{"id":6850,"date":"2025-12-12T10:56:40","date_gmt":"2025-12-12T09:56:40","guid":{"rendered":"https:\/\/m2apartners.cz\/amendment-to-the-cybersecurity-act\/"},"modified":"2025-12-12T11:08:38","modified_gmt":"2025-12-12T10:08:38","slug":"amendment-to-the-cybersecurity-act","status":"publish","type":"post","link":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/","title":{"rendered":"Amendment to the Cybersecurity Act"},"content":{"rendered":"\n<p><\/p>\n\n<p>Since 1 November, a new law on cyber security has been in force, which implements the changes introduced by the NIS Directive2. <\/p>\n\n<p><strong>Who is affected by the law<\/strong><\/p>\n\n<p>The legislation will affect entities that provide any of the regulated services. A list of these services and other criteria is set out in the Annex to <a href=\"https:\/\/www.e-sbirka.cz\/sb\/2025\/408\/0000-00-00?zalozka=text\">the Regulated Services Ordinance<\/a>. If you provide any of the listed services and meet the necessary criteria, you are a regulated service provider and are subject to the obligations under the Cybersecurity Act and the relevant regime.  <\/p>\n\n<p>The law further distinguishes special entities to which it adds some special obligations. These are entities providing domain registration services and providers of strategically important services (services whose disruption could have a serious impact on the security of the Czech Republic or internal order). The strategically important services will be defined by a government decree.  <\/p>\n\n<p><strong>Two modes of obligation<\/strong><\/p>\n\n<p>The law distinguishes two regimes of obligations: 1. the regime of higher obligations and 2. the regime of lower obligations. The criteria for inclusion in the scheme are also set out in the Annex to the Regulated Services Ordinance. The basic criterion is the size of the undertaking, but other factors may also apply.    <\/p>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"789\" height=\"314\" src=\"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/image.png\" alt=\"\" class=\"wp-image-6844\" srcset=\"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/image.png 789w, https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/image-480x191.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 789px, 100vw\" \/><\/figure>\n\n<p>However, the Act lists providers who will always be in the higher duty regime. These are: <\/p>\n\n<ul class=\"wp-block-list\">\n<li>poskytovatele regulovan\u00e9 slu\u017eby, kte\u0159\u00ed spln\u00ed dv\u011b v\u00fd\u0161e popsan\u00e1 krit\u00e9ria, a kte\u0159\u00ed<ul><li>jsou jedin\u00fdm poskytovatelem t\u00e9to slu\u017eby v&nbsp;\u010cR,<\/li><\/ul><ul><li>provide a service, the disruption of which could have a significant impact on the security of the Czech Republic, internal order or life and health,<\/li><\/ul><ul><li>provide a service, the disruption of which could create significant systemic risks,<\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li>are essential for a specific sector because of their specific importance at regional or national level;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>service provider, the disruption of which may cause a serious interference in the lives of more than 125 000 persons, through a threat to the security of the Czech Republic, internal order, life and health, property value or the environment;<\/li>\n\n\n\n<li>of the service provider, the disruption of which may cause a serious interference with the ability to provide another regulated service of the provider under the regime of higher obligations;<\/li>\n\n\n\n<li>critical infrastructure entities.<\/li>\n<\/ul>\n\n<p><strong>Duties<\/strong><\/p>\n\n<p>a) <strong>Registration<\/strong><\/p>\n\n<ol style=\"list-style-type:lower-alpha\" class=\"wp-block-list\">\n<li><\/li>\n<\/ol>\n\n<p>The first obligation that a provider of a regulated service must fulfil is registration. Registration of the regulated service is required within 60 days of the conditions for registration being met (if they are already met before the Act comes into force, this will be 60 days after the Act comes into force). Registration is carried out via the <a href=\"https:\/\/portal.nukib.gov.cz\/chci-vyridit\/ohlaseni-regulovane-sluzby\">NUCIB Portal<\/a>. The provider is subsequently served with a decision on registration, which is particularly important for the calculation of the deadlines for the fulfilment of further obligations.   <\/p>\n\n<p>(b) <strong>Reporting of contact details<\/strong><\/p>\n\n<p>The provider must report the contact and additional information within 30 days of receipt of the registration decision. Reporting is again done through the NCIP Portal. <\/p>\n\n<p>(c) <strong>Cybersecurity incident reporting<\/strong><\/p>\n\n<p>No later than 1 year from the delivery of the registration decision, the provider is obliged to start reporting cyber security incidents.<\/p>\n\n<p>A Provider in a higher duty regime must report to the NUCIB all cyber security incidents where intentional culpability cannot be ruled out. A provider in the lower duty regime shall report to the National CERT those incidents that have a significant impact and for which intentional culpability cannot be excluded. Reports will be made via the NCIB Portal.  <\/p>\n\n<p>This also entails the obligation to keep records of data on cyber security incidents, events, threats and vulnerabilities.