Sweden’s approach to cybersecurity regulation is characterised by a diverse array of legal frameworks tailored to the specific needs and risks of each sector. Historically, this sectoral approach has allowed for targeted cybersecurity measures that address the unique challenges faced by different industries.
In response to the deteriorating global security landscape and increasing digitalisation, Sweden has initiated several new measures to strengthen its cybersecurity posture and take a more comprehensive approach to cybersecurity. A key development is the formulation of a strategy that addresses the country’s foreign and security policy in relation to cyber and digital issues. The main focus of Sweden’s cybersecurity strategy and efforts is to prevent cyberattacks and build resilience against them. This includes protecting critical infrastructure and sensitive information while ensuring that the country can recover and adapt quickly in the face of cyber threats. By improving resilience, Sweden aims to maintain the integrity and security of its digital environment, thereby safeguarding its national interests and the well-being of its citizens.
Overall, Sweden aims to address transnational cyber threats more effectively and improve its overall resilience through regulation and by working with international partners, particularly within the European Union and NATO, with a focus on protecting national interests and promoting global security.
Note that when Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS2) is transposed into Swedish law, it will replace the current regulations.
Scope of Application
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union (NIS) was implemented in Sweden through the Act on Information Security for Critical and Digital Services and the Regulation on Information Security for Critical and Digital Services. The legislation entered into force on 1 August 2018. The purpose of the legislation is to enhance the security level of network and information systems for digital services and essential services within certain sectors. Operators covered by the regulatory framework are categorised into:
Operators of Essential Services
Operators of essential services exist in both private and public sectors. An operator of essential services is defined as an entity that:
Digital Service Providers
Digital service providers exist in both private and public sectors. A digital service provider is defined as an entity that:
Obligations for Operators of Essential Services
An operator of essential services shall:
Obligations for Providers of Digital Services
A provider of digital services shall:
Notification Requirements
Operators of essential services and providers of digital services are required to report any incidents that occur. This contributes to creating a comprehensive view of the incident situation, enables warnings to others, and facilitates any necessary co-ordinated efforts.
Reports are submitted to the Swedish Civil Contingencies Agency, which has a co-ordinating role for the Information Security for Critical and Digital Services Act, which forwards the reports to the respective supervisory authority. The Swedish Civil Contingencies Agency has announced regulations and general advice on incident reporting for providers of essential services.
The Swedish Post and Telecom Authority is the supervisory authority for providers of digital services.
The following authorities are, for the specified sectors, the supervisory authority for operators of essential services:
CERT-SE is Sweden’s national CSIRT (Computer Security Incident Response Team) tasked with supporting society in managing and preventing IT incidents. CERT-SE is part of the Swedish Civil Contingencies Agency, which helps integrate their efforts into the broader national security framework.
CERT-SE’s responsibilities include providing assistance and guidance to the public sector, private companies, and organisations in handling cybersecurity threats and incidents. They aim to enhance the overall cybersecurity posture by offering expertise, co-ordinating responses to incidents, and promoting best practices for IT security.
In Sweden, the scope of financial sector operational resilience regulation is primarily governed by DORA. This regulation applies to a wide range of financial entities, including (but not limited to) banks, credit institutions, payment institutions, insurance companies, and alternative investment fund managers. DORA aims to enhance digital operational resilience by setting uniform requirements across the EU, and it is directly applicable in Sweden, requiring national legislation to complement it. The regulation excludes certain small entities and those covered by specific exemptions.
Contractual Requirements
Under the framework of DORA, contractual requirements for ICT service providers include clear terms on service levels, security measures, data protection, incident management, and termination rights. Contracts must also include provisions for audit rights and access to information necessary for the financial institution to comply with its regulatory obligations under DORA.
ICT Service Providers
In Sweden, under the framework of DORA, “ICT service providers” are defined broadly to encompass entities that offer information and communication technology services to financial institutions. These include a wide range of services such as cloud computing, data analytics, software development, and cybersecurity services. The definition is intended to cover any third-party service that could impact the operational resilience of financial entities.
