Belgium’s Cybersecurity Strategy 2.0 (2021–25; the “Strategy”), which was designed by the Belgian federal government in co-operation with the Belgian Cybersecurity Centre (CCB), aims to make Belgium one of the least vulnerable countries in Europe in terms of cybersecurity. It includes a strategic plan to support the development of appropriate capacity to detect, investigate, prosecute and sanction cybercrime.
One of the key objectives of the Strategy is to build out expertise across all levels of law enforcement so that the necessary investigation capacities can be effectively and quickly deployed in a digital environment. The intention is to ensure that the prosecutor’s office and the courts of all judicial districts have prosecutors and judges with sufficient experience in combatting cybercrime.
The Strategy also sets out several strategic objectives that the CCB intends to pursue in co-operation with all relevant stakeholders in the cybersecurity sector in the upcoming years.¬
These objectives include:
The main laws and regulations in Belgium relating to cybersecurity include:
The CCB operates under the authority of the federal Prime Minister and is the central authority for cybersecurity in Belgium, in addition to assuming the role of national computer security incident response team (CSIRT). The CCB is charged with monitoring, co-ordinating and supervising the implementation of the government’s cybersecurity policy and strategy.
¬The federal computer emergency response team (CERT) is the operational service of the CCB. The task of CERT is to detect, observe and analyse online security problems, and to provide continuous information about these problems. It helps the government, emergency services and companies to prevent, co-ordinate and provide assistance in the event of cyber-incidents.
The Cyber Threat Research and Intelligence Sharing (“CyTRIS”) Department within the CCB monitors cyberthreats and publishes regular reports.
In addition to the CCB, several sectoral authorities are charged with monitoring cyber-related matters for their respective sectors:
Together with the CCB, the National Crisis Centre (NCCN) ensures the organisation and co-ordination of the Cyber Emergency Plan at national level. The two authorities are jointly responsible for crisis management. The NCCN is also in charge of making national risk assessments, and it is the (inter)national point of contact for critical infrastructures. Moreover, the NCCN prepares national emergency plans and provides local support. It operates 24/7, ensures the protection of people and institutions and monitors events.
The Belgian Institute for Postal Services and Telecommunications (BIPT) monitors the security of the electronic communications networks and services of telecoms operators. The BIPT is also the sectoral authority and inspection service for the digital infrastructure sector under the NIS2 Act, and for the electronic communications and digital infrastructure sectors under the Critical Infrastructures Act.
The National Security Council is charged with the co-ordination and evaluation of general intelligence and security policy matters and the national security strategy, the prioritisation of intelligence and security services, the co-ordination of national security priorities, the co-ordination of a general policy on the protection of sensitive information, the co-ordination of the fight against terrorism and extremism and the monitoring of its decisions.
The Coordination Unit for Threat Analysis (CUTA), operating under the Minister of Justice and the Minister of Interior Affairs, is an independent knowledge centre in charge of assessing terrorist and extremist threats in Belgium.
The Belgian Data Protection Authority (DPA) is an independent body that ensures that the fundamental principles of personal data protection are properly observed. This includes the GDPR’s requirements relating to data security and personal data breach notifications. The DPA consists of different departments, each of which plays a specific role in enforcement cases. The Frontline Service performs a triage function to determine which complaints merit further investigation, the Inspection Body carries out investigations, and the Dispute Resolution Chamber issues enforcement decisions. Investigations are typically triggered by a complaint or request for information, but the DPA can also decide to open an investigation at its own initiative.
The Information Security Committee (ISC) was created by the Act of 5 September 2018 to grant certain authorisations in relation to the processing and communication of specific categories of personal data (eg, national registry numbers).
The NIS2 Directive and the Belgian NIS2 Act transposing it apply to public or private entities that are established in Belgium and that provide one of the services listed in Annex I or II to the NIS2 Act within the EU.
An entity will be subject to the NIS2 Act if it carries out one of the activities listed in Annex I or II to the NIS2 Act – as an “essential” or “important” entity – within the EU, and if it is at least considered to be a medium-sized enterprise within the meaning of European Commission Recommendation 2003/361/EC of 6 May 2003 (concerning the definition of micro, small and medium-sized enterprises).
“Essential entities” are those that provide a service listed in Annex I and meet the definition of a large enterprise within the meaning of Recommendation 2003/361/EC.
“Important entities” are organisations that provide a service:
For the purposes of calculating the size of the entity, the European Commission has published guidance as well as a calculation tool. In addition, the CCB has issued guidelines specifying that the scope of the NIS2 Act covers the whole of the entity concerned and not just the activities listed in the Annexes to the NIS2 Act.
Moreover, an entity will be considered in scope of the NIS2 Act even if the essential service it provides is only an ancillary part of all its activities – unless the definition of the service in the Annex takes into account the principal or incidental nature of the activity.
In terms of territorial scope, the NIS2 Act applies in principle to entities established in Belgium that provide their services or carry out their activities within the EU. The concept of establishment consists of the actual pursuit of an activity by means of a permanent installation, irrespective of the legal form adopted, whether this is a registered office, a local branch or a subsidiary with legal personality.
It should also be noted that the operator of one or more critical infrastructure(s) identified under Critical Infrastructures Act will be considered to be an essential entity within the meaning of the NIS2 Act. The NIS2 authorities and the competent authorities under the Critical Infrastructures Act are expected to work together to supervise these entities.
The main cybersecurity requirements for entities in scope of the NIS2 Act can be summarised as follows:
Entities in scope of the NIS2 Act are required to notify the national CSIRT (ie, the CCB) in the event of a significant (cybersecurity) incident.
A significant incident is defined as any incident that has a significant impact on the provision of services in the sectors or subsectors listed in the Annexes to the NIS2 Act, and which has caused or is likely to cause:
Notification takes place through the following steps:
In principle, NIS2 entities are expected to notify incidents to the CCB only. The CCB will subsequently forward notifications to the relevant sectoral authorities and to the NCCN (for essential entities).
However, the notification regime is different for entities in the banking and financial sectors that are in scope of DORA. Those types of entities should notify incidents, as appropriate, to the National Bank of Belgium (NBB) or the Financial Services and Markets Authority (FSMA), which will forward the incident notification to the CCB.
In some cases, entities that have suffered a significant incident will also be required to notify the recipients of their services.
The CCB is responsible for co-ordinating and monitoring the NIS2 Act. Under the NIS2 Act, the CCB will be in charge of supervising essential and important entities (in co-operation with sectoral authorities), in addition to being the central contact point for NIS2 implementation.
Belgium’s CSIRT is also part of the CCB. Entities in scope of the NIS2 Act are required to report significant incidents to this CSIRT. In addition, the NCCN is involved in the implementation of the NIS2 Act, in particular as regards incident notification, cybercrisis management and physical security measures implemented by operators of critical infrastructures and critical entities (subject to the Critical Infrastructures Act).
DORA applies to the following types of financial entities, which are under the supervision of the FSMA:
DORA also applies to institutions that are under the supervision of the NBB, such as credit institutions, insurance and reinsurance companies and payment institutions.
DORA defines information and communication technology (third-party) service providers (ICT TPSPs) as undertakings providing ICT services to financial entities in scope of DORA. ICT services in the context of DORA should be understood in a broad manner, encompassing digital and data services provided through ICT systems to one or more internal or external users on an ongoing basis. This may include providers of cloud computing services, software, data analytics services and data centre services. If financial entities delegate critical or important functions to ICT TPSPs, more stringent requirements will apply.
To ensure the conformity of their ICT risk management framework, financial entities are expected to maintain and update a specific information register (register of information or ROI) that lists the relevant contracts relating to the use of ICT services provided by ICT TPSPs. The agreements with ICT TPSPs will have to be properly documented and clearly distinguish those applicable to ICT services in support of critical functions.
Upon request, financial entities will have to make the entire ROI or certain parts of it available to the FSMA, together with all information that is considered necessary to enable effective supervision of the financial entity.
In addition, financial entities will have to inform the FSMA of any new or planned agreements on the use of ICT services that support critical or important functions.