<\/p>\n\n<p>(d) <strong>Security measures<\/strong><\/p>\n\n<p>Security measures must be in place within the same timeframe, i.e. within 1 year, and these vary according to the duty regime. The law lists the areas of security measures, the specific obligations are set by the NUCIB in decrees for the respective regimes (for the higher obligation regime <a href=\"https:\/\/www.e-sbirka.cz\/sb\/2025\/409\/0000-00-00?zalozka=text\">here<\/a>, for the lower obligation regime <a href=\"https:\/\/www.e-sbirka.cz\/sb\/2025\/410\/0000-00-00?zalozka=text\">here<\/a>). <\/p>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"756\" height=\"261\" src=\"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/image.jpg\" alt=\"\" class=\"wp-image-6846\" srcset=\"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/image.jpg 756w, https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/image-480x166.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 756px, 100vw\" \/><\/figure>\n\n<p><a href=\"https:\/\/portal.nukib.gov.cz\/storage\/uploads\/2025\/11\/11\/harmonoram-nzkb-v2_uid_69136221347c6.png\">(https:\/\/portal.nukib.gov.cz\/storage\/uploads\/2025\/11\/11\/harmonoram-nzkb-v2_uid_69136221347c6.png)<\/a><\/p>\n\n<p><strong>Sanctions<\/strong><\/p>\n\n<p>for non-compliance, the provider is liable to fines of up to CZK 250 million under the higher obligations regime. CZK 250 million, while a provider in the regime of lower obligations may be subject to up to CZK 175 million. CZK 175.  <\/p>\n\n<p><\/p>\n\n<p><\/p>\n\n<p>If you would like more information in this regard, please do not hesitate to contact us.<\/p>\n\n<p>This article is for informational purposes only and does not constitute legal advice or guidance for any particular case.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since 1 November, a new law on cyber security has been in force, which implements the changes introduced by the NIS Directive2. Who is affected by the law The legislation will affect entities that provide any of the regulated services. A list of these services and other criteria is set out in the Annex to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6840,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[320,603,508],"tags":[607,608,347,344,609],"class_list":["post-6850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-for-you","category-our-themes","tag-amendment-2","tag-cyber-security","tag-law","tag-legislation","tag-regulated-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Amendment to the Cybersecurity Act - m2apartners.cz<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amendment to the Cybersecurity Act - m2apartners.cz\" \/>\n<meta property=\"og:description\" content=\"Since 1 November, a new law on cyber security has been in force, which implements the changes introduced by the NIS Directive2. Who is affected by the law The legislation will affect entities that provide any of the regulated services. A list of these services and other criteria is set out in the Annex to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/\" \/>\n<meta property=\"og:site_name\" content=\"m2apartners.cz\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-12T09:56:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-12T10:08:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/Novela-kybernetickeho-zakona-vizual-web.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"1181\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alexandra Posp\u00ed\u0161ilov\u00e1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandra Posp\u00ed\u0161ilov\u00e1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/\"},\"author\":{\"name\":\"Alexandra Posp\u00ed\u0161ilov\u00e1\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/person\\\/a2a0f0bdd9b528d03efc87ba5fbf5732\"},\"headline\":\"Amendment to the Cybersecurity Act\",\"datePublished\":\"2025-12-12T09:56:40+00:00\",\"dateModified\":\"2025-12-12T10:08:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/\"},\"wordCount\":736,\"publisher\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Novela-kybernetickeho-zakona-vizual-web.png\",\"keywords\":[\"Amendment\",\"cyber security\",\"Law\",\"legislation\",\"regulated services\"],\"articleSection\":[\"Articles\",\"For you\",\"Our themes\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/\",\"name\":\"Amendment to the Cybersecurity Act - m2apartners.cz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Novela-kybernetickeho-zakona-vizual-web.png\",\"datePublished\":\"2025-12-12T09:56:40+00:00\",\"dateModified\":\"2025-12-12T10:08:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/#primaryimage\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Novela-kybernetickeho-zakona-vizual-web.png\",\"contentUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Novela-kybernetickeho-zakona-vizual-web.png\",\"width\":945,\"height\":1181},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/amendment-to-the-cybersecurity-act\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amendment to the Cybersecurity Act\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/\",\"name\":\"m2apartners.cz\",\"description\":\"We focus on providing legal services to clients in the pharmaceutical and medical device industries, in corporate matters, in connection with the setting up of internal processes, in matters of zoning and construction law proceedings, in general practice, especially general contract, real estate, family and employment law.