs that attackers can manipulate.
  3. Treat continuous monitoring as design-phase work, not deployment-phase. The evidence reviewers want to see is the plan for monitoring, with named metrics + trigger thresholds, not a promise to monitor "as needed".

If you sell SaMD into Australia without an ARTG listing

  1. Confirm you're in an exempt category or that your distribution partner holds the listing. With TGA explicitly prioritising SaMD enforcement, unlisted software-as-medical-device products are the highest-visibility target.

Why "enforcement priority" is different from "regulatory update"

Most regulatory change takes the form of new rules + transition windows. The Compliance Principles are different: the underlying rules (ARTG, IEC 62304, ISO 14971) haven't changed. What's changed is where the TGA is pointing the enforcement resource.

That means:

  • You don't get a compliance transition window.
  • The baseline requirement is already in force; what's new is the probability of being audited against it.
  • "We'll fix it before the next submission" is not a viable posture — the risk clock started January 1, 2026.

Cross-jurisdiction context

TGA's move is part of a broader alignment across medical device regulators:

  • Singapore (HSA) published GN-37-R1 — its first dedicated guidance on Change Management Program for SaMD with ML — in April 2026.
  • FDA (US) has an AI-SaMD lifecycle management draft guidance on its CDRH A-list.
  • EU (MDR) has been progressively tightening Notified Body scrutiny on software devices under the MDR harmonised standards list.

This is IMDRF alignment in motion. If you're preparing TGA compliance to 2026 standards, the same work largely translates to Singapore CMP, future FDA finalisation, and EU MDR software conformity. Don't scope it as an Australia-only project.

Sources

Related regMD coverage


This article summarises publicly available TGA guidance and public standards for informational purposes and does not substitute for regulatory or legal advice. Always refer to the primary TGA source documents and the current versions of the standards cited, and consult your Regulatory Affairs adviser for device-specific decisions.