Contractual provisions on the use of ICT services should include at least the following elements:
DORA aims to strengthen the digital operational resilience of the financial sector in the EU by imposing additional (cybersecurity) requirements on financial entities such as crypto-asset service providers, credit institutions and e-money providers (referred to as “financial entities” under DORA).
Sector-specific requirements under DORA include obligations to design ICT risk management frameworks, report major ICT-related incidents and perform digital operational resilience testing. DORA also requires financial entities to address and manage external sources of ICT risks that may result from their use of ICT TPSPs. To this end, financial entities are required to undertake due diligence on prospective ICT TPSPs, enter into specific contractual arrangements with ICT TPSPs and maintain and update a register with information on their relationships with ICT TPSPs.
After collecting and analysing all relevant information, financial entities must report serious ICT-related incidents to the FSMA. This information enables the FSMA to determine the scope of the incident and its possible cross-border effects, and to communicate it to other supervisors and authorities concerned.
The reporting of serious ICT-related incidents involves different steps, including the submission of an initial report, an interim report and a final report. Financial entities must submit an interim report if the status or handling of the incident has changed significantly, or at the request of the FSMA. The final report contains the analysis of the underlying causes of the incident, as well as information about to the actual impact of the incident.
When a serious ICT-related incident affects the financial interests of their clients, financial entities must inform them of the incident and the measures taken to mitigate any negative impact thereof.
DORA also includes a (voluntary) notification regime for significant cyberthreats – ie, cyberthreats that could result in a major ICT-related incident or a major operational or security payment-related incident. Financial entities may, on a voluntary basis, notify significant cyberthreats to the FSMA when they consider the threat to be of relevance to the financial system, service users or clients. Where appropriate, the FSMA may report that information to the other authorities and bodies concerned.
In the case of a significant cyberthreat, financial entities may need to, where applicable, inform clients that are potentially affected of any appropriate protection measures that they should consider taking.
Financial entities may outsource their reporting duties, but they remain fully responsible for ensuring compliance with their financial entity obligations under DORA.
The NBB and the FSMA are the primary financial services regulators in Belgium. They are also in charge of monitoring cybersecurity risks in the Belgian financial sector. Therefore, DORA compliance will be overseen primarily by the FSMA.
To harmonise the supervision of ICT risks in the financial sector, DORA also brings together EU financial authorities, such as the European Banking Authority and the European Securities and Markets Authority, collectively referred to as the European Supervisory Authorities.
DORA allows EU member state authorities competent to monitor the activities of financial entities and ICTSPs to impose administrative fines (including in collaboration with other authorities, such as DPAs). For example, DORA leaves it to the discretion of these authorities to examine whether a DORA violation was intentional or resulted from a financial entity’s or ICTSP’s negligence in determining the amounts of fines to be imposed.
Furthermore, the EU legislators wanted to ensure appropriate oversight of critical ICTSPs, especially because these companies also provide, in some cases, their services to financial entities within the same group, which may lead to potential conflicts of interest and concentration risks. To address this issue, DORA establishes a new oversight framework whereby one of the major EU financial authorities (eg the European Banking Authority or the European Securities and Markets Authority) is designated as a lead overseer (LO) to monitor the activities of critical ICT TPSPs.
Critical ICT TPSPs are ICT TPSPs that the European Supervisory Authorities have designated as “critical” for financial entities, following an assessment that takes into account the criteria specified in DORA. LOs will have the power to conduct investigations (ie, on-site and offsite inspections) and adopt decisions imposing a periodic penalty payment to compel critical ICT TPSPs to co-operate with the LO in the course of an investigation.
Under DORA, financial entities are required to design, procure and implement ICT security policies, procedures, protocols and tools that aim to ensure the resilience, continuity and availability of ICT systems, in particular for those supporting critical or important functions, and to maintain high standards of availability, authenticity, integrity and confidentiality of data, whether at rest, in use or in transit. To achieve these objectives, financial entities are required to use ICT solutions and processes that, inter alia, ensure the security of the means of transfer of data.
In addition, if the data includes personal data (as defined in the GDPR), restrictions imposed by the GDPR may apply to transfers of personal data to recipients in jurisdictions outside of the EU.
DORA requires certain entities to conduct advanced threat-led penetration tests. This requirement will only apply to financial entities selected on the basis of an assessment of the following elements:
The obligation to conduct advanced threat-led penetration tests does not apply to (i) small and unconnected investment firms, (ii) IORPs that have no more than 100 affiliates, or (iii) financial entities employing fewer than ten people, and whose annual turnover and/or annual balance sheet total does not exceed EUR2 million.
The CRA imposes minimum cybersecurity standards for connected products placed on the Belgian market, with a view to making the internet of things (IoT) more secure. It contains horizontal cybersecurity requirements for products with digital elements (PDEs), which are defined as products that can be connected to a device or network and include:
All manufacturers placing PDEs on the Belgian market must comply with the CRA even if they are based outside the EU. For instance, the CRA may apply to a Chinese manufacturer of solar panels that sells its products in Belgium.
The CRA primarily imposes obligations on manufacturers of PDEs to ensure that their products are secure before they are put on the EU/Belgian market, but also afterwards throughout the whole life cycle of the product.
Furthermore, it includes provisions affecting other operators of PDEs such as importers, distributors, open-source software stewards, conformity assessment bodies (CABs) and public authorities.
According to the CCB, the CRA is expected to contribute to the CCB’s vision of making Belgium more cybersecure by ensuring that its citizens and organisations are less vulnerable to cyber-attacks.
The CRA imposes a minimum level of cybersecurity for all PDEs that are placed on the Belgian market and requires manufacturers of PDEs to:
All PDEs, regardless of their cybersecurity risk level, must comply with the CRA’s basic cybersecurity standards outlined in the foregoing. PDEs that are considered more sensitive from a cybersecurity viewpoint – which the CRA refers to as “important” or “critical” products (eg password managers, firewalls, smart meters) are subject to additional, stricter obligations.
Cybersecurity certification plays an important role in increasing trust and security in IoT-related products, services and processes, and the Cybersecurity Act has therefore introduced a European cybersecurity certification framework.
ENISA, the EU Agency for cybersecurity, is in charge of in setting up and maintaining the European cybersecurity certification framework by preparing the technical ground for specific certification schemes. It is also responsible for informing the public on the certification schemes and the issued certificates through a dedicated website.
In addition, Belgium has created (by Royal Decree dated 16 October 2022), a framework that enables companies to evaluate and certify the security of ICT products, services and processes, in line with the Cybersecurity Act. The CCB has been designated as the national cybersecurity certification authority that will co-ordinate the necessary expertise in cybersecurity certification, authorise certificates with high security requirements and establish close collaboration with the Belgian accreditation organisation.
To help covered entities demonstrate compliance with the NIS2 Act in particular, the CCB has created the CyFun framework, which is based on several commonly used cybersecurity frameworks or standards including the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), International Organization for Standardization (ISO) 27001/ISO 27002, Center for Internet Security (CIS) Controls and International Electrotechnical Commission (IEC) 62443. Following a NIS2 conformity assessment, a CyFun certification can be granted by a CAB that is approved by the CCB. CABs are bodies responsible for verifying an entity’s compliance with the requirements set out in the CyFun reference framework.
The GDPR provides that controllers have a legitimate interest in processing personal data to the extent that such processing is strictly necessary and proportionate for the purposes of ensuring network and information security. The GDPR further specifies that permitted practices and tools for network and information security could include those that focus on:
The GDPR also includes a notification regime for personal data breaches. The concept of “personal data breach” is broadly defined in the GDPR as “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed”. Controllers whose processing of personal data is subject to Belgian law may be required to notify personal data breaches to the Belgian DPA and, in some cases, to the individuals whose personal data is affected.
A personal data breach is a type of data security incident. While all personal data breaches are data security incidents, not all data security incidents are necessarily personal data breaches. The GDPR, and hence the notification duties to the DPA and affected individuals, only apply where there is a personal data breach.
The AI Act requires that high-risk AI systems must achieve suitable accuracy, robustness and cybersecurity levels, and that they perform consistently in those respects throughout their life cycle. The technical solutions aiming to ensure the cybersecurity of high-risk AI systems must be appropriate to the relevant circumstances and the risks. They can include measures to prevent, detect, respond to, resolve and control for attacks trying to manipulate the training data set (data poisoning), pre-trained components used in training (model poisoning), inputs designed to cause an AI model to make a mistake (adversarial examples or model evasion), confidentiality attacks and model flaws.
The European Commission has requested the European Committee for Standardisation (CEN) and the European Committee for Electrotechnical Standardisation (CENELEC) to draft the new European standards or European standardisation deliverables on AI by 30 April 2025, including European standard(s) and/or European standardisation deliverable(s) on cybersecurity specifications for AI systems.
High-risk AI systems that have been certified, or for which a statement of conformity has been issued under a cybersecurity scheme pursuant to the Cybersecurity Act, will be presumed to comply with the cybersecurity requirements set out in the AI Act (in so far as the cybersecurity certificate or statement of conformity, or parts thereof, cover those requirements).
Regulation (EU) 2017/745 of the European Parliament and of the Council of 5 April 2017 on medical devices, amending Directive 2001/83/EC, Regulation (EC) 178/2002 and Regulation (EC) 1223/2009 and repealing Council Directives 90/385/EEC and 93/42/EEC (the “Medical Devices Regulation”), requires that, for devices that incorporate software or for software packages that are medical devices in themselves, the software must be developed and manufactured in accordance with the state-of-the-art, including in regard to information security standards and verification invalidation. Manufacturers of such medical devices must set out minimum requirements concerning hardware, IT networks characteristics and IT security measures, including any protection against unauthorised access.
Incidents involving the security of medical devices that include or constitute software may require notification to the national competent authority, if certain conditions are met. This will be the case, for example, where the medical device is suspected to be a contributory cause of the incident and the incident has (or might have) led to the death or serious deterioration in the state of health of a patient or other person. For incidents that occur on the Belgian territory, the national competent authority is the Federal Agency for Pharmaceuticals and Health Products (FAGG).
Rue Guimard 9
B-1040 Brussels
Belgium
+32 2486 8822
Wim.Nauwelaerts@alston.com www.alston.comIntroduction
As digital transformation accelerates and cyberspace becomes increasingly complex, cybersecurity has emerged as a critical concern for organisations. The deep interconnectivity of the cyber-ecosystem means that a breach in a single entity can trigger a chain reaction, compromising entire networks with far-reaching consequences. Even the smallest vulnerabilities in digital systems can lead to significant disruptions, from financial losses to reputational damage.
For many organisations, cybersecurity is no longer merely an operational concern – it is also a legal imperative. In 2024, Belgium was the first EU member state to transpose Directive (EU) 2022/2555 (the “NIS2 Directive”) into national law (the “NIS2 Law”). As a direct consequence thereof, 2025 is set to be an intense year as this landmark legislation is expected to impact over 2,500 entities across a wide range of sectors. In addition to implementing risk management measures, organisations will need to review their contracts with suppliers and subcontractors and ensure that future agreements explicitly include cybersecurity warranties. Management bodies will also be heavily involved, as the law imposes numerous obligations and responsibilities on them. Compliance with the NIS2 Law is overseen and enforced in Belgium by the Centre for Cyber Security (the CCB).
Below is an overview of the main cybersecurity trends the authors see for 2025.
CyberFundamentals as a Cybersecurity Framework Originating in Belgium, but Potentially With Much Broader Recognition
Under the NIS2 legislation, certain entities are required to undergo periodic compliance assessments, which result in certification. In Belgium, only two certifications are recognised by law:
The latter is a certification granted by a conformity assessment body approved by the CCB. The framework is based on commonly used cybersecurity frameworks, namely the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), ISO 27001/ISO 27002, Center for Internet Security (CIS) Controls and IEC 62443. To address the varying levels of risk organisations face, the framework offers four assurance levels: small, basic, important and essential. The CyFun framework is generally deemed to be less burdensome (and less expensive) to implement than ISO certification, and the CCB has also published a multitude of online guidance notes and tools to aid implementation thereof by Belgian companies.
Interestingly, Romania has already implemented the NIS2 Directive, and has explicitly recognised the Belgian CyFun certification scheme as a valid compliance framework under its local law.