Critical ICT Services
Not all ICT services are classified as critical. The classification of an ICT service as critical depends on several factors, such as the systemic impact of a failure in providing the ICT services, the reliance of financial entities, the degree of substitutability and other relevant factors. While the definition of ICT service providers in Sweden is broad, the classification of services as critical is specific and based on the potential impact on financial operations and stability.
Cloud Service Providers
Not every cloud service provider will automatically be classified as critical. The criticality of a cloud service provider is assessed based on the same criteria mentioned above. For instance:
Objectives
The Swedish implementation of DORA is designed to ensure that financial entities can withstand, respond to, and recover from ICT-related disruptions, thereby enhancing their resilience. It also seeks to establish a unified framework for managing ICT risks across the financial sector, standardising risk management practices. By improving incident response, the regulation ensures that financial entities can respond to ICT incidents in a timely and effective manner, minimising their impact. Additionally, the regulation facilitates supervision by enabling effective oversight by regulatory authorities to ensure compliance and resilience.
Key Obligations
Financial entities are required to implement comprehensive ICT risk management frameworks, which include regular risk assessments and mitigation strategies. They must also manage risks associated with ICT service providers, ensuring that contracts include necessary provisions for resilience and security. Regular testing and monitoring of digital operational resilience are required, including threat-led penetration testing for critical entities. Furthermore, clear governance structures for ICT risk management must be established, with defined roles and responsibilities.
Incident and Reporting Obligations
Financial entities must classify ICT-related incidents based on their impact and severity. Significant incidents must be reported to the Swedish Financial Supervisory Authority within a specified timeframe, typically within 24 to 72 hours, depending on the severity. Reports should include details such as the nature of the incident, its impact, and the measures taken to address it. Entities are also required to conduct a post-incident analysis to identify root causes and implement measures to prevent recurrence. In certain cases, entities may be required to disclose incidents to the public, especially if they have a significant impact on customers or the financial system. It should be noted that entities that carry out operations covered by both DORA and the Protective Security Act must adhere to both in case of incidents, and that the incident reporting under DORA needs to take the obligations under the Protective Security Act into consideration (which may curb the ability of an entity to report certain information under DORA).
Enforcement in Regard to Critical ICT Service Providers
The supervision of critical ICT service providers is to be carried out at Union level by the Lead Overseer. One of the three European Supervisory Authorities (European Banking Authority, European Securities and Markets Authority or European Insurance and Occupational Pensions Authority) is to be designated as Lead Overseer for each of the critical third-party service providers. In order to fulfil its tasks under DORA, the Lead Overseer may, inter alia, conduct general investigations and inspections. Within three months of the conclusion of an investigation or an inspection, the Lead Overseer shall adopt recommendations addressed to the critical third-party provider.
The Lead Overseer can impose a periodic penalty payment on the critical ICT service providers. Decisions on periodic penalty payments taken by the Lead Overseer should therefore be enforceable under the Swedish Enforcement Code (Utsökningsbalken (1981:774)) in the same way as a Swedish judgment that has acquired legal force. The Swedish Enforcement Authority (Kronofogden) is the Swedish authority that will be responsible for the practical enforcement and its decisions can be appealed to the Swedish court.
Enforcement in Regard to Financial Entities
In regard to financial entities, the enforcement of operational resilience obligations is carried out by the Swedish Financial Supervisory Authority. The authority has the power to conduct inspections, request information, and impose sanctions or corrective measures on financial institutions and critical ICT service providers that fail to comply with operational resilience requirements. This includes fines, orders to cease certain activities, or other regulatory actions to ensure compliance.
There is no applicable information in this jurisdiction.
In Sweden, DORA mandates threat-led penetration testing (TLPT) for financial entities. These tests must be conducted every three years, or more frequently if required by the competent authority. The tests simulate cyber-attacks to identify vulnerabilities in an organisation’s ICT infrastructure.
The tests must be executed by an external party every third time, while internal testers can be used but require specific approval and must meet conflict-of-interest requirements. The Swedish authorities, primarily the Swedish Financial Supervisory Authority and the Swedish Central Bank, share responsibilities for the TLPT process. The Swedish Financial Supervisory Authority determines which entities must undergo testing and the frequency of tests, while the Swedish Central Bank co-ordinates and monitors the tests, ensuring compliance and certifying that the tests meet the required standards. After completing the tests, entities must submit results, corrective action plans, and receive certification. This certification facilitates mutual recognition of tests across EU member states.
The EU Cyber Resilience Act
On 10 December 2024, Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements (“Cyber Resilience Act”) entered into force.
Implementation Timeline
Although the Cyber Resilience Act took effect on 10 December 2024, its full implementation is phased across three key dates: The main obligations introduced by the Cyber Resilience Act will apply from 11 December 2027, with the exception of Article 14 which will apply from 11 September 2026 and Chapter IV (Articles 35-51) which will apply from 11 June 2026.
The Inquiry Stage
On 28 November 2024, the Swedish government appointed an inquiry chair who will analyse the need for and propose measures and supplementary legislative provisions necessary to adapt Swedish law to the Cyber Resilience Act.
The work consists, inter alia, of identifying which provisions in Swedish legislation are affected by the Cyber Resilience Act and analysing whether they need to be repealed or amended, or if new provisions are needed as a result of the Cyber Resilience Act.
The investigator will, in particular:
The inquiry chair has to present its proposals in a report no later than 15 December 2025.
Scope of Application
The Cyber Resilience Act applies to “products with digital elements” whose purpose or use involves a logical or physical data connection to a device or network.
The Cyber Resilience Act covers a wide range of software and hardware products that connect, either directly or indirectly, to other devices or networks. This includes smart home devices, wearable technology, internet-connected toys, and industrial Internet of Things (IoT) devices. Non-commercial open-source software products are not covered by the Cyber Resilience Act. The Cyber Resilience Act targets manufacturers, producers, and importers, requiring them to ensure that their products are safe to use, resilient to cyber threats, and that their security features are properly disclosed.
Objectives
The Cyber Resilience Act establishes compulsory cybersecurity standards for products with digital components available in the EU market.
Its primary objectives are to:
The Cybersecurity Act
The Cybersecurity Act entered into force on 27 June 2019. The primary goal of the Cybersecurity Act is to enhance protection against cybersecurity threats across the EU. The Cybersecurity Act also enables manufacturers and service providers to use one mutually recognised certificate throughout the EU.
Main Elements
The regulation has two main functions and purposes:
National Cybersecurity Certification Authority
In Sweden, the Swedish Defence Materiel Administration acts as the national cybersecurity certification authority. It is the cybersecurity and certification department at the Swedish Defence Materiel Administration that is responsible for matters related to cybersecurity certification, supervision, collaboration, and external monitoring. The department consists of the Swedish Certification Body for IT Security and the Swedish Cyber Security Certification Authority.
Furthermore, the Swedish Defence Materiel Administration is tasked with overseeing and co-ordinating certification activities at the national level and collaborating with EU entities such as the EU Agency for Network and Information Security and the European Commission. It also serves as Sweden’s representative in the European Cybersecurity Certification Group.
Additionally, the Swedish Defence Materiel Administration is responsible for notifying the EU about accredited bodies and those authorised under the Cybersecurity Act.
GDPR and Swedish Supplementation
The GDPR aims to protect natural persons when processing personal data. In Sweden, the GDPR is supplemented by the Data Protection Act, which contains supplementary provisions to the GDPR.
Controller Responsibilities and Data Processing Agreements
A legal entity that determines the purposes and means of processing personal data is a controller under the GDPR. While a controller can appoint a processor to process data on its behalf, the ultimate responsibility for compliance remains with the controller. To ensure the processor adheres to GDPR requirements, the parties must enter into a data processing agreement that governs the processing activities and outlines both parties’ obligations and rights.
Protective Measures and Data Subject’s Rights
The GDPR requires controllers to implement appropriate technical and organisational measures to protect the processed personal data from unauthorised access. The appropriate measures should be determined based on the risk of the processing. This may include:
The controller must also inform data subjects about the processing of their personal data and of their rights. The data subject’s rights include:
Data Breach
Entities processing personal data must adhere to the GDPR’s specific provisions regarding personal data breaches. A personal data breach involves a security incident resulting in accidental or unlawful destruction, loss, alteration, unauthorised disclosure of or access to personal data.
If a breach risks individuals’ rights and freedoms, the controller must notify the Swedish Authority for Privacy Protection within 72 hours of awareness.
The notification shall at least include a description of:
If a breach likely poses a high risk to individuals’ rights and freedoms, the data subject should generally be informed. All breaches must be documented by the controller, regardless of risk level.
However, it should be noted that the Data Protection Act stipulates that if an incident that constitutes a personal data breach is to be notified under the Protective Security Act, the notification and information obligations under Articles 33 and 34 of the GDPR shall not be applicable.
The Swedish government has launched an inquiry to evaluate the need for national adjustments in response to the AI Act. The inquiry will recommend necessary legal changes and measures for transparency and oversight, with the final report due by 30 September 2025.
The AI Act, effective from 1 August 2024, establishes a unified framework for AI development and use within the EU. It categorises AI systems based on risk levels, imposing stricter requirements on high-risk applications, such as those in critical infrastructure, healthcare, and law enforcement. For Sweden, this means adapting national regulations to comply with EU standards, ensuring AI systems are human-centred, reliable, and aligned with fundamental rights. This includes mechanisms for oversight and enforcement to maintain high protection levels for health, safety, and fundamental rights.
The AI Act imposes obligations primarily on AI providers, developers, and commercial users to ensure compliance with its standards. Such obligations include:
The Patient Data Act and the Patient Data Regulation
The healthcare sector must systematically address the security of healthcare information management. Cybersecurity in healthcare focuses on safeguarding electronic information and assets against unauthorised access, use, and disclosure.
The Patient Data Act contains explicit provisions to prevent unauthorised dissemination by electronic means of data relating to patients undergoing treatment. It contains the provisions specifically needed for the processing of patient data by healthcare providers in relation to other personal data processing. Otherwise, the provisions of the GDPR apply to the processing of patient data and other personal data by healthcare providers. The Patient Data Act governs several aspects, including:
Norrlandsgatan 21
111 43
Stockholm
Sweden
+46 859 506 000
+46 859 506 001
felicity.trocme@msa.se www.mannheimerswartling.se/Digitalisation and Cyber-Attacks
Sweden is a leading nation in the research and development of new technologies, with digitalisation at the heart of its progress. However, the deteriorating global security landscape has increased the risk of cyber-attacks, which makes highly digitised countries extra vulnerable. Like in many other countries, both public and private entities in Sweden are repeatedly targeted by cyber-attacks from foreign powers (either state actors or threat actors acting with the tacit acceptance from host nations). Consequently, the ability to effectively manage these cyber threats is crucial for Swedish organisations, leading to an increased need for robust protection against such attacks. This has led to an increased need for robust protection against cyber-attacks.
In Sweden, cyber threats manifest themselves in various forms, including intelligence threats from foreign powers and criminal activities targeting companies. These threats often involve tactics such as phishing, password attacks, malware and attacks on mobile devices and email systems. As cyber-attacks continue to evolve and become more sophisticated, it is imperative for every organisation to regularly ensure that its defences remain robust and effective. Protection against cyber-attacks is particularly important for organisations that provide essential societal functions and manage critical IT systems. The direct and indirect costs of cyber-attacks on such operations are estimated to be in the billions of Swedish kronor yearly.
It should be noted that the Swedish regulatory environment concerning cybersecurity has not entirely kept pace with the swift deterioration in the global security landscape, together with the adoption of many EU initiatives. To a certain extent, this has led to a somewhat fragmentized regulatory picture – eg, in relation to supervisory authorities and notification obligations in case of incidents caused by cyber-attacks.
Extended Applicability
In the past, the legal obligations to meet certain cybersecurity requirements have been directed at public authorities, whereas now the regulatory framework will require substantial security measures from a much broader group of organisations, including private companies. In 2019, the applicability of the Protective Security Act (Säkerhetsskyddslagen (2018:585)) was extended from public entities to all types of entities whose operations are of importance to Sweden’s security. Similarly, Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS2) and Directive (EU) 2022/2557 of the European Parliament and of the Council of 14 December 2022 on the resilience of critical entities and repealing Council Directive 2008/114/EC (CER), which will be transposed into Swedish law later this year, will apply to both private and public entities and will require extensive cybersecurity measures to be taken.
Increased Sanctions
With the increased focus on cybersecurity and security measures, one of the tools that legislators are using to enforce the importance of cybersecurity is to increase sanctions. This tool has been used in relation to both NIS2 and CER, where an operator that fails to comply with NIS2 or CER can be fined up to the higher of 2% of its total worldwide annual turnover in the preceding financial year or EUR10,000,000.
In order to create a common basis and applicability, the Swedish government’s official report on the transposition of CER into Swedish law, SOU 2024:64, proposes that a failure to comply with the Protective Security Act is prohibited in a similar manner, and the proposal is to increase the sanction to the greater of SEK120,000,000 (approximately EUR12,000,000) or 2% of the operator’s total annual global turnover from the previous financial year.
National Cybersecurity Centre
Due to the increased focus on cybersecurity in Sweden, the Swedish Armed Forces, the National Defence Radio Establishment, the Swedish Civil Contingencies Agency and the Swedish Security Service, launched the National Cybersecurity Centre in December 2020 with the mission to strengthen Sweden’s overall ability to prevent, detect and manage cyber threats. From November 2024, the National Cybersecurity Centre is part of the National Defence Radio Establishment, which coincides with the government raising its ambitions for the centre.
The NCSC is responsible for strengthening Sweden’s cybersecurity and is now expected to expand its responsibilities. These new responsibilities include acting as a central body to co-ordinate and support national cybersecurity efforts. This involves monitoring and analysing cyber threats, providing advice and support to both public and private organisations, and promoting information sharing and collaboration among various cybersecurity stakeholders. The NCSC will also improve the ability to analyse and assess cyberthreats, vulnerabilities and other risks regarding information- and cybersecurity.
Common Level of Security Measures Within the Union
Sweden is not the only EU member state that has an increased focus on cybersecurity. The EU is adopting several robust regulatory frameworks that require comprehensive security measures, some of which are expected to be transposed to binding Swedish law during 2025 and some of which Swedish entities should monitor during the year.
NIS2
The NIS2 directive was adopted by the EU in December 2022, repealing and replacing Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union.
The directive aims to harmonise and strengthen cybersecurity in the Union. It sets out requirements for technical, operational and organisational measures to manage risks that threaten the security of network and information systems. These measures should include risk analysis, business continuity measures, supply chain security measures and personnel security measures. The measures should be based on an overall risk perspective and risk analysis and be proportionate to the risk. They should be evaluated and include specific elements, including supply chain security. Supply chain security covers security aspects relating to the links between each operator and its direct suppliers or service providers. This means that each operator must take risk management measures in relation to its suppliers and is therefore responsible for its direct suppliers.
In addition, NIS2 requires policies and procedures to assess the effectiveness of cybersecurity risk management measures and to address any deficiencies. NIS2 also requires senior management to monitor the implementation of risk management measures.
In the event of an incident that has a significant impact on an entity’s ability to provide its services, the directive requires the entity to notify the competent authority of the incident. If deemed appropriate, service recipients should also be informed of the incident. An incident is considered significant if it causes, or has the potential to cause, severe operational disruption to services, results in financial losses for the entity, or has, or could have, an impact on other natural or legal persons by causing considerable damage.
As proposed in the Swedish government’s official report 2024:18, NIS2 will be implemented in Sweden through the Swedish Cybersecurity Act (cybersäkerhetslagen) (the “Swedish Cybersecurity Act”) and the Swedish Cybersecurity Regulation (förordning om cybersäkerhet), which will replace the current Act on Information Security for Critical and Digital Services (lag (2018:1174) om informationssäkerhet för samhällsviktiga och digitala tjänster) and the Regulation on Information Security for Critical and Digital Services (förordning (2018:1175) om informationssäkerhet för samhällsviktiga och digitala tjänster). The government has not yet proposed a bill, but it is expected to do so in the spring of 2025. As NIS2 should have been implemented in the member states by 18 October 2024, and Sweden is already behind, it is expected that the time between the bill being passed and it coming into force will be short.
Once the Act comes into force, clarifying regulations will be issued by the designated authorities and only then will the detailed requirements for affected entities be clear. It has not yet been decided which authorities will be responsible for the regulations.
CER
To enhance the EU’s resilience in critical infrastructure, the EU has adopted a directive aimed at ensuring that essential services can effectively prevent, withstand, and manage disruptions or interruptions in their operations. The CER is proposed to be transposed in Sweden through the Critical Operators Resilience Act (lag om motståndskraft hos kritiska verksamhetsutövare) and the Critical Operators Resilience Regulation (förordning om motståndskraft hos kritiska verksamhetsutövare) as described in the Swedish government’s official report 2024:64. The government has not yet proposed a bill, but it is expected to do so in the spring of 2025.
Once transposed, there will be an increase in cybersecurity requirements, and other related measures, for critical entities in Sweden as the Directive replaces the previous Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection, which was more limited in scope.
The CER applies to critical entities providing services in the following sectors:
Each EU member state must list all essential services within each sector and conduct a risk assessment based on the list. Following the risk assessment, each EU member state will determine which entities are considered critical entities within each sector.
For an entity to be considered a critical entity in Sweden, the following is required:
Once identified, a critical entity must perform a critical entity risk assessment. The assessment aims to identify any relevant risks associated with the delivery of the essential service and consider interdependencies with other sectors covered by the law. Based on the risk assessment, the critical entities must implement appropriate and proportionate technical, security and organisational measures to ensure resilience. These measures include preventing incidents, ensuring physical protection, mitigating the consequences of incidents, and recovering from them. Further, a critical entity must also report incidents that have or may have significant disruption to the competent authority without undue delay.
CRA Act
The Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (Cyber Resilience Act) (CRA) was adopted in the EU on 10 December 2024 and will enter into full force on 11 December 2027. However, certain parts of the CRA will enter into force during 2026.
The objective of the CRA is to strengthen EU cybersecurity and ensure cyber resilience by establishing a legal framework for essential cybersecurity requirements for digital elements in the EU. This will be implemented through restrictions on the development of secure products with digital elements to ensure that products in the EU are less vulnerable and more secure throughout their life cycle. The CRA also aims to improve transparency regarding the support period for products.
The CRA does not require transposition into Swedish law and will be directly applicable in Sweden when it enters into force, but additional provisions and adjustments to existing provisions may be necessary. These possible provisional additions and adjustments are currently being examined.
AI Act
As Europe becomes more digitised, the use of artificial intelligence is becoming more widespread. As a result, the EU has adopted Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300/2008, (EU) No 167/2013, (EU) No 168/2013, (EU) 2018/858, (EU) 2018/1139 and (EU) 2019/2144 and Directives 2014/90/EU, (EU) 2016/797 and (EU) 2020/1828 (“AI Act”).
The AI Act entered into force on 1 August 2024 and will be fully applicable two years later, on 2 August 2026, with certain exceptions including prohibitions and obligations relating to AI competencies that entered into force on 2 February 2025 and governance rules and obligations for general-purpose AI models that will apply from 2 August 2025.
The AI Act aims to create a coherent framework for the development and use of AI systems across the Union. It promotes human-centred and trustworthy AI while ensuring a high level of protection for health, safety and fundamental rights. The AI Act prohibits certain uses of AI, while other uses are restricted depending on the risk level of the AI application. If an AI system is classified as high risk, it must have an appropriate level of accuracy, robustness and cybersecurity.
The AI Act constitutes Swedish law but requires complementary national provisions. These complementary provisions are currently under review and are expected to include proposed provisions for the following:
Norrlandsgatan 21
111 43
Stockholm
Sweden
+46 859 506 000
+46 859 506 001
felicity.trocme@msa.se www.mannheimerswartling.se/