{"id":6019,"date":"2024-09-06T14:56:00","date_gmt":"2024-09-06T12:56:00","guid":{"rendered":"https:\/\/m2apartners.cz\/cybersecurity-part-two-responsibilities\/"},"modified":"2025-03-27T17:06:06","modified_gmt":"2025-03-27T16:06:06","slug":"cybersecurity-part-two-responsibilities","status":"publish","type":"post","link":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/","title":{"rendered":"Cybersecurity, Part Two &#8211; Responsibilities"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">Obligations related to the new draft law on cybersecurity<\/h5>\n\n<p>In the previous installment of this series, we discussed which entities will be affected by the new Cybersecurity Act. So what will the obligations be? <\/p>\n\n<h5 class=\"wp-block-heading\">Registration of a regulated service<\/h5>\n\n<p>If you have determined that you will be an entity under the upcoming new Cybersecurity Act, the first obligation you need to fulfill is <strong>registration<\/strong>. To register a regulated service, you must <strong><span style=\"text-decoration: underline;\">within 60 days<\/span><\/strong> after the conditions for registration have been met (if already met before the law comes into force, this will be 60 days after the law comes into force). Registration will be done through the NUCIB Portal. The Authority will then deliver the <strong>registration decision<\/strong> to the provider &#8211; this moment is important in terms of calculating the deadlines for fulfilling further obligations.   <\/p>\n\n<h5 class=\"wp-block-heading\">Obligations of the provider of a regulated service<\/h5>\n\n<p><strong><span style=\"text-decoration: underline;\">Within 30 days<\/span><\/strong> from receipt of the registration decision,<strong> contact details<\/strong> (ID number, natural persons authorised to act for the provider in cybersecurity matters) and <strong>additional data <\/strong>(information on the ownership structure of the provider, technical data relating to the regulated service and information on its geographical spread and cross-border provision) must be reported to the NUCIB.<\/p>\n\n<p>Another obligation will be to determine the scope of cybersecurity management, i.e. to determine the assets related to the provision of the regulated service. There is no deadline here, but it is advisable to do this as soon as possible &#8211; because if the scope is not set, all the assets of the undertaking are assumed to be within it. <\/p>\n\n<h5 class=\"wp-block-heading\">Security measures<\/h5>\n\n<p><strong><span style=\"text-decoration: underline;\">Up to 1 year<\/span><\/strong> after receipt of the registration decision, security measures must be in place, these will vary according to the regime of obligations. The law will list only the areas of security measures (e.g. asset management, risk management, human resources security). The specific obligations will then be set by the NUCIB by means of decrees for the respective regimes, which can be used as a kind of check-list. For example, there will be obligations to conduct various training courses, to set certain conditions for secure passwords, etc.   <\/p>\n\n<h5 class=\"wp-block-heading\">Cyber security incident reporting and management<\/h5>\n\n<p>Within the same period, i.e. at the latest <strong><span style=\"text-decoration: underline;\">within 1 year<\/span><\/strong> from the delivery of the registration decision, the provider will be obliged to report and manage cyber security incidents. We will address these obligations in the next installment of this series. <\/p>\n\n<h5 class=\"wp-block-heading\">Sanctions<\/h5>\n\n<p>Failure to comply with the obligations will result in fines for the provider under the higher obligations regime  <strong>up to 250 million. CZK 250 million <\/strong>, for providers under the lower obligation regime up to the amount of  <strong>175 miles. CZK <\/strong>.<\/p>\n\n<p>If you would like more information in this regard, please do not hesitate to contact us.<\/p>\n\n<p>This article is for informational purposes only and does not constitute legal advice or guidance for any particular case.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Obligations related to the new draft law on cybersecurity In the previous installment of this series, we discussed which entities will be affected by the new Cybersecurity Act. So what will the obligations be? Registration of a regulated service If you have determined that you will be an entity under the upcoming new Cybersecurity Act, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5601,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[320],"tags":[566,373,567,331,410,370],"class_list":["post-6019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","tag-cyber-en","tag-cybernetics","tag-duties","tag-eu-en","tag-law-en","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity, Part Two - Responsibilities - m2apartners.cz<\/title>\n<meta name=\"description\" content=\"If you have determined that you will be an entity under the upcoming new Cybersecurity Act, the first obligation you need to fulfill is registration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity, Part Two - Responsibilities - m2apartners.cz\" \/>\n<meta property=\"og:description\" content=\"If you have determined that you will be an entity under the upcoming new Cybersecurity Act, the first obligation you need to fulfill is registration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/\" \/>\n<meta property=\"og:site_name\" content=\"m2apartners.cz\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-06T12:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T16:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/m2apartners.cz\/wp-content\/uploads\/2024\/09\/Simple-Law-Firm-Facebook-Post-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin3645\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin3645\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/\"},\"author\":{\"name\":\"admin3645\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/person\\\/2737d6d592b954976f2a3fdcb4e8248e\"},\"headline\":\"Cybersecurity, Part Two &#8211; Responsibilities\",\"datePublished\":\"2024-09-06T12:56:00+00:00\",\"dateModified\":\"2025-03-27T16:06:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/\"},\"wordCount\":476,\"publisher\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Simple-Law-Firm-Facebook-Post-2.jpg\",\"keywords\":[\"cyber\",\"Cybernetics\",\"Duties\",\"eu\",\"Law\",\"Security\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/\",\"name\":\"Cybersecurity, Part Two - Responsibilities - m2apartners.cz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Simple-Law-Firm-Facebook-Post-2.jpg\",\"datePublished\":\"2024-09-06T12:56:00+00:00\",\"dateModified\":\"2025-03-27T16:06:06+00:00\",\"description\":\"If you have determined that you will be an entity under the upcoming new Cybersecurity Act, the first obligation you need to fulfill is registration.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Simple-Law-Firm-Facebook-Post-2.jpg\",\"contentUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Simple-Law-Firm-Facebook-Post-2.jpg\",\"width\":940,\"height\":788},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/cybersecurity-part-two-responsibilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity, Part Two - Responsibilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/\",\"name\":\"m2apartners.cz\",\"description\":\"We focus on providing legal services to clients in the pharmaceutical and medical device industries, in corporate matters, in connection with the setting up of internal processes, in matters of zoning and construction law proceedings, in general practice, especially general contract, real estate, family and employment law.\",\"publisher\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#organization\",\"name\":\"M2A Partners\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-cropped-FAV_512x512.png\",\"contentUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-cropped-FAV_512x512.png\",\"width\":512,\"height\":512,\"caption\":\"M2A Partners\"},\"image\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/person\\\/2737d6d592b954976f2a3fdcb4e8248e\",\"name\":\"admin3645\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baf40bb2dd82590384e4496ea9a16e5723a6284ec7fb445ad629f19905b6c337?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baf40bb2dd82590384e4496ea9a16e5723a6284ec7fb445ad629f19905b6c337?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baf40bb2dd82590384e4496ea9a16e5723a6284ec7fb445ad629f19905b6c337?s=96&d=mm&r=g\",\"caption\":\"admin3645\"},\"sameAs\":[\"https:\\\/\\\/m2apartners.cz\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity, Part Two - Responsibilities - m2apartners.cz","description":"If you have determined that you will be an entity under the upcoming new Cybersecurity Act, the first obligation you need to fulfill is registration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity, Part Two - Responsibilities - m2apartners.cz","og_description":"If you have determined that you will be an entity under the upcoming new Cybersecurity Act, the first obligation you need to fulfill is registration.","og_url":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/","og_site_name":"m2apartners.cz","article_published_time":"2024-09-06T12:56:00+00:00","article_modified_time":"2025-03-27T16:06:06+00:00","og_image":[{"width":940,"height":788,"url":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2024\/09\/Simple-Law-Firm-Facebook-Post-2.jpg","type":"image\/jpeg"}],"author":"admin3645","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin3645","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/#article","isPartOf":{"@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/"},"author":{"name":"admin3645","@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/person\/2737d6d592b954976f2a3fdcb4e8248e"},"headline":"Cybersecurity, Part Two &#8211; Responsibilities","datePublished":"2024-09-06T12:56:00+00:00","dateModified":"2025-03-27T16:06:06+00:00","mainEntityOfPage":{"@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/"},"wordCount":476,"publisher":{"@id":"https:\/\/m2apartners.cz\/en\/#organization"},"image":{"@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/#primaryimage"},"thumbnailUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2024\/09\/Simple-Law-Firm-Facebook-Post-2.jpg","keywords":["cyber","Cybernetics","Duties","eu","Law","Security"],"articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/","url":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/","name":"Cybersecurity, Part Two - Responsibilities - m2apartners.cz","isPartOf":{"@id":"https:\/\/m2apartners.cz\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/#primaryimage"},"image":{"@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/#primaryimage"},"thumbnailUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2024\/09\/Simple-Law-Firm-Facebook-Post-2.jpg","datePublished":"2024-09-06T12:56:00+00:00","dateModified":"2025-03-27T16:06:06+00:00","description":"If you have determined that you will be an entity under the upcoming new Cybersecurity Act, the first obligation you need to fulfill is registration.","breadcrumb":{"@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/#primaryimage","url":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2024\/09\/Simple-Law-Firm-Facebook-Post-2.jpg","contentUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2024\/09\/Simple-Law-Firm-Facebook-Post-2.jpg","width":940,"height":788},{"@type":"BreadcrumbList","@id":"https:\/\/m2apartners.cz\/en\/cybersecurity-part-two-responsibilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/m2apartners.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity, Part Two - Responsibilities"}]},{"@type":"WebSite","@id":"https:\/\/m2apartners.cz\/en\/#website","url":"https:\/\/m2apartners.cz\/en\/","name":"m2apartners.cz","description":"We focus on providing legal services to clients in the pharmaceutical and medical device industries, in corporate matters, in connection with the setting up of internal processes, in matters of zoning and construction law proceedings, in general practice, especially general contract, real estate, family and employment law.","publisher":{"@id":"https:\/\/m2apartners.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/m2apartners.cz\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/m2apartners.cz\/en\/#organization","name":"M2A Partners","url":"https:\/\/m2apartners.cz\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/logo\/image\/","url":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/03\/cropped-cropped-FAV_512x512.png","contentUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/03\/cropped-cropped-FAV_512x512.png","width":512,"height":512,"caption":"M2A Partners"},"image":{"@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/person\/2737d6d592b954976f2a3fdcb4e8248e","name":"admin3645","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/baf40bb2dd82590384e4496ea9a16e5723a6284ec7fb445ad629f19905b6c337?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/baf40bb2dd82590384e4496ea9a16e5723a6284ec7fb445ad629f19905b6c337?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/baf40bb2dd82590384e4496ea9a16e5723a6284ec7fb445ad629f19905b6c337?s=96&d=mm&r=g","caption":"admin3645"},"sameAs":["https:\/\/m2apartners.cz"]}]}},"_links":{"self":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts\/6019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/comments?post=6019"}],"version-history":[{"count":1,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts\/6019\/revisions"}],"predecessor-version":[{"id":6020,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts\/6019\/revisions\/6020"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/media\/5601"}],"wp:attachment":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/media?parent=6019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/categories?post=6019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/tags?post=6019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}