\",\"publisher\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#organization\",\"name\":\"M2A Partners\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-cropped-FAV_512x512.png\",\"contentUrl\":\"https:\\\/\\\/m2apartners.cz\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-cropped-FAV_512x512.png\",\"width\":512,\"height\":512,\"caption\":\"M2A Partners\"},\"image\":{\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/m2apartners.cz\\\/en\\\/#\\\/schema\\\/person\\\/a2a0f0bdd9b528d03efc87ba5fbf5732\",\"name\":\"Alexandra Posp\u00ed\u0161ilov\u00e1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a60cd7733dcfcb6cfb53ef6f630571e0a76750e76287f811447bd9e434deefc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a60cd7733dcfcb6cfb53ef6f630571e0a76750e76287f811447bd9e434deefc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a60cd7733dcfcb6cfb53ef6f630571e0a76750e76287f811447bd9e434deefc?s=96&d=mm&r=g\",\"caption\":\"Alexandra Posp\u00ed\u0161ilov\u00e1\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amendment to the Cybersecurity Act - m2apartners.cz","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/","og_locale":"en_US","og_type":"article","og_title":"Amendment to the Cybersecurity Act - m2apartners.cz","og_description":"Since 1 November, a new law on cyber security has been in force, which implements the changes introduced by the NIS Directive2. Who is affected by the law The legislation will affect entities that provide any of the regulated services. A list of these services and other criteria is set out in the Annex to [&hellip;]","og_url":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/","og_site_name":"m2apartners.cz","article_published_time":"2025-12-12T09:56:40+00:00","article_modified_time":"2025-12-12T10:08:38+00:00","og_image":[{"width":945,"height":1181,"url":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/Novela-kybernetickeho-zakona-vizual-web.png","type":"image\/png"}],"author":"Alexandra Posp\u00ed\u0161ilov\u00e1","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alexandra Posp\u00ed\u0161ilov\u00e1","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/#article","isPartOf":{"@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/"},"author":{"name":"Alexandra Posp\u00ed\u0161ilov\u00e1","@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/person\/a2a0f0bdd9b528d03efc87ba5fbf5732"},"headline":"Amendment to the Cybersecurity Act","datePublished":"2025-12-12T09:56:40+00:00","dateModified":"2025-12-12T10:08:38+00:00","mainEntityOfPage":{"@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/"},"wordCount":736,"publisher":{"@id":"https:\/\/m2apartners.cz\/en\/#organization"},"image":{"@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/#primaryimage"},"thumbnailUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/Novela-kybernetickeho-zakona-vizual-web.png","keywords":["Amendment","cyber security","Law","legislation","regulated services"],"articleSection":["Articles","For you","Our themes"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/","url":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/","name":"Amendment to the Cybersecurity Act - m2apartners.cz","isPartOf":{"@id":"https:\/\/m2apartners.cz\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/#primaryimage"},"image":{"@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/#primaryimage"},"thumbnailUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/Novela-kybernetickeho-zakona-vizual-web.png","datePublished":"2025-12-12T09:56:40+00:00","dateModified":"2025-12-12T10:08:38+00:00","breadcrumb":{"@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/#primaryimage","url":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/Novela-kybernetickeho-zakona-vizual-web.png","contentUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/12\/Novela-kybernetickeho-zakona-vizual-web.png","width":945,"height":1181},{"@type":"BreadcrumbList","@id":"https:\/\/m2apartners.cz\/en\/amendment-to-the-cybersecurity-act\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/m2apartners.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Amendment to the Cybersecurity Act"}]},{"@type":"WebSite","@id":"https:\/\/m2apartners.cz\/en\/#website","url":"https:\/\/m2apartners.cz\/en\/","name":"m2apartners.cz","description":"We focus on providing legal services to clients in the pharmaceutical and medical device industries, in corporate matters, in connection with the setting up of internal processes, in matters of zoning and construction law proceedings, in general practice, especially general contract, real estate, family and employment law.","publisher":{"@id":"https:\/\/m2apartners.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/m2apartners.cz\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/m2apartners.cz\/en\/#organization","name":"M2A Partners","url":"https:\/\/m2apartners.cz\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/logo\/image\/","url":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/03\/cropped-cropped-FAV_512x512.png","contentUrl":"https:\/\/m2apartners.cz\/wp-content\/uploads\/2025\/03\/cropped-cropped-FAV_512x512.png","width":512,"height":512,"caption":"M2A Partners"},"image":{"@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/m2apartners.cz\/en\/#\/schema\/person\/a2a0f0bdd9b528d03efc87ba5fbf5732","name":"Alexandra Posp\u00ed\u0161ilov\u00e1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2a60cd7733dcfcb6cfb53ef6f630571e0a76750e76287f811447bd9e434deefc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2a60cd7733dcfcb6cfb53ef6f630571e0a76750e76287f811447bd9e434deefc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a60cd7733dcfcb6cfb53ef6f630571e0a76750e76287f811447bd9e434deefc?s=96&d=mm&r=g","caption":"Alexandra Posp\u00ed\u0161ilov\u00e1"}}]}},"_links":{"self":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts\/6850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/comments?post=6850"}],"version-history":[{"count":2,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts\/6850\/revisions"}],"predecessor-version":[{"id":6853,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/posts\/6850\/revisions\/6853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/media\/6840"}],"wp:attachment":[{"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/media?parent=6850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/categories?post=6850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m2apartners.cz\/en\/wp-json\/wp\/v2\/tags?post=6850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}