Following the Romanian example, CyFun, although initially a local Belgian initiative, could receive broader international recognition, with more countries expected to follow Romania’s lead.
Cybersecurity Clauses as a “Must Have” for Both Current and Future Contracts
In cases where IT services are outsourced, the legal responsibility under cybersecurity legislation (eg, NIS2 and DORA) remains with the in-scope organisation itself. Therefore, it is crucial for these organisations to properly map the various contactors, suppliers, service providers, etc, that have access to their IT systems, provide cloud-based software solutions or may otherwise impact the organisation’s cybersecurity risk profile.
In Belgium, the authors are seeing a clear trend towards companies requesting additional cybersecurity-related guarantees and certifications from their suppliers. Since past cyber-attacks have highlighted the intrinsic link with various ecosystems, cybersecurity clauses are becoming a key concern in supply chain risk management.
More specifically, the authors see an increased focus on the following types of clauses in various types of commercial (supply/services) contracts, not only in the IT sector:
While the arrangements for cybersecurity are in some cases set out in a lot of detail in the legislation itself (see DORA), this is not always the case (see NIS2), which leaves a lot of room for diverging practices and tough negotiations. In 2025, the authors expect more common practices and standards to develop in this respect – as it did for data processing agreements under the General Data Protection Regulation (GDPR), for example.
The focus on supply chain risk management will in any event remain in 2025. Noteworthy in this respect is the finding that, of all large organisations, 54% identified supply chain challenges as the biggest barrier to achieving cyber-resilience. The increasing complexity of supply chains, coupled with a lack of visibility and oversight regarding the security levels of suppliers, has emerged as the leading cybersecurity risk for organisations. Key concerns include software vulnerabilities introduced by third parties and the propagation of cyber-attacks throughout the ecosystem, as noted in the World Economic Forum’s Global Cybersecurity Outlook 2025.
Leaders Must Adopt a “Security-First” Mindset
The NIS2 legislation requires management bodies to play an active role in cybersecurity, making their involvement not only beneficial but also legally mandatory. The authors expect this to become a board-level priority in 2025.
More specifically, management bodies of NIS2-in-scope entities must:
As the concept of “management body” is not defined in the NIS2 Directive, the explanatory memorandum to the Belgian NIS2 Law defines a “member of a management body” as “Any natural or legal person who:
1. exercises a function within or in relation to an entity which authorises him or her (a) to administer and represent the entity in question or (b) to take decisions in the name and on behalf of the entity which are legally binding on it or to participate, within a body of that entity, in the taking of such decisions, or
2. has control over the entity, meaning the power, in law or in fact, to exercise decisive influence over the appointment of the majority of the entity’s directors or managers or over the direction of the entity’s management”.
Where the entity is a company governed by Belgian law, this control is determined in accordance with Articles 1:14 to 1:18 of the Belgian Code of Companies and Associations.
Moreover, if an organisation that is in-scope of NIS2 fails to comply with the NIS2 Law, then its management body may be held accountable and face not only director’s liability, but also a temporary ban from holding executive responsibilities within the organisation. It remains to be seen how this liability will be assessed in practice, and in which situations (likely only very extreme ones) the CCB would impose such a temporary ban.
While 2025 will likely still be a year of transition, enforcement of the NIS2 Law by the CCB is expected to gradually increase, especially in case of major cybersecurity incidents in critical or public sectors.
The Role of the CCB and the Data Protection Authority in Cybersecurity Compliance
The CCB has been designated by the NIS2 Law as the national authority responsible for the monitoring, supervision and enforcement of the NIS2 Law on Belgian territory. However, entities may also have to face another authority in the context of cybersecurity: the Belgian Data Protection Authority (DPA), which oversees the enforcement of the GDPR and national legislation concerning personal data protection. Indeed, the DPA is often called upon to examine IT systems and their use within companies, particularly due to the risks of personal data breaches, becoming a valuable asset in the event of cybersecurity incidents. The NIS2 Directive itself acknowledges in its recitals that personal data protection and cybersecurity are closely linked.
As a result, when a company suffers a cyber-attack leading to a personal data breach – a common occurrence – it often finds itself engaging with multiple authorities, sometimes including sectoral regulators, while also adhering to tight deadlines and different formal requirements. Firstly, companies subject to the NIS2 Law must notify significant incidents to the CCB without undue delay, at the latest within 24 hours of becoming aware of the incident. Additionally, these companies must also notify the DPA if the incident constitutes a personal data breach under data protection law, and this must be done no later than 72 hours after becoming aware of the breach.
The NIS2 Law does not provide amendments or exemptions to the GDPR in this regard. For initial notification, many companies will therefore first notify the CCB and then prepare their notification to the DPA. A late notification can lead to sanctions for non-compliance, as well as a broader investigation by the relevant regulatory authority.
The only exemption to the obligation to notify in the case of a personal data breach is provided by Article 74 of the NIS2 Law. According to this article, the data controller may be exempted from notifying a personal data breach to certain affected individuals, as provided in Article 34 of the GDPR. This exemption is possible subject to the CCB’s approval, where such individual notification could jeopardise the control and supervision of the entities, as well as the preparation, organisation, management and follow-up of administrative measures and fines. However, it is important to note that this exemption only applies to the obligation to notify the affected individuals, not the authorities.
Therefore, it is essential that entities systematically notify incidents involving personal data to both relevant authorities, in accordance with the requirements and procedures of both pieces of legislation. This approach also aligns with the “cyber incident response plan” model published by the CCB, which explicitly mentions the CCB and the DPA among the entities that should receive a report.
The next natural question is whether, following a notification and any subsequent investigation by the CCB and the DPA, a company could face two fines, one under the NIS2 Law and another under the GDPR. The fourth Title of the NIS2 Law states that the CCB or any competent sectoral authority will not impose an administrative fine for an infraction resulting from the same behaviour for which an administrative fine has already been imposed by the DPA. Instead, they may decide to impose alternative sanctions for the same actions (eg, requiring the entities involved to make certain aspects of the violations public). However, neither the NIS2 Law nor the GDPR or its implementing legislation provide a solution where the CCB first imposes an administrative fine, and the DPA then decides to do the same. However, it is reasonable to expect that a similar approach will be applied in such a case, by analogy with the criminal law principle of non bis in idem.
Ethical Hacking in Belgium Is Legal, Under Certain Conditions
Since 15 February 2023, in the context of the entry into force of a new whistle-blower law, the Belgian legislator has legalised “ethical hacking”. Under certain conditions, ethical hackers are protected against criminal liability, even where the hacked organisation did not consent to being subject to such “testing” of their cybersecurity standards.
Traditionally, the term “hacker” evokes individuals who exploit security flaws in IT systems for malicious purposes, such as extortion, sabotage or data theft. However, there are also hackers with good intentions, known as “ethical hackers”. “Ethical hacking” refers to the practice of testing an organisation’s systems and networks to identify and fix potential vulnerabilities without any fraudulent intent.
Until 18 October 2024, any natural or legal person was allowed to search for and report security vulnerabilities, even outside a co-ordinated vulnerability disclosure policy, without risking criminal prosecution, provided that they comply with certain conditions:
However, in 2024, the NIS2 Law narrowed the previous general liability exemption for ethical hacking to a specific list of defined offences:
Other offences, such as breaking and entering, are not included.
In other words, ethical hacking is now only permitted for conventional cyber-attacks involving remote access to IT systems. Physical attacks on these systems are no longer legally protected and require prior authorisation from the competent authorities. Otherwise, perpetrators face criminal prosecution, including charges of breaking and entering.
Furthermore, the four conditions established in 2023 remain in effect and are further clarified by the NIS2 Law, which entered into force on 18 October 2024.
With the Belgian NIS2 Law reinforcing the legal framework for ethical hacking and the 2025–29 federal coalition agreement of the new Belgian government granting law enforcement agencies the authority to collaborate with ethical hackers, organisations are advised to be aware of the applicable legal requirements to protect themselves against potential abuse.
Tervurenlaan 2
1040 Brussels
Belgium
+32 2743 4343
+32 2743 4310
Info.brussels@loyensloeff.com www.loyensloeff.com