Teksta versija
LEGAL ACTS OF THE REPUBLIC OF LATVIA
home
 

The Saeima1 has adopted and
the President has proclaimed the following law:

National Cybersecurity Law

Chapter I
General Provisions

Section 1. Terms Used in the Law

The following terms are used in the Law:

1) maintainer of the top-level domain name registry - the authority to which a specific top-level domain has been delegated and which is responsible for the management of such top-level domain, including the registration of domain names in such top-level domain and the technical operation of the top-level domain, and also the operation of its name servers, the maintenance of databases, and the distribution of top-level domain zone files between name servers, regardless of whether any of such activities are performed by the authority itself, except for the use of top-level domain names solely for its own purposes, or by an outsourcing service provider;

2) data centre - a premise or a group of premises dedicated to the centralised deployment, interconnection, and operation of information technology and network equipment and providing data storage, processing, and forwarding (transport) services and also all the equipment and infrastructure necessary for the distribution of electricity and climate control;

3) domain name registration service provider - a registrar or an authorised person acting on behalf of the registrar, for example, a privacy or proxy registration service provider or reseller;

4) domain name system - a hierarchical distributed naming system which enables the identification of internet services and resources, allowing end-user devices to use internet routing and connectivity services to reach the respective services and resources;

5) near miss - an event that could have compromised the availability, authenticity, integrity, or confidentiality of processed data or of the services offered by, or accessible via, network and information systems, but that was successfully prevented from materialising or that did not materialise;

6) vulnerability - a weakness, susceptibility to technical problems, or flaw of information and communication technologies or their services which can be exploited by a cyber threat;

7) information and communication technologies - technologies which electronically process information, including create, modify, delete, store, display, forward, or transmit it (hereinafter - the electronic processing), for the fulfilment of their intended tasks with the help of technical aids and ensure communication between technology users;

8) internet exchange point - a network facility which enables the interconnection of more than two independent networks (autonomous systems), primarily for the purpose of facilitating the exchange of internet traffic, which provides interconnection only for autonomous systems and which neither requires the internet traffic passing between any pair of participating autonomous systems to pass through any third autonomous system nor alters or otherwise interferes with such traffic;

9) cyber threat - any potential circumstance, event, or action corresponding to the definition laid down in Article 2(8) of Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (hereinafter - Regulation 2019/881);

10) cybersecurity - activities corresponding to the definition laid down in Article 2(1) of Regulation 2019/881;

11) cybersecurity incident (hereinafter - the cyber incident) - an event compromising the availability, authenticity, integrity, or confidentiality of processed data or of the services offered by, or accessible via, network and information systems;

12) cyber hygiene - an aggregate of everyday practices and habits for the purpose of minimising cyber threats, ensuring data protection, and retaining the availability, integrity, and confidentiality of information and communication technologies;

13) cyber incident handling - any actions and procedures aiming to prevent, detect, analyse, and contain or to respond to and recover from a cyber incident;

14) cyber risk - the potential for loss or disruption of services caused by the cyber incident which is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident;

15) cyberattack - an active act by an attacker for the purpose of disrupting the confidentiality, integrity, or availability of data and services of information and communication technologies;

16) large performer of economic activity - a legal or natural person, or an association of such persons which or who performs economic activity in the Republic of Latvia and conforms to at least one of the following features:

a) the performer of economic activity employs at least 250 employees;

b) the total net turnover of the last financial year of the performer of economic activity exceeds EUR 50 million and the annual balance sheet total exceeds EUR 43 million;

17) National Cybersecurity Strategy - a strategic planning document which lays down the basic principles for the making of cybersecurity policy, the objective and strategic priorities thereof;

18) significant cyber threat - a cyber threat which, taking into account its technical properties, may seriously disrupt the network and information systems of any legal or natural person or recipients of the services provided by such person, causing considerable material or non-material damage;

19) significant cyber incident - a cross-border cyber incident or such cyber incident which has an impact on the continuity of the service provided or on public interests and which meets the criteria determined by the Cabinet;

20) denial of service cyberattack - an attack made against the infrastructure of the service provider for the purpose of disrupting the availability of the service;

21) cross-border cyber incident - an incident causing a level of disruption which exceeds the capacity of a Member State to respond or which has an essential impact on at least two Member States;

22) network and information system:

a) an electronic communications network;

b) any device or a group of interconnected or related devices one or more of which, according to a programme, carry out automatic processing of digital data;

c) digital data stored, processed, retrieved, or transmitted by elements covered under Sub-clauses "a" and "b" of this Clause for the purposes of their operation, use, protection, and maintenance;

23) security of network and information systems - the ability of network and information systems to resist, at a given level of confidence, any event that may compromise the confidentiality, integrity, and availability of the data to be processed electronically or of the services offered by, or accessible via, such network and information systems;

24) trust service - an electronic service within the meaning of Article 3(16) of Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC;

25) medium performer of economic activity - a legal or natural person, or an association of such persons, which or who performs economic activity in the Republic of Latvia and conforms to all of the following features:

1) the performer of economic activity employs at least 249 employees;

2) the total net turnover of the last financial year of the performer of economic activity is at least EUR 10 million, but does not exceed EUR 50 million, or the annual balance sheet total thereof is at least EUR 10 million, but does not exceed EUR 43 million;

26) unified national internet exchange point - a constant aggregate of physical infrastructure and services which is established and maintained in order to ensure unified national internet exchange.

Section 2. Purpose of the Law

The purpose of the Law is:

1) to improve the security of information and communication technologies, including by laying down requirements for the provision and receipt of essential services and important services, and also for the operation of information and communication technologies;

2) to determine the procedures for ensuring cybersecurity, providing for the division of responsibility and the competence of the National Cybersecurity Centre, frameworks of cooperation, and tasks for the promotion of cybersecurity;

3) to promote the implementation of cybersecurity measures so that a cyber threat could be anticipated, prevented and also overcome and its consequences could be liquidated in a timely manner, ensuring, as far as possible, the continuity of the confidentiality, integrity, and availability of services.

Section 3. Scope of Application of the Law

(1) The Law shall apply to:

1) the providers of essential services, the providers of important services, and the owners and legal possessors of the critical infrastructure of information and communication technologies (hereinafter all together - the subjects);

2) the institutions of direct and indirect administration, derived public entities, and other State authorities and also legal persons governed by private law which are fulfilling a task delegated by the public administration (hereinafter all together - the State and local government authorities), except for State security institutions;

3) legal persons governed by private law;

4) in the cases specified in this Law - to natural persons who participate in the process of coordinated vulnerability discovery.

(2) The Law shall not apply to the content of the information to be transmitted in electronic communications networks, including to the content of services of an information society and audiovisual works if they are not used as a component of cyber incidents.

(3) The Law shall apply to such financial entities within the meaning of Article 2(2) of Regulation (EU) 2022/2554 of the European Parliament and of the Council of 14 December 2022 on digital operational resilience for the financial sector and amending Regulations (EC) No 1060/2009, (EU) No 648/2012, (EU) No 600/2014, (EU) No 909/2014 and (EU) 2016/1011 (hereinafter - Regulation 2022/2554) which, in accordance with Section 20 of this Law, are the providers of essential services insofar as Regulation 2022/2554 or other legal acts do not provide for other requirements in matters of cybersecurity requirements for financial entities, cyber threat and risk management (including the management of risks of third-party service providers), operational resilience and continuity, determination of the persons responsible for cybersecurity management, testing, action to be taken in case of a cyber incident, incident reports, and supervision of subjects.

(4) If the legal acts of the European Union governing the specific sector provide for the providers of essential services or important services the obligation to take cybersecurity risk management measures or report on cyber incidents and if, in terms of impact, such requirements are at least equal to the obligations specified in this Law, the relevant provisions of this Law, including for the supervision of subjects, shall not be applied to these subjects. If the legal acts of the European Union governing the specific sector do not apply to all providers of essential services and important services in a specific sector, the application of the relevant requirements of this Law shall be continued in relation to the providers of essential services and important services to which the abovementioned legal acts of the European Union do not apply.

(5) The requirements referred to in Paragraph four of this Section shall be considered as equivalent in terms of impact to the measures specified in this Law if they conform to at least one of the following features:

1) in terms of impact, the cybersecurity risk management measures are at least equivalent to the requirements laid down in Sections 26, 27, and 28 of this Law;

2) the legal act of the European Union governing the specific sector provides for immediate and, in the relevant case, automatic and direct access for the computer security incident response teams specified in Section 9 of this Law, the competent authorities specified in Section 13 of this Law, and the national competent authority specified in Section 4, Paragraph one of this Law to reports on cyber incidents and, in terms of impact, the requirements for reporting on cyber incidents are at least equivalent to the requirements laid down in Section 34 of this Law.

(6) The Law does not apply to such providers of essential services and important services which conform to all of the following conditions:

1) the service provider is registered in a European Union Member State;

2) the service provider provides in the Republic of Latvia the essential services referred to in Section 20, Clauses 1, 2 and Clause 8, Sub-clauses "s", "t", "u", and "v" of this Law or the essential services referred to in Section 21, Paragraph one, Clause 2, Sub-clauses "l", "m", and "n" of this Law;

3) the service provider does not provide in the Republic of Latvia the essential services or important services that have not been specified in Clause 2 of this Paragraph;

4) the service provider is not the owner or lawful possessor of the critical infrastructure of information and communication technologies;

5) the principal place of establishment of the service provider in the European Union is not the Republic of Latvia.

(7) The Law does not apply to such providers of essential services and important services which are not established in the European Union and the principal place of establishment of the representative whereof in the European Union is not the Republic of Latvia.

(8) Within the meaning of this Law, the principal place of establishment shall be:

1) the European Union Member State in which the decisions in relation to the cybersecurity risk management measures of the service provider are primarily taken;

2) if the country referred to in Clause 1 of this Paragraph cannot be determined - the European Union Member State in which cybersecurity operations are carried out in relation to the service provider;

3) if the country referred to in Clause 2 of this Paragraph cannot be determined - the European Union Member State in which the respective service provider has the highest number of employees within the European Union.

(9) Paragraph eight of this Section does not apply to the cases where the National Cybersecurity Centre, upon request of the competent authority of another European Union Member State, implements the supervision and enforcement measures provided for in this Law in respect of a provider of essential services established in the respective European Union Member State which provides services in the Republic of Latvia or has a network or information system that is located in the Republic of Latvia under its possession.

(10) The Law does not apply to electronic communications merchants which do not provide an electronic communications network and electronic communications services in the Republic of Latvia.

(11) The Law does not apply to such providers of essential services and important services which are public authorities of another European Union Member State.

Chapter II
Authorities Responsible for Cybersecurity

Section 4. National Cybersecurity Centre

The National Cybersecurity Centre is the national competent authority which operates within the Ministry of Defence as the single point of contact in cybersecurity matters and implements national cybersecurity supervision, forms initiatives of the national cybersecurity action policy, and, within the limits of the competence thereof, forms and implements international cooperation.

Section 5. Tasks of the National Cybersecurity Centre

(1) The National Cybersecurity Centre shall have the following tasks:

1) to coordinate cooperation in cybersecurity matters with the competent authorities and single points of contact of other European Union Member States, the European Commission, the European Union Agency for Cybersecurity, and other competent authorities of the European Union;

2) to cooperate with the providers of essential services and important services for the determination of the security level of their information systems;

3) to implement supervisory functions, including to supervise how the providers of essential services and important services are fulfilling their obligations specified in this Law;

4) to assess the conformity of the cyber risk management measures of the providers of essential services and important services with the requirements laid down in the laws and regulations;

5) to supervise the compliance with the security requirements for public electronic communications networks;

6) to maintain the list of the providers of essential services and important services compiled by State institutions and self-identified, to ensure the approval thereof by the Supervisory Committee of Digital Security and also to provide compiled and, if necessary, anonymised information to the competent authorities of the European Union on the identified providers of essential services and important services;

7) to ensure the functions of the National Cybersecurity Council and the Supervisory Committee of Digital Security;

8) to assess the conformity of the development projects of State information systems and information systems of authorities with the minimum cybersecurity requirements in conformity with the Law on State Information Systems;

9) to ensure the operation of the unified national internet exchange point and also to coordinate the receipt of services of the unified national internet exchange point in cooperation with State security institutions;

10) in cooperation with State administration institutions, State security institutions, and representatives of the private sector, to develop the National Cybersecurity Strategy and, not later than three months after approval of the National Cybersecurity Strategy, to inform the European Commission thereof;

11) to ensure the development of the National Plan for Cyber Incident Crisis Management and to integrate it in national defence plans, to participate in the European Cyber Crises Liaison Organisation Network;

12) to cooperate with the European Union Agency for Cybersecurity and to inform it, without delay, of cross-border cyber incidents which affect the providers of essential services or important services, and also to provide a report thereto, once in three months, on all significant cyber incidents which have occurred, cyber incidents, near misses, and cyber threats of which the subjects have notified;

13) to cooperate with the competent authorities of other European Union Member States, including to send them the information received on significant cyber incidents affecting these European Union Member States upon request of the computer security incident response team;

14) to coordinate the cross-border cyber incident handling in cooperation with the computer security incident response teams, the European Union, foreign, and international competent authorities;

15) to cooperate with the Network and Information Systems Cooperation Group of the European Union (hereinafter - the NIS Cooperation Group) and to implement the related tasks;

16) to exercise the rights and obligations specified for the National Coordination Centre in Regulation (EU) 2021/887 of the European Parliament and of the Council of 20 May 2021 establishing the European Cybersecurity Industrial, Technology and Research Competence Centre and the Network of National Coordination Centres;

17) to maintain a unified depiction of the activities occurring in the cyberspace of Latvia, except for the content of the information transmitted therein;

18) to inform the public of current cyber threats;

19) to ensure the operation of security operations centres in the data centres conforming to the requirements stipulated by the Cabinet;

20) to participate in coordinated vulnerability discovery and prevention within the limits of its competence;

21) if necessary, to inform the European Union Agency for Cybersecurity of the information to be included in the database of vulnerabilities;

22) in cases when vulnerability also affects another European Union Member State, to cooperate with the competent authorities of this Member State;

23) if necessary, to participate in assessments of the cybersecurity capacity and action policy of the European Union Member States in the status of an independent expert.

(2) The National Cybersecurity Centre shall implement the tasks referred to in Paragraph one, Clauses 2, 3, and 4 of this Section only in relation to those providers of essential services and important services which are not owners or legal possessors of the critical infrastructure of information and communication technologies.

(3) The Ministry of Defence shall delegate the fulfilment of the tasks of the National Cybersecurity Centre referred to in Paragraph one, Clauses 17, 18, 19, 20, 21, 22, and 23 of this Section to the Institute of Mathematics and Computer Science of the University of Latvia, entering into a delegation contract.

Section 6. Rights of the National Cybersecurity Centre

The National Cybersecurity Centre shall have the following rights:

1) to request and receive information from the providers of essential services and important services on the information and communication technologies in their ownership and possession, on the cybersecurity and cyber risk management measures implemented and planned thereby and also on cyber incidents, near misses, cyber threats, and vulnerabilities;

2) to request and receive from the State and local government authorities information which is at their disposal on the providers of essential services and important services;

3) to provide instructions to ensure the fulfilment of the obligations specified in this Law for the providers of essential services and important services;

4) to take the decisions (also to issue an administrative act) necessary to ensure the fulfilment of the obligations specified in this Law or to prevent threat to national security or cyber threat;

5) to impose a fine and to perform the compulsory enforcement of a legal obligation;

6) to request and receive from the operators of data centres information on the fulfilment of the obligations imposed thereon.

Section 7. Tasks of the Constitution Protection Bureau

The Constitution Protection Bureau shall have the following tasks:

1) to implement supervisory functions, including to supervise how the owners and legal possessors of the critical infrastructure of information and communication technologies are fulfilling the obligations imposed thereon by this Law;

2) to cooperate with the owners and legal possessors of the critical infrastructure of information and communication technologies for the determination of the security level of their information systems;

3) to coordinate the cross-border cyber incident handling in cooperation with computer security incident response teams;

4) to assess the conformity of the cyber risk management measures to be implemented by the owners and legal possessors of the critical infrastructure of information and communication technologies with the requirements laid down in legal acts.

Section 8. Rights of the Constitution Protection Bureau

The Constitution Protection Bureau shall have the following rights:

1) to request and receive from the owners and legal possessors of the critical infrastructure of information and communication technologies information on the information and communication technologies in their ownership and possession, the cybersecurity and cyber risk management measures implemented and planned thereby, and also cyber incidents, near misses, cyber threats, and vulnerabilities;

2) to provide instructions to ensure the fulfilment of the obligations specified in this Law for the owners and legal possessors of the critical infrastructure of information and communication technologies or to prevent threat to national security;

3) to take the decisions (also to issue an administrative act) necessary to ensure the fulfilment of the obligations specified in this Law or to prevent threat to national security or cyber threat;

4) to impose a fine and to perform the compulsory enforcement of a legal obligation.

Section 9. Computer Security Incident Response Teams

(1) Computer security incident response teams are authorities which provide support to the State and local government authorities in the field of cybersecurity, maintain and update information on cyber threats, and provide support to natural and legal persons in the prevention of cyber incidents.

(2) The tasks of computer security incident response teams shall be performed by:

1) the Defence Intelligence and Security Service with regard to the Ministry of Defence, the institutions subordinate thereto, and the National Armed Forces;

2) the Institute of Mathematics and Computer Science of the University of Latvia with regard to the State and local government authorities (except for State security institutions and the authorities specified in Clause 1 of this Paragraph) and also legal persons governed by private law.

(3) The Institute of Mathematics and Computer Science of the University of Latvia shall perform the tasks assigned thereto and exercise the rights in accordance with this Law under functional subordination of the Minister for Defence which is implemented in the form of control.

(4) The Cabinet shall determine the requirements for computer security incident response teams.

Section 10. Tasks of Computer Security Incident Response Teams

Computer security incident response teams shall have the following tasks:

1) to conduct analysis at the State level of significant cyber threats, vulnerabilities, and cyber incidents;

2) to respond to cyber incidents, upon request of the subject to provide support in cyber incident handling or to coordinate the prevention of a cyber incident;

3) to warn and provide the National Cybersecurity Centre, the Constitution Protection Bureau, the subjects, and, if necessary, other institutions with the information on current significant cyber incidents, cyber incidents, near misses, cyber threats, and vulnerabilities;

4) to organise educational measures, perform analytical and research work, and organise thematic trainings in the field of cybersecurity;

5) to provide support to State authorities in the protection of State security and also detection (investigation) of criminal offences and other violations of the law in the field of information and communication technologies;

6) to cooperate with the competent authorities and computer security incident response teams of the European Union, foreign and international organisations, to participate in the network of computer security incident response teams of the European Union Member States (hereinafter - the CSIRT network);

7) to inform without delay the National Cybersecurity Centre and State security institutions of the significant cyber incident and also to inform the competent authority of another European Union Member State of the significant cyber incident which disrupts the continuity of operation of an essential service or important service in the particular Member State;

8) to inform the National Cybersecurity Centre and the Constitution Protection Bureau of the detected non-conformity of information and communication technologies of the subject with the laws and regulations laying down the cybersecurity requirements and also of the detected cases when the subject has not reported on a cyber incident;

9) within the limits of its competence, to cooperate with the State and private sector authorities in order to facilitate cybersecurity and cyber resilience, and also to cooperate and exchange the relevant information on current cyber threats with the communities of the subjects;

10) upon request of the subject, to perform proactive scanning of the networks and information systems of the subject to detect vulnerabilities with potentially essential impact;

11) to fulfil other obligations imposed thereon by the legal acts.

Section 11. Rights of Computer Security Incident Response Teams

(1) Computer security incident response teams shall have the following rights:

1) to request and receive the following from the subjects, the State and local government authorities, and legal persons governed by private law:

a) information on the introduced security requirements of information and communication technologies (including networks and information systems), the identified vulnerabilities and cyber threats;

b) technical information on a cyber incident that has occurred or is occurring (information on the scope of the cyber incident, malicious software files that have caused the cyber incident, description of vulnerabilities, technical measures taken for the prevention of the cyber incident, information on activities performed by persons doing harm or other technical information, including IP addresses);

2) upon mutual agreement, to obtain from the subjects, the State and local government authorities, and legal persons governed by private law online data flow for the identification and prevention of a cyber threat;

3) to perform inspections in the infrastructure of information and communication technologies of the providers of essential services and important services, except for the critical infrastructure of information and communication technologies;

4) upon request of the Constitution Protection Bureau, to perform inspections in the critical infrastructure of information and communication technologies;

5) to request that the National Cybersecurity Centre sends information to the competent authority of a European Union Member State, the NIS Cooperation Group, the CSIRT network, or the European Union Agency for Cybersecurity on a cyber incident which has an impact on the provision of essential services or important services in the particular Member State;

6) to carry out proactive target system and network non-intrusive scanning of publicly available networks and information systems in order to detect vulnerabilities or insecure configurations and to inform the relevant subjects thereof.

(2) The computer security incident response team shall carry out the scanning referred to in Paragraph one, Clause 6 of this Section in a way as not to disrupt the continuity of the service provision of the relevant subject. Scanning in the critical infrastructure of information and communication technologies shall be carried out upon agreement with the Constitution Protection Bureau.

Section 12. Decisions and Requests Issued by the National Cybersecurity Centre and the Constitution Protection Bureau and Legal Obligations Imposed Thereby

(1) If the addressee of the decision, request, or legal obligation is a legal person governed by private law, the decision, request, or the legal obligation accordingly issued or imposed by the National Cybersecurity Centre and the Constitution Protection Bureau is an administrative act.

(2) If the addressee of the decision, request, or legal obligation is an institution of direct or indirect administration, another State authority, or a derived public entity, the decision, request, or the legal obligation accordingly issued or imposed by the National Cybersecurity Centre and the Constitution Protection Bureau is not an administrative act.

(3) The Cabinet shall determine the procedures for reporting on the institutions of direct or indirect administration, other State authorities, and derived public entities that fail to comply with the decisions, requests, or the imposed legal obligations referred to in this Law.

(4) The decision, request, and legal obligation referred to in Paragraph two of this Section shall be accordingly issued or imposed in writing and shall include the following information:

1) the name and address of the institution;

2) the addressee;

3) the determination of facts;

4) the justification for the decision, request, or legal obligation;

5) a separate listing of the legal norms applied (indicating also Section of the regulatory enactment, its Paragraph, Clause, or Sub-clause);

6) the rights granted to the addressee and the rights rejected;

7) the conditions (if necessary);

8) the procedures for contesting the decision, request, or legal obligation.

(5) The decision, request, and legal obligation referred to in Paragraphs one and two of this Section may be contested as follows:

1) the decision, request, or the legal obligation accordingly issued or imposed by the National Cybersecurity Centre in respect of the providers of essential services and important services - by submitting a relevant submission to the Minister for Defence. The decision of the Minister for Defence on the contested decision, request, or legal obligation referred to in Paragraph one of this Section may be appealed in accordance with the procedures laid down in the Administrative Procedure Law. The decision of the Minister for Defence on the contested decision, request, or legal obligation referred to in Paragraph two of this Section shall not be subject to appeal;

2) the decision, request, or the legal obligation accordingly issued or imposed by the Constitution Protection Bureau in respect of critical infrastructure of information and communication technologies - by submitting a relevant submission to the Director of the Constitution Protection Bureau. The decision of the Director of the Constitution Protection Bureau on the contested decision, request, or legal obligation referred to in Paragraph one of this Section may be appealed in accordance with the procedures laid down in the Administrative Procedure Law. The decision of the Director of the Constitution Protection Bureau on the contested decision, request, or legal obligation referred to in Paragraph two of this Section shall not be subject to appeal.

Section 13. Cooperation of the Competent Authorities

(1) The National Cybersecurity Centre, the Constitution Protection Bureau, and computer security incident response teams shall, as necessary, but not less than once in a quarter, mutually exchange information on topicalities in the field of cyber incidents.

(2) The National Cybersecurity Centre and the Constitution Protection Bureau shall, as necessary, but not less than once in a quarter, mutually exchange information on topicalities in supervision of the subjects, including on the identification of the subjects, cyber risks, cyber threats, cyber incidents, near misses, and also security risks, threats, and incidents not related to cybersecurity which affect the subjects unless exchange of such information is in contradiction with the interests of national security.

(3) The National Cybersecurity Centre, the Constitution Protection Bureau, and computer security incident response teams shall, regularly but not less than twice in a year, exchange information on the current cyber incidents and cyber threats with the following authorities, unless exchange of such information is in contradiction with the interests of national security:

1) Latvijas Banka - in matters related to cybersecurity of the financial entities referred to in Article 2 of Regulation 2022/2554, including the provision of such information to Latvijas Banka which is at the disposal thereof in relation to the detected cyber incidents in the information and communication technology infrastructure of the subjects referred to in Section 20, Clause 8, Sub-clause "k" of this Law, and also exchange of information on cyber incidents, current or potential cyber threats that may affect the performance of tasks of Latvijas Banka laid down in the legal acts of the European Union and the laws and regulations of Latvia;

2) the Public Utilities Commission - in matters affecting cybersecurity of electronic communications merchants, including provide information at the disposal thereof to the Public Utilities Commission which is necessary thereto for the implementation of the functions specified in the Electronic Communications Law;

3) the Civil Aviation Agency as the responsible institution in the field of civil aviation security which implements the supervisory functions thereof referred to in Article 9 in Regulation (EC) No 300/2008 of the European Parliament and of the Council of 11 March 2008 on common rules in the field of civil aviation security and repealing Regulation (EC) No 2320/2002 and Regulation (EU) 2018/1139 of the European Parliament and of the Council of 4 July 2018 on common rules in the field of civil aviation and establishing a European Union Aviation Safety Agency, and amending Regulations (EC) No 2111/2005, (EC) No 1008/2008, (EU) No 996/2010, (EU) No 376/2014 and Directives 2014/30/EU and 2014/53/EU of the European Parliament and of the Council, and repealing Regulations (EC) No 552/2004 and (EC) No 216/2008 of the European Parliament and of the Council and Council Regulation (EEC) No 3922/91;

4) the State limited liability company Latvian Maritime Administration - in matters related to the implementation and supervision of security requirements for ships, shipping companies, ports, and port facilities;

5) the State Data Inspectorate - in matters related to personal data protection, including provide information at the disposal thereof to the State Data Inspectorate on violations of personal data protection;

6) the Supervisory Committee of Digital Security - in matters related to electronic identification service providers and the services provided thereby, trusted certification service providers and the services provided thereby, online signature collection systems, and the providers of essential services and important services;

7) the competent authorities of the police, the Office of the Prosecutor, the court, and other competent authorities - in matters related to the prevention, detection, and investigation of criminal offences. If a computer security incident response team detects that a cyber incident, near miss, cyber threat, or vulnerability prima facie displays the signs of a criminal offence, the computer security incident response team shall, without delay, inform the competent authority thereof, providing thereto the information at the disposal thereof which is necessary for the performance of procedural activities;

8) State security institutions - in matters related to national security, including provide information at the disposal thereof to the competent State security institutions on cyber incidents, near misses, cyber threats, and vulnerabilities which endanger or may endanger national security.

(4) The Institute of Mathematics and Computer Science of the University of Latvia shall provide the Defence Intelligence and Security Service with the information at its disposal on cyber incidents in the Ministry of Defence, the institutions subordinate thereto, and the National Armed Forces.

(5) The Defence Intelligence and Security Service shall provide information to the Institute of Mathematics and Computer Science of the University of Latvia which is necessary for the performance of the tasks specified in Section 10, Clause 5 of this Law and also other information at its disposal on cyber incidents within the competence of the Institute of Mathematics and Computer Science of the University of Latvia.

(6) If the matters referred to in Paragraph three, Clause 1 of this Section are related to the information and communication technology infrastructure maintained by the Eurosystem, Latvijas Banka shall forward the information provided by the competent authority to the European Central Bank.

Section 14. Cooperation of the Competent Authorities with the Competent Authorities of Other European Union Member States

(1) If a provider of essential services or a provider of important services provides services in more than one European Union Member State or provides services in one or more European Union Member States and its network and information systems are located in one or several other European Union Member States, the National Cybersecurity Centre, the Constitution Protection Bureau, and computer security incident response teams shall, if necessary, cooperate with the competent authorities of other European Union Member States:

1) inform the competent authorities of other relevant European Union Member States through the National Cybersecurity Centre and exchange information on the supervision and enforcement measures taken;

2) if necessary, send a request for information or request the competent authority of another European Union Member State to take supervision and enforcement measures;

3) upon receipt of a justified request for mutual assistance from the competent authority of another European Union Member State, provide assistance to the respective competent authority to ensure that supervision or enforcement measures are taken effectively and consistently.

(2) The mutual assistance referred to in Paragraph one, Clause 3 of this Section may include requests for information and supervision measures, including requests for on-site checks, remote monitoring, or targeted security audits.

(3) The National Cybersecurity Centre, the Constitution Protection Bureau, and computer security incident response teams shall ensure the implementation of the request for mutual assistance, unless it is established that they are not competent to provide the requested assistance, the requested assistance is not proportionate to the supervisory tasks of the competent authorities, or the received request for mutual assistance is in contradiction with the interests of national security.

(4) Prior to rejecting a received request for mutual assistance, the National Cybersecurity Centre, the Constitution Protection Bureau, and computer security incident response teams shall consult with each other. If requested by a European Union Member State, the abovementioned competent authorities shall consult the European Commission and the European Union Agency for Cybersecurity before refusing a request for mutual assistance.

(5) The National Cybersecurity Centre, the Constitution Protection Bureau, and computer security incident response teams may, by common agreement with the competent authority of another European Union Member State, carry out joint supervision of subjects.

Section 15. Cooperation with the Authorities Responsible for Cybersecurity

The subjects, the State and local government authorities, and legal persons governed by private law have the obligation to cooperate with the National Cybersecurity Centre, the Constitution Protection Bureau, and computer security incident response teams, providing them with the necessary information and meeting the lawful requirements thereof.

Section 16. National Cybersecurity Council

(1) The National Cybersecurity Council is a collegial authority which coordinates the development of the policy related to cybersecurity and also the planning and implementation of relevant tasks and measures.

(2) The composition of the National Cybersecurity Council shall be determined by the Prime Minister.

Section 17. Supervisory Committee of Digital Security

(1) The Supervisory Committee of Digital Security is a collegial supervisory authority under subordination of the Minister for Defence.

(2) The by-laws of the Supervisory Committee of Digital Security shall be approved by the Cabinet.

(3) Computer security incident response teams shall, according to the competence thereof, cooperate with the Supervisory Committee of Digital Security and provide to the respective Committee the information necessary for the implementation of the functions thereof, including inform of the detected significant cyber incidents and cyber threats which affect qualified trust service providers or qualified trust services provided thereby.

Section 18. National Cybersecurity Strategy

(1) The National Cybersecurity Strategy shall be developed once every four years by the National Cybersecurity Centre in cooperation with State administration institutions, State security institutions, and representatives of the private sector and shall be approved by the Cabinet.

(2) The following shall be determined in the National Cybersecurity Strategy:

1) the strategic objectives and model of cybersecurity management, the resources necessary for cybersecurity management;

2) the division of roles of the State administration institutions involved in cybersecurity management and also the national and international cooperative mechanisms;

3) the procedures for the determination of the information and communication technologies and resources to be protected at the national level and for the assessment of cyber risks;

4) the procedures and requirements for the development of cyber incident readiness, response, prevention, and recovery plans, the ways of exchange of information, and also the procedures for the cooperation between the public and private sectors;

5) an aggregate of measures for the improvement of the digital and cybersecurity skills of the public.

(3) The National Cybersecurity Strategy shall apply to the subjects unless it has been specified otherwise therein.

(4) The National Cybersecurity Centre shall, within six months after approval of the National Cybersecurity Strategy, develop and the Cabinet shall approve a plan of measures for achieving the objectives brought forward in the Strategy, identifying the work tasks, the responsible authorities, and the time limit for the fulfilment of the tasks, and the results to be achieved. At least the following measures shall be included in the plan:

1) the measures for improving the security of the supply chains of products and services of information and communication technologies of the subjects;

2) the cybersecurity measures in procurements of products and services of information and communication technologies of State institutions of direct and indirect administration, derived public entities, and other authorities, including in relation to the certification, encryption of information and communication technologies and the use of open source solutions;

3) the measures for the management of vulnerabilities, including for ensuring a coordinated vulnerability disclosure and prevention;

4) the measures for ensuring confidentiality, integrity, and availability of the public core of the open internet, including in relation to the cybersecurity of undersea communications cables;

5) the measures for the implementation of the cyber risk management;

6) the measures for the promotion of cyber resilience of the subjects and other authorities of the State and private sectors, including small and medium performers of economic activity, and the whole public, the promotion of cybersecurity skills and understanding, the development of cybersecurity education and training programmes, and also ensuring the basic level of cyber hygiene;

7) the measures for the support to cybersecurity research and development initiatives, including the development of cybersecurity tools and the development, improvement, and introduction of a secure infrastructure of information and communication technologies;

8) the measures for the promotion of voluntary exchange of cybersecurity information among the subjects;

9) active cyber protection measures.

(5) The National Cybersecurity Centre shall, twice a year, inform the National Cybersecurity Council of the progress of introduction of the National Cybersecurity Strategy.

(6) The National Cybersecurity Centre shall, within three months after adoption of the National Cybersecurity Strategy, notify the European Commission thereof, except for the information of significance to national security.

Section 19. Processing of Personal Data

(1) When performing its tasks specified in this Law and implementing its rights, a computer security incident response team shall receive and process information identifying a person in order to justify or in order to exclude suspicions of a cyber threat or to prevent it and also to ensure communication with the parties involved.

(2) After handling of the vulnerability and cyber incident, a computer security incident response team is entitled to store and analyse data which have been obtained in order to justify or exclude suspicions of a vulnerability and cyber incident and which contain personal data if the abovementioned information is useful for the disclosure or prevention of related vulnerabilities and cyber incidents.

(3) A computer security incident response team may transfer personal data to the authorities referred to in Section 9, Paragraph two of this Law in order to recognise and prevent such cyber threat, vulnerability, or cyber incident which causes or might cause threats to national security.

(4) Computer security incident response teams may transfer personal data to the National Guard of the Republic of Latvia to the extent and in the manner necessary to recognise and prevent such cyber threat, vulnerability, or cyber incident which causes or might cause threats to national security if the National Guard of the Republic of Latvia is involved in the provision of support to the competent computer security incident response team in accordance with the National Guard of the Republic of Latvia Law.

(5) When performing its tasks specified in this Law and implementing its rights, the Constitution Protection Bureau shall receive, process, store, and analyse data which have been obtained in order to justify or exclude suspicions of a cyber threat, vulnerability, or cyber incident which causes or might cause threats to national security.

(6) A computer security incident response team may transfer personal data to the Constitution Protection Bureau to the extent and in the manner necessary to recognise and prevent such cyber threat, vulnerability, or cyber incident which causes or might cause threats to national security.

Chapter III
Identification and Recording of the Subjects

Section 20. Provider of Essential Services

Within the meaning of this Law, a provider of essential services is:

1) a maintainer of the top-level domain name registry, for example, the holder of the top-level domain ".lv" registry;

2) a provider of domain name system services which provides publicly available recursive domain name resolution services for internet end-users or authoritative domain name resolution services for third-party usage, except for root name servers;

3) an electronic communications merchant;

4) a qualified trust service provider;

5) an institution of direct administration and another State authority and also a legal person governed by private law which is fulfilling a task delegated by the State administration, except for State security institutions;

6) a derived public entity;

7) the public electronic mass media;

8) a large performer of economic activity which is:

a) an energy supply merchant;

b) a petroleum supply merchant;

c) a hydrogen supply merchant;

d) an air navigation service provider, an aircraft operator, or an operator of an aerodrome or other civil aviation objects and facilities;

e) a railway undertaking or a railway infrastructure manager;

f) a shipping company, except for individual ships managed by the respective company;

g) a port authority;

h) a merchant which performs commercial activity in the port area;

i) a merchant which manages State motor roads or performs the maintenance works of the State motor road infrastructure;

j) an operator of intelligent transport systems;

n) a credit institution, a central counterparty, or a trading venue within the meaning of the Financial Instrument Market Law;

l) a medical treatment institution or a European Union reference laboratory;

m) a merchant which carries out research and development activities in respect of medicinal products, manufactures medicinal products and active substances;

r) a manufacturer of critical medical devices (in accordance with Article 22 of Regulation (EU) 2022/123 of the European Parliament and of the Council of 25 January 2022 on a reinforced role for the European Medicines Agency in crisis preparedness and management for medicinal products and medical devices);

s) a supplier or distributor of drinking water, except for the case where the principal activity of the merchant is not related to the distribution of drinking water;

p) a water management service provider;

r) an internet exchange point service provider;

s) a cloud computing service provider;

t) a data centre service provider;

u) a content delivery network service provider;

v) an information and communication technologies management or cybersecurity service provider;

z) a space-based service provider or an operator of the infrastructure to be used for the provision of such services;

9) a performer of economic activity which performs economic activity in at least one of the fields referred to in Clause 8 of this Section and is the only provider of such service in the Republic of Latvia;

10) an institution of indirect administration which provides services or operates in the field governed by private law in at least one of the fields referred to in Clause 8 of this Section;

11) an institution or a performer of economic activity the disruption of activity of which might significantly affect public safety, national defence, public health, or also cause a significant systemic risk, particularly in sectors in which such disruption may have cross-border impact.

Section 21. Provider of Important Services

(1) Within the meaning of this Law, a provider of important services is a person that is not a provider of essential services and that is:

1) a medium performer of economic activity which performs economic activity in at least one of the fields referred to in Section 20, Clause 8 of this Law;

2) a medium or large performer of economic activity which is:

a) a postal operator;

b) a waste manager;

c) a manufacturer or distributor of chemical substances or their mixtures in wholesale trade if distribution of chemical substances or their mixtures is the principal activity of the merchant;

d) a merchant which manufactures articles from chemical substances or their mixtures;

e) a merchant the principal activity of which is industrial food production, processing, or wholesale distribution of food;

f) a manufacturer of medical devices;

g) a manufacturer of computers, electronic and optical products;

h) a manufacturer of electrical equipment;

i) a manufacturer of devices, machinery, and equipment not elsewhere classified;

j) a manufacturer of motor vehicles, trailers, and semi-trailers;

k) a manufacturer of other transport equipment;

l) a provider of online marketplace services;

m) a provider of online search engine services;

n) a provider of social networking services platforms;

o) a scientific institution;

p) a provider of security guard services;

3) a performer of economic activity which performs economic activity in at least one of the fields referred to in Paragraph one, Clause 2 of this Section and is the only provider of such service in the Republic of Latvia;

4) an institution of indirect administration which provides services or operates in the field governed by private law in at least one of the fields referred to in Paragraph one, Clause 2 of this Section;

5) a maintainer of the education information system;

6) a trust service provider which is not a qualified trust service provider.

(2) Within the meaning of this Law, an education information system is an information system in which electronic personal data processing of educatees of an educational institution accredited in the Republic of Latvia is carried out.

Section 22. Recording of Providers of Essential Services and Important Services

(1) A person shall perform self-assessment, determining its conformity with the status of the provider of essential services or the provider of important services. In case of conformity, the person shall, not later than within a month, notify the National Cybersecurity Centre thereof. The following shall be indicated in the notification:

1) the name of the person (a natural person - the given name, surname, and personal identity number), legal status, and form of economic activity, registration number, legal address, and other contact details (for example, official electronic address, electronic mail address, telephone number, website address);

2) information on the field of activity of the person in accordance with Sections 20 and 21 of this Law;

3) a list and detailed description of essential services and important services provided by the person;

4) the Internet Protocol (IP) address ranges used permanently by the person;

5) the countries where the person provides services;

6) the data of the contact person of the person (given name, surname, position, telephone number, electronic mail address).

(2) The providers of essential services and important services shall, without delay but not later than within two weeks, notify the National Cybersecurity Centre of any changes in the information indicated in the notification referred to in Paragraph one of this Section.

(3) The National Cybersecurity Centre shall, without delay, forward the notifications referred to in Paragraphs one and two of this Section to the European Union Agency for Cybersecurity, except for the information referred to in Paragraph one, Clause 4 of this Section and other information the disclosure of which is in contradiction with the interests of national security.

(4) The National Cybersecurity Centre shall compile and the Supervisory Committee of Digital Security shall approve the list of the providers of essential services and important services. The list of the providers of essential services and important services shall be restricted access information.

(5) If the person has not notified the National Cybersecurity Centre of its conformity with the status of the provider of essential services or the provider of important services within the time limit specified in this Law, but the information at the disposal of the National Cybersecurity Centre is sufficient to determine the conformity of the abovementioned person with the status of the provider of essential services or the provider of important services, the Supervisory Committee of Digital Security shall, upon proposal of the National Cybersecurity Centre, include the abovementioned person in the list of the providers of essential services and important services, notifying the abovementioned provider of essential services or important services thereof in writing. In such case, the provider of essential services or important services has the obligation, without delay but not later than within a month after receipt of the notification, to provide the information referred to in Paragraph one of this Section to the National Cybersecurity Centre.

(6) The list referred to in Paragraph four of this Section shall be reviewed at least once in two years. The National Cybersecurity Centre shall ensure the submission of compiled information on the number, fields of activity, and provided services of the providers of essential and important services to the European Commission, the NIS Cooperation Group and also, upon request, other competent authorities of the European Union.

(7) The National Cybersecurity Centre may, upon request of the European Commission or another competent authority of the European Union, provide information thereto on the identity of the provider of essential services or important services (for example, name, legal status, form of economic activity, contact details, etc. of the provider of essential services or important services) unless the disclosure of such information is in contradiction with the interests of national security.

Section 23. Recording of Domain Name Registration Service Providers and Requirements for a Domain Name Registration Database

(1) A domain name registration service provider which conforms to the status of the domain name registration service provider and the decisions of which in relation to cybersecurity are taken in the Republic of Latvia or which has the highest number of employees in the Republic of Latvia shall notify the National Cybersecurity Centre thereof not later than within a month. The following shall be indicated in the notification:

1) the name of the person (a natural person - the given name, surname, and personal identity number), legal status, and form of economic activity, registration number, legal address, and other contact details (for example, official electronic address, electronic mail address, telephone number, website address);

2) information on the field of activity of the person in accordance with Sections 20 and 21 of this Law, if applicable;

3) the Internet Protocol (IP) address ranges used permanently by the person;

4) the countries where the person provides services;

5) the data of the contact person of the person (given name, surname, position, telephone number, electronic mail address).

(2) A domain name registration service provider shall, without delay but not later than within two weeks, notify the National Cybersecurity Centre of any changes in the information indicated in the notification referred to in Paragraph one of this Section.

(3) The National Cybersecurity Centre shall, without delay, forward the notifications referred to in Paragraphs one and two of this Section to the European Union Agency for Cybersecurity, except for the information referred to in Paragraph one, Clause 3 of this Section and other information the disclosure of which is in contradiction with the interests of national security.

(4) The National Cybersecurity Centre shall compile and the Supervisory Committee of Digital Security shall approve the list of domain name registration service providers.

(5) If the person has not notified the National Cybersecurity Centre of its conformity with the status of the domain name registration service provider within the time limit specified in this Law, but the information at the disposal of the National Cybersecurity Centre is sufficient to determine the conformity of the abovementioned person with the status of the domain name registration service provider, the Supervisory Committee of Digital Security shall, upon proposal of the National Cybersecurity Centre, include the abovementioned person in the list of domain name registration service providers, notifying the abovementioned domain name registration service provider thereof in writing. In such case, the domain name registration service provider has the obligation, without delay but not later than within a month after receipt of the notification, to provide the information referred to in Paragraph one of this Section to the National Cybersecurity Centre.

(6) The requirements for a domain name registration database applicable to the maintainer of the top-level domain ".lv" registry and domain name registration service provider shall be determined by the Cabinet.

Section 24. Critical Infrastructure of Information and Communication Technologies

(1) Within the meaning of this Law, the critical infrastructure of information and communication technologies is the critical infrastructure of information and communication technologies included in the aggregate of the critical infrastructure approved by the Cabinet.

(2) The security requirements for the critical infrastructure of information and communication technologies, the measures and the procedures for the planning and implementation thereof shall be determined by the Cabinet.

(3) The requirements referred to in Paragraph two of this Section for the critical infrastructure of information and communication technologies may not be lower than the requirements laid down for the providers of essential services in this Law.

Chapter IV
Cybersecurity Management of the Subjects

Section 25. Competence of the Head and the Cybersecurity Manager of the Subject

(1) Cybersecurity management of the subject shall be ensured by and be the responsibility of the head of the subject. The head of each subject shall determine the responsible person who implements and monitors the implementation of cybersecurity measures in the relevant subject (hereinafter - the cybersecurity manager). The Cabinet shall determine the requirements to be brought forward for the cybersecurity manager.

(2) The subject shall, without delay but not later than within five working days, notify the National Cybersecurity Centre and the Constitution Protection Bureau of determination of the cybersecurity manager. The given name, surname, personal identity number, position, electronic mail address, and telephone number of the cybersecurity manager shall be indicated in the notification.

(3) The owner or legal possessor of the critical infrastructure of information and communication technologies shall determine the cybersecurity manager after agreement with the Constitution Protection Bureau which inspects the conformity of the cybersecurity manager with the requirements brought forward.

(4) The subject shall, without delay but not later than within five working days, notify the National Cybersecurity Centre and the Constitution Protection Bureau of any changes in the information indicated in the notification referred to in Paragraph two of this Section.

(5) The cybersecurity manager has the following obligations:

1) to organise the security measures of the infrastructure of information and communication technologies of the authority;

2) not less than once a year to carry out security screening of information and communication technologies and, according to the results thereof, to organise elimination of the deficiencies detected;

3) at least once a year to attend training organised by the computer security incident response team in matters of cybersecurity;

4) not less than once a year to ensure the instruction of the persons employed in the authority on the cyber risks and cybersecurity relevant to the subject.

Section 26. Minimum Cybersecurity Requirements

The Cabinet shall determine the minimum cybersecurity requirements for the subjects, the procedures by which the subjects shall ensure the conformity of their networks and information systems with the minimum cybersecurity requirements, the requirements and measures to be taken for ensuring the confidentiality, integrity, and availability of the networks and information systems of the subjects and for data repair, and also the manner in which the information referred to in Section 22, Paragraphs one, two, and five, Section 23, Paragraphs one, two, and five, and Section 25, Paragraphs two and four of this Law shall be provided to the National Cybersecurity Centre and the Constitution Protection Bureau (for example, through the State information system maintained by the National Cybersecurity Centre or another technological solution).

Section 27. Obligations of the Subject in the Field of Cyber Threat Management

The subject shall take appropriate and commensurate technical and organisational measures to manage cyber risks for the security of electronic communications networks and information systems used by the subject and to prevent or reduce to the minimum extent possible the impact of cyber incidents on recipients of services of the subjects and on other services.

Section 28. Plan for the Management of Cyber Risks and the Continuity of Operation of Information and Communication Technologies

(1) The subject has the obligation to develop the plan for the management of cyber risks and the continuity of operation of information and communication technologies and to ensure regular training to employees for efficient implementation of the measures included in the plan.

(2) The Cabinet shall determine the type and amount of information to be mandatorily included in the plan for the management of cyber risks and the continuity of operation of information and communication technologies of the subject and also the procedures for the supervision and control of execution of the plan.

Section 29. Early Warning Sensors

The Cabinet shall determine the criteria for the mandatory installation of cybersecurity early warning sensors in the infrastructure of information and communication technologies of the subject and also the provisions for the installation and use of early warning sensors.

Section 30. Cybersecurity of Data Centres

(1) The subject shall maintain the information systems in its ownership or possession in the infrastructure of information and communication technologies thereof conforming to the minimum cybersecurity requirements or in data centres conforming to the requirements stipulated by the Cabinet (hereinafter - the data centres).

(2) The Cabinet shall determine:

1) the security requirements for the data centres, the procedures for the conformity evaluation, registration, and supervision of the data centres, and also the obligations of the operator of a data centre;

2) the regulations regarding the deployment of information systems in the data centres;

3) the regulations regarding the establishment and operation of security operations centres in the data centres.

(3) The competent computer security incident response team has the right to establish a security operations centre in a data centre of national importance, institutions of direct and indirect administration, derived public entities, and other public authorities and to ensure the operation thereof. The computer security incident response team has the right, within the scope of the security operations centre, to collect, store, and electronically process the data necessary for the identification of cyber threats, including log files, data flows, server performance data. The operator of the data centre shall, if it has the necessary data at its disposal, transfer the data obtained using its tools to a competent computer security incident response team.

(4) The competent computer security incident response team is entitled to establish a security operations centre in the critical infrastructure of information and communication technologies by assessing the capacity of existing and planned security operations centres in the critical infrastructure of information and communication technologies.

Section 31. Centralised Protection against Denial of Service Cyberattack

The Cabinet shall determine:

1) the requirements for the centralised protection of the infrastructure and internet of information and communication technologies against denial of service cyberattacks;

2) the criteria according to which the infrastructure and internet resources of information and communication technologies shall be included in the list of resources to be protected in a centralised manner against denial of service cyberattacks;

3) the procedures by which the conformity of the infrastructure and internet resources of information and communication technologies with the criteria referred to in Clause 2 of this Section shall be assessed;

4) the procedures for the approval of the list of resources to be protected in a centralised manner against denial of service cyberattacks.

Section 32. Operation of a Unified National Internet Exchange Point

(1) A unified national internet exchange point shall be established and maintained for:

1) continuously ensuring the presence of the critical data flow in the territory of the Republic of Latvia only;

2) ensuring the reachability of the information systems necessary for the implementation of important public functions and also for ensuring human health, protection, safety, economic and social welfare in case where global internet is not available in the Republic of Latvia;

3) ensuring full operation of the internet and exchange of data flows in the territory of the Republic of Latvia in case of disconnection from the global internet.

(2) A State or local government authority or subject the inclusion of which in the list of recipients of services of a unified national internet exchange point has been supported by the interinstitutional commission is entitled to receive the services of the unified national internet exchange point. The Cabinet shall determine the composition of the abovementioned commission, the procedures for the establishment and operation thereof.

(3) The Cabinet shall determine:

1) the procedures for the operation of a unified national internet exchange point and the provision and receipt of services;

2) the criteria for the inclusion of the State and local government authorities and subjects in the list of recipients of services of a unified national internet exchange point;

3) the State and local government authorities and subjects for which the requirement to direct data flow directly through a unified national internet exchange point has been laid down.

Section 33. Cyber Hygiene Requirements

The Cabinet shall determine for the subjects the basic elements and requirements for cyber hygiene measures in respect of the implementation of cyber hygiene measures.

Chapter V
Action to be Taken in Case of a Cyber Incident

Section 34. Action of the Subject in Case of a Cyber Incident

(1) When detecting a cyber incident, the subject, without delay, shall implement all activities necessary for the elimination of the cyber incident and also inform without delay the competent computer security incident response team of the cyber incident and comply with the instructions provided thereby regarding action to be taken in case of a cyber incident. In case of a cyber incident, the owner or legal possessor of the critical infrastructure of information and communication technologies shall, without delay, also inform the competent State security institution thereof. The Cabinet shall determine the procedures for the informing of cyber incidents and the criteria for such cyber incidents information on which must be provided to the competent computer security incident response team.

(2) In case of a significant cyber incident, the subject shall, without delay but not later than within 24 hours, submit electronically an early warning regarding the significant cyber incident to the competent computer security incident response team.

(3) In case of a significant cyber incident, the subject shall, without delay but not later than within 72 hours (the trust service provider - within 24 hours), submit electronically the initial report on the significant cyber incident to the competent computer security incident response team.

(4) In case of a significant cyber incident or a significant cyber threat, the subject shall, without delay, inform the recipients of its services, including users of the electronic communications network or information system which might be affected by such significant cyber incident or significant cyber threat, of the possible cybersecurity measures or means which may be used by the recipients of services to prevent the cyber incident or to mitigate the cyber threat. In the relevant case, the subject, after reaching agreement with the competent computer security incident response team (the owner or legal possessor of the critical infrastructure of information and communication technologies - also with the competent State security institution), shall inform without delay the recipients of its services also of a significant cyber incident or a significant cyber threat unless the disclosure of such information causes the risk of a new significant cyber incident or otherwise is in contradiction with the interests of national security.

(5) The subject shall, within a month after submission of the report referred to in Paragraph three of this Section, submit a final report on the handling of the significant cyber incident to the competent computer security incident response team. Upon request of the competent computer security incident response team, the subject shall also submit an interim report on the handling of the significant cyber incident thereto.

(6) If the significant cyber incident cannot be handled within the time limit specified in Paragraph five of this Section, the subject shall submit a progress report on the handling of the significant cyber incident to the competent computer security incident response team, meanwhile the final report referred to in Paragraph five of this Section shall be submitted after handling of the significant cyber incident.

(7) The Cabinet shall determine the content of the warning referred to in Paragraph two of this Section and also of the reports referred to in Paragraphs three, five, and six of this Section and the submission procedures.

(8) In case of a cyber incident, the persons to whom the obligations specified in Paragraph one of this Section are not applicable may perform all activities necessary for the prevention thereof and may, upon their own initiative, inform the competent computer security incident response team of the detected cyber incident. The computer security incident response team shall agree with the person who has reported on the cyber incident on the provision of support in the cyber incident handling. Voluntary notification of a cyber incident shall not impose additional obligations on the abovementioned person.

(9) The subjects and other persons may, upon their own initiative, voluntarily notify the competent computer security incident response team of a near miss or cyber threat. Voluntary notification of a near miss or cyber threat shall not impose additional obligations on the person.

(10) Upon request of the National Cybersecurity Centre or the Constitution Protection Bureau, the subject shall close access for the user to the electronic communications network for not longer than five days if the user significantly endangers the rights of other users or security of the electronic communications network, information system, or service. The cyber threat, the duration of the access restriction, and, if necessary, other activities to be carried out by the subject (for example, rerouting of the data flow to the infrastructure of the competent computer security incident response team) shall be indicated in the request. Contesting or appealing of the request shall not suspend the operation thereof. The Cabinet shall determine the conditions and procedures by which access to the electronic communications network shall be closed for the user.

Section 35. Action of a Computer Security Incident Response Team in Case of a Cyber Incident

(1) A computer security incident response team shall, without delay, inform the National Cybersecurity Centre of receipt of the early warning referred to in Section 34, Paragraph two of this Law or the notification referred to in Section 34, Paragraph three, five, or six of this Law. The computer security incident response team shall also inform the National Cybersecurity Centre of receipt of the notification referred to in Section 34, Paragraphs eight and nine of this Law.

(2) The computer security incident response team shall, within 24 hours after receipt of the initial information on a significant cyber incident, agree with the person who reported on a significant cyber incident on provision of support in prevention of a significant cyber incident, and also provide the initial assessment of the cyber incident, and express proposals for the prevention of the cyber incident.

(3) If the cyber incident detected endangers national security, the computer security incident response team shall inform the National Cybersecurity Centre and State security institutions thereof. The National Cybersecurity Centre shall inform thereof the Minister for Defence and the minister responsible for the sector.

(4) If the cyber incident detected has a significant impact on an electronic communications network or the continuity of an electronic communications service, the computer security incident response team shall inform the National Cybersecurity Centre and the Constitution Protection Bureau thereof. The National Cybersecurity Centre shall inform thereof the Public Utilities Commission and also may inform the European Union Agency for Cybersecurity and the CSIRT network.

(5) In case of a cross-border cyber incident, the competent computer security incident response team shall, without delay, inform the competent authorities of the affected European Union Member States and the European Union Agency for Cybersecurity.

(6) If informing of the public of a significant cyber incident or cyber threat may help to prevent or handle a significant cyber incident, to mitigate cyber threat, or is otherwise within the public interests, the National Cybersecurity Centre or the competent computer security incident response team may, upon previous discussion with the subject, inform the public or assign the subject to inform the public unless the disclosure of the abovementioned information is in contradiction with the interests of national security.

Section 36. Management of Significant Cyber Incidents and Crises

(1) The Cabinet shall approve the cyber incident significance criteria.

(2) The management of significant cyber incidents and crises shall be ensured by the National Cybersecurity Centre in cooperation with computer security incident response teams and State security institutions.

(3) The objectives, capacities, resources of and procedures for the management of significant cyber incidents and crises shall be determined in the National Plan for Cyber Incident Crisis Management the development and review of which shall be ensured by the National Cybersecurity Centre in cooperation with State security institutions not less than once in four years. The National Plan for Cyber Incident Crisis Management shall be approved by the Cabinet.

(4) The following shall be included in the National Plan for Cyber Incident Crisis Management:

1) the tasks, obligations, and mutual cooperation mechanism of the National Cybersecurity Centre, computer security incident response teams, and State security institutions;

2) the training related to the implementation of the National Plan for Cyber Incident Crisis Management;

3) the framework for cooperation with foreign and international partners;

4) the framework for cooperation with the State and local government institutions and also representatives of the private sector who might be subject to the impact of a significant cyber incident;

5) the cooperation framework of competent authorities and the procedures for efficient management of significant cyber incidents and crises in the European Union.

(5) The procedures specified in the National Plan for Cyber Incident Crisis Management shall be regularly included in the training and training activities organised by the National Cybersecurity Centre and other competent authorities.

(6) The National Cybersecurity Centre shall submit information to the European Commission and in the European Cyber Crises Liaison Organisation Network on the National Plan for Cyber Incident Crisis Management, except for information which affects the interests of national security.

Section 37. Restricting Activities in Case of a Cyber Threat or a Cyber Incident

(1) If a cyber threat or a cyber incident causes or might cause a significant threat to the security of information systems and electronic communications networks or national security and the cyber incident or cyber threat cannot be prevented in any other way, the National Cybersecurity Centre or the Constitution Protection Bureau, by restricting access to internet resources, is entitled to take the decision:

1) to disconnect or limit access to the domain name involved in the cyber incident or cyber threat;

2) to limit access to the Internet Protocol (IP) address involved in the cyber incident or cyber threat;

3) to limit access to the mobile platform application involved in the cyber incident or cyber threat.

(2) The decision of the National Cybersecurity Centre or the Constitution Protection Bureau referred to in Paragraph one of this Section shall specify the limitation of access and the duration thereof which shall not exceed one year.

(3) Contesting and appeal of the decision of the National Cybersecurity Centre or the Constitution Protection Bureau referred to in Paragraph one of this Section shall not suspend the operation and enforcement thereof.

(4) The providers of electronic communications services shall comply with the decision of the National Cybersecurity Centre or the Constitution Protection Bureau referred to in Paragraph one, Clauses 2 and 3 of this Section not later than within one working day after notification thereof, provided that the technological means necessary for compliance with the decision are at the disposal thereof.

(5) The providers of electronic communications services and maintainer of the top-level domain name registry shall comply with the decision of the National Cybersecurity Centre or the Constitution Protection Bureau referred to in Paragraph one, Clause 1 of this Section without delay after notification thereof, using the list of restricted internet resources maintained by the competent computer security incident response team and shall restrict access of end-users to the internet resources included in the list, also ensuring without delay that information on end-user attempts to access the restricted resources is forwarded to the competent computer security incident response team.

(6) In accordance with the division of supervision of the subjects specified in Section 41 of this Law, the National Cybersecurity Centre or the Constitution Protection Bureau shall consult Latvijas Banka prior to exercising the rights referred to in Paragraph one, Clauses 1 and 2 of this Section in respect of disabling or restricting access to a domain name registered in the name of Latvijas Banka or restricting access to the Internet Protocol (IP) address of Latvijas Banka.

Section 38. Attribution of Cyberattacks

The Cabinet shall determine the procedures and criteria by which Latvia shall carry out the attribution of cyberattacks.

Chapter VI
Coordinated Vulnerability Discovery and Prevention

Section 39. Coordinated Vulnerability Discovery

(1) If a person discovers a vulnerability in the information system or electronic communications network of the subject, it shall, without delay but not later than within five working days, submit a vulnerability discovery report to the competent computer security incident response team.

(2) The following information shall be included in the vulnerability discovery report:

1) the date and time of detecting the vulnerability (if possible);

2) the information on the information system or electronic communications network in which the vulnerability has been detected;

3) the description of the vulnerability;

4) the methodologies used for detecting the vulnerability or a description of the sequence of activities carried out;

5) the contact details of the submitter of the vulnerability discovery report;

6) other information which is deemed by the submitter of the vulnerability discovery report as necessary for the identification and prevention of the vulnerability detected.

(3) The competent computer security incident response team shall confirm the receipt of the vulnerability discovery report, check the information included in the report, and inform the submitter of the report of validity of the information included in the report and the result of prevention of the vulnerability.

(4) If the information on the vulnerability provided in the vulnerability discovery report has been assessed by the competent computer security incident response team as justified, the competent computer security incident response team shall, without delay, inform the respective subject and the Constitution Protection Bureau, provided that this applies to the critical infrastructure of information and communication technologies.

(5) Vulnerability discovery may not be used with malicious intent. Information on the vulnerability discovered shall be restricted access information unless a higher level of classification is provided for in laws and regulations. The submitter of the vulnerability discovery report and the relevant subject shall be responsible for non-disclosure of the abovementioned information. The competent computer security incident response team shall determine the conditions, procedures, and extent to which the information on the specific vulnerability discovered may be disclosed.

(6) The submitter of the vulnerability discovery report is entitled to submit a vulnerability discovery report anonymously or to request the competent computer security incident response team not to disclose the identity of the submitter of the report. In such case, the competent computer security incident response team has the obligation to ensure confidentiality of identity of the submitter of the report unless the submitter of the report complies with the requirements laid down in this Law and the signs of a criminal offence are not present prima facie. The abovementioned obligation to ensure confidentiality shall not apply to the authorities referred to in Section 13, Paragraph three, Clauses 7 and 8 of this Law. Anonymous submission of a vulnerability discovery report shall not exempt the submitter of the vulnerability discovery report from the obligation not to disclose information on vulnerability.

Section 40. Coordinated Vulnerability Prevention

(1) The subject shall, within the time limit stipulated by the competent computer security incident response team but not later than within 90 days after receipt of information, take the activities necessary for the prevention of a vulnerability and inform the competent computer security incident response team of the course of the vulnerability prevention.

(2) If, due to objective reasons, it is not possible to prevent a vulnerability within the time limit specified in Paragraph one of this Section, the computer security incident response team may, upon request of the subject, extend the time limit for the prevention of the vulnerability but for not more than 180 days from the moment of submitting the vulnerability discovery report, informing the submitter of the vulnerability discovery report thereof.

(3) The persons to whom the obligations specified in Paragraph one of this Section do not apply may, upon their own initiative, agree with the submitter of the vulnerability discovery report on the time limit for the prevention of the vulnerability and inform the competent computer security incident response team of the course of the vulnerability prevention.

(4) The competent computer security incident response team shall provide support in communication between the submitter of the vulnerability discovery report and the relevant subject if any of the parties expresses such a wish. The competent computer security incident response team shall perform ex post control of the prevention of the vulnerability disclosed and also ensure confidentiality of the submitter of the vulnerability discovery report in accordance with Section 39, Paragraph six of this Law.

(5) If the vulnerability discovered affects several subjects, the competent computer security incident response team shall coordinate the prevention of such vulnerability in cooperation with all abovementioned subjects.

(6) If the vulnerability discovered could significantly disrupt the provision or receipt of essential services or important services in another European Union Member State, the competent computer security incident response team shall cooperate with the computer security incident response teams of this country for the prevention of the abovementioned vulnerability. If the vulnerability discovered affects more than two European Union Member States, the competent computer security incident response team shall cooperate with the computer security incident response teams of these countries, using the CSIRT network.

Chapter VII
Supervision of the Subjects and Enforcement Measures

Section 41. Supervisory Institutions

Supervision of the subjects shall be performed by:

1) the National Cybersecurity Centre in relation to the providers of essential services and important services, except for the critical infrastructure of information and communication technologies;

2) the Constitution Protection Bureau in relation to the critical infrastructure of information and communication technologies.

Section 42. Supervision of the Subjects

(1) The supervision of the subject shall include control of compliance with the cybersecurity requirements, on-site checks and remote monitoring of information and communication technologies, data and document checks, including in relation to the risk management and the elimination of the deficiencies detected in conformity evaluations, and also security scanning of electronic communications networks and information systems of the subject.

(2) In accordance with the division of supervision of the subjects specified in Section 41 of this Law, the National Cybersecurity Centre and the Constitution Protection Bureau are entitled to prioritise the implementation of the supervision measures referred to in Paragraph one of this Section by assessing the current cyber risks.

(3) The Cabinet shall determine the criteria and procedures for the performance of the security scanning referred to in Paragraph one of this Section.

Section 43. Report on Conformity Self-assessment of the Subjects

(1) In accordance with the division of supervision of the subjects specified in Section 41 of this Law, the subject shall submit the report on conformity self-assessment (hereinafter - the self-assessment report) to the National Cybersecurity Centre and the Constitution Protection Bureau.

(2) The form of the self-assessment report and the content and amount of the information to be included therein and also the time limit and regularity for the submission of the report shall be determined by the Cabinet.

Section 44. Conformity Audit of the Subjects

(1) In accordance with the division of supervision of the subjects specified in Section 41 of this Law, the National Cybersecurity Centre and the Constitution Protection Bureau are entitled to perform a conformity audit of the subject or to assign the subject to perform an external audit regarding conformity of the subject with the cybersecurity requirements laid down in this Law and stipulated by the Cabinet regulations if there are suspicions of cybersecurity violations or they have been detected.

(2) An external audit shall be performed by an independent cybersecurity auditor who does not have a conflict of interests with the subject and who is registered in the list of cybersecurity auditors approved by the Supervisory Committee of Digital Security. The Cabinet shall determine the requirements to be brought forward for a cybersecurity auditor and the procedures for the registration of cybersecurity auditors.

(3) An external audit in the critical infrastructure of information and communication technologies shall be performed by a cybersecurity auditor corresponding to the criteria specified in Paragraph two of this Section agreed upon with the Constitution Protection Bureau.

(4) Costs of the external audit shall be covered by and the violations detected in the audit shall be eliminated by the relevant subject.

(5) After the end of the external audit, the subject shall, without delay, submit a copy of the external audit report to the National Cybersecurity Centre (the owner or legal possessor of the critical infrastructure of information and communication technologies - to the Constitution Protection Bureau). Upon request of the National Cybersecurity Centre or the Constitution Protection Bureau, the subject shall also present evidence which formed the basis for the conclusions included in the external audit report.

Section 45. Elimination of Non-conformity of the Subjects

(1) In case of detecting non-conformities, the National Cybersecurity Centre and the Constitution Protection Bureau are entitled, in accordance with the division of supervision of the subjects specified in Section 41 of this Law, to express a warning to the subject or to assign the subject:

1) to carry out specific activities for the elimination of a non-conformity, determining a commensurate time limit for the elimination of the non-conformity and the procedures for reporting on the course of elimination of the non-conformity;

2) to discontinue without delay and henceforth preclude any action which violates the requirements laid down in this Law;

3) to inform the service recipients or to publish information on the cyber threat, its type and extent, and also the activities necessary for the prevention or mitigation thereof;

4) to inform the service recipients or to publish information on the detected violations of the subject.

(2) If the non-conformity detected causes the risk of a significant cyber incident, the National Cybersecurity Centre and the Constitution Protection Bureau shall inform the Cabinet of the risk detected, but if the non-conformity endangers national security - the National Security Council.

(3) The subject shall, without delay, take all necessary, appropriate, and commensurate measures for the elimination of non-conformities, including carry out the instructions of the National Cybersecurity Centre and the Constitution Protection Bureau.

(4) The National Cybersecurity Centre and the Constitution Protection Bureau are entitled to perform on-site checks, including to appoint officials for monitoring how the subject fulfils the obligations specified in this Law within a specific time period.

(5) If the subject fails to comply with the legal obligations imposed in accordance with Paragraph one of this Section, the National Cybersecurity Centre and the Constitution Protection Bureau are entitled, in accordance with the division of supervision of the subjects specified in Section 41 of this Law:

1) to request the subject to suspend the operation of its information system, resource, or electronic service until elimination of the non-conformity detected;

2) to request the subject to suspend the trade in the product of information and communication technologies or the provision of the service until elimination of the non-conformity detected;

3) to temporarily prohibit any natural person who is responsible for the fulfilment of management and representation duties in the subject at the level of an executive body or an equivalent level from carrying out management and representation functions.

(6) When deciding on any of the enforcement measures referred to in Paragraph one or three of this Section, the National Cybersecurity Centre and the Constitution Protection Bureau shall take into account the following considerations:

1) the severity of the non-conformity and the significance of the non-conformity, taking into account that the following shall be considered as significant cases of non-conformity within the meaning of this Law:

a) detection of repeated cases of non-conformity;

b) failure to report or resolve significant incidents;

c) failure to eliminate the non-conformity detected, contrary to the instructions provided by the National Cybersecurity Centre and the Constitution Protection Bureau;

d) obstruction of audits or supervisory activities requested by the National Cybersecurity Centre and the Constitution Protection Bureau following detection of the non-conformity;

e) provision of false or inaccurate information in relation to cybersecurity risk management measures or reporting measures;

2) the duration of the non-conformity;

3) any previous cases of non-conformity by the respective subject;

4) any material or non-material damage caused, including any financial or economic loss, the impact on other services, and the number of users affected;

5) the intent or negligence of the person causing the non-conformity;

6) any measures taken by the subject to prevent or minimise material or non-material damage;

7) whether the subject complies with the internal rules issued to fulfil the minimum cybersecurity requirements, the plan for the management of cyber risks and the continuity of operation, and also the international and national standards and certification schemes (if applicable) binding on the subject;

8) the extent to which the natural person responsible for the fulfilment of management and representation duties in the subject at the level of an executive body or an equivalent level cooperates with the National Cybersecurity Centre and the Constitution Protection Bureau.

(7) The National Cybersecurity Centre and the Constitution Protection Bureau shall send the decision referred to in Paragraph five, Clause 3 of this Section to the subject.

(8) The prohibition referred to in Paragraph five, Clause 3 of this Section shall not apply to a provider of important services who is not the owner or legal possessor of critical infrastructure of information and communication technologies.

(9) The prohibition referred to in Paragraph five, Clause 3 of this Section shall apply until the respective subject has fulfilled the legal obligations imposed thereon in accordance with Paragraph one of this Section.

(10) After the subject has fulfilled the legal obligations imposed thereon in accordance with Paragraph one of this Section, the National Cybersecurity Centre and the Constitution Protection Bureau shall, in accordance with the division of supervision of the subjects specified in Section 41 of this Law, cancel the prohibition referred to in Paragraph five, Clause 3 of this Section.

(11) The prohibition referred to in Paragraph five, Clause 3 of this Section shall not apply to institutions of direct and indirect administration, other public authorities, and derived public entities.

(12) In accordance with the division of supervision of the subjects specified in Section 41 of this Law, the National Cybersecurity Centre or the Constitution Protection Bureau shall consult Latvijas Banka prior to exercising the rights referred to in Paragraph five, Clause 1 of this Section in respect of information systems, resources, or electronic services maintained by Latvijas Banka.

Section 46. Imposition of a Fine and Provisions for the Compulsory Enforcement

(1) The National Cybersecurity Centre is entitled to impose a fine of up to EUR 10 million on a provider of essential services for a major non-conformity with the requirements laid down in this Law, but up to two per cent of the total net turnover of the provider of essential services in the last financial year if the total net turnover of the provider of essential services in the last financial year exceeds EUR 500 million.

(2) The National Cybersecurity Centre is entitled to impose a fine of up to EUR 7 million on a provider of important services for a major non-conformity with the requirements laid down in this Law, but up to 1.4 per cent of the total net turnover of the provider of important services in the last financial year if the total net turnover of the provider of important services in the last financial year exceeds EUR 500 million.

(3) The Constitution Protection Bureau is entitled to impose a fine of up to EUR 10 million on the owner or legal possessor of critical infrastructure of information and communication technologies for a major non-conformity with the requirements laid down in this Law, but up to two per cent of the total net turnover of the owner or legal possessor of critical infrastructure of information and communication technologies in the last financial year if the total net turnover of the owner or legal possessor of critical infrastructure of information and communication technologies in the last financial year exceeds EUR 500 million.

(4) The Cabinet shall determine the procedures for the determination of the net turnover of the financial year from which the fine is calculated, and the criteria for the determination of the amount of the fine.

(5) Within the meaning of this Law, a major non-conformity means that:

1) the subject fails to take appropriate and proportionate technical and organisational measures to minimise the impact of a cyber threat or a cyber incident;

2) the subject repeatedly refuses to fulfil the legal obligations imposed by the officials of the National Cybersecurity Centre or the Constitution Protection Bureau related to the obligation of the subject to provide information within the scope of the cyber security supervision imposed by this Law;

3) the subject fails to notify the competent computer security incident response team of a significant cyber incident within the time limit laid down in this Law or knowingly provides false information to the competent computer security incident response team.

(6) The amount of the fine shall be determined in proportion to the violation committed. When taking the decision to impose a fine and deciding on the amount thereof, the National Cybersecurity Centre and the Constitution Protection Bureau shall assess and take into account the considerations referred to in Section 45, Paragraph six of this Law and also the financial situation of the person.

(7) The decision to impose a fine of the National Cybersecurity Centre and the Constitution Protection Bureau may be appealed before a court in accordance with the procedures laid down in the Administrative Procedure Law.

(8) The subject shall pay the fine imposed by the National Cybersecurity Centre or the Constitution Protection Bureau within one month from the date of entry into effect of the decision on the imposition thereof. If the decision to impose a fine has not been complied with voluntarily, compulsory enforcement thereof shall be carried out by a bailiff. The National Cybersecurity Centre and the Constitution Protection Bureau shall be exempt from the State fee for submitting the decision for enforcement.

(9) If the decisions taken in accordance with Section 34, Paragraph ten, Section 37, Paragraph one, and Section 45, Paragraph one of this Law are not complied with voluntarily, the National Cybersecurity Centre or the Constitution Protection Bureau shall carry out compulsory enforcement thereof in accordance with the Administrative Procedure Law. When carrying out compulsory enforcement of a decision directed towards prohibition of specific activities or activity, the National Cybersecurity Centre or the Constitution Protection Bureau may impose a pecuniary penalty in the amount of not more than EUR 10 000 at a time.

(10) The amount of the pecuniary penalty imposed shall be determined in proportion to the violation committed. When determining the amount of the pecuniary penalty referred to in Paragraph five of this Section, the National Cybersecurity Centre and the Constitution Protection Bureau shall take into account the impact of the failure to comply with the decisions referred to Section 34, Paragraph ten, Section 37, Paragraph one, and Section 45, Paragraph one of this Law on the security of networks and information systems, the duration of the violation, and also other circumstances relevant to the case.

(11) Prior to issuing an enforcement order, the National Cybersecurity Centre and the Constitution Protection Bureau shall notify the addressee in writing that the information necessary for issuing an enforcement order has been obtained. The addressee may, within seven days after receipt of the abovementioned notification, become acquainted with the case, express its opinion, and submit additional information.

(12) This Section shall not be applied to institutions of direct and indirect administration, other public authorities, and derived public entities.

(13) The paid fine or pecuniary penalty shall be transferred into the State basic budget.

Transitional Provisions

1. With the coming into force of this Law, the Law on the Security of Information Technologies (Latvijas Vēstnesis, 2010, No. 178; 2012, No. 179; 2013, No. 228; 2015, No. 34; 2017, No. 132; 2018, No. 210) is repealed.

2. The Cabinet shall, by 17 October 2024, issue the Cabinet regulations referred to in Section 9, Paragraph four, Section 12, Paragraph three, Section 17, Paragraph two, Section 23, Paragraph six, Section 24, Paragraph two, Section 25, Paragraph one, Section 26, Section 28, Paragraph two, Section 29, Section 31, Section 32, Paragraphs two and three, Section 33, Section 34, Paragraphs one, seven, and ten, Section 36, Paragraph one, Section 42, Paragraph three, Section 43, Paragraph two, and Section 44, Paragraph two of this Law.

3. The Cabinet shall, by 1 April 2025, determine the procedures and criteria by which Latvia shall carry out the attribution of cyberattacks.

4. The Cabinet shall, by 1 April 2025, issue the regulations referred to in Section 30, Paragraph two of this Law.

5. Until the day of coming into force of the regulations referred to in Section 17, Paragraph two of this Law but not longer than until 1 January 2025, Cabinet Regulation No. 695 of 1 November 2016, By-laws of the Supervisory Committee of Digital Security, shall be applicable insofar as it is not in contradiction with this Law.

6. Until the day of coming into force of the regulations referred to in Section 12, Paragraph three, Section 24, Paragraph two, Section 25, Paragraph one, Section 26, Section 28, Paragraph two, Section 29, Section 30, Paragraph two, Section 34, Paragraphs one, seven, and ten, Section 36, Paragraph one, Section 42, Paragraph three, Section 43, Paragraph two, and Section 44, Paragraph two of this Law but not longer than until 17 October 2024, Cabinet Regulation No. 442 of 28 July 2015, Procedures for the Ensuring Conformity of Information and Communication Technologies Systems to Minimum Security Requirements, and Cabinet Regulation No. 100 of 1 February 2011, Procedures for the Planning and Implementation of Security Measures for the Critical Infrastructure of Information Technologies, shall be applicable insofar as they are not in contradiction with this Law.

7. When performing an initial self-assessment in accordance with Section 22, Paragraph one of this Law, a person shall notify the National Cybersecurity Centre of its conformity with the status of the provider of essential services or the provider of important services not later than until 1 April 2025. If conformity with the status of the provider of essential or the provider of important services has set in after the abovementioned time limit, the person shall notify the National Cybersecurity Centre thereof within the time limit specified in Section 22, Paragraph one of this Law.

8. The list of the providers of essential services and important services referred to in Section 22, Paragraph four of this Law shall be approved by 17 April 2025.

9. The information referred to in Section 23, Paragraph one of this Law on the conformity of a person with the status of the domain name registration service provider shall be notified to the National Cybersecurity Centre not later than until 1 April 2025. If conformity with the status of the domain name registration service provider has set in after the abovementioned time limit, the person shall notify the National Cybersecurity Centre thereof within the time limit specified in Section 23, Paragraph one of this Law.

10. The information referred to in Section 25, Paragraph two of this Law on determination of the cybersecurity manager of the subject shall be initially notified to the National Cybersecurity Centre and the Constitution Protection Bureau not later than until 1 October 2025. If the cybersecurity manager of the subject is determined after the abovementioned time limit, the subject shall notify the National Cybersecurity Centre and the Constitution Protection Bureau thereof within the time limit specified in Section 25, Paragraph two of this Law.

11. Section 34, Paragraphs two, three, four, and five of this Law shall be applicable from 1 July 2025.

12. The self-assessment report referred to in Section 43, Paragraph one of this Law shall be initially submitted to the National Cybersecurity Centre and the Constitution Protection Bureau not later than by 1 October 2025.

13. The providers of essential services which, within the meaning of Article 2(2) of Regulation 2022/2554, are financial entities shall, in respect of the risk management, i.e. management of risks related to third parties, operational resilience, testing, and incident reports, apply the requirements laid down in the legal acts governing the respective field.

Informative Reference to European Union Directives

The Law contains legal norms arising from:

1) Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive);

2) Directive (EU) 2018/1972 of the European Parliament and of the Council of 11 December 2018 establishing the European Electronic Communications Code (recast).

The Law shall come into force on 1 September 2024.

The Law has been adopted by the Saeima on 20 June 2024.

Acting for the President, Chairperson of the Saeima D. Mieriņa

Rīga, 4 July 2024


1 The Parliament of the Republic of Latvia

Translation © 2024 Valsts valodas centrs (State Language Centre)

 
Document information
Title: Nacionālās kiberdrošības likums Status:
In force
in force
Issuer: Saeima Type: law Adoption: 20.06.2024.Entry into force: 01.09.2024.Theme: State security and protection; Transport and communication; Documents, recordkeeping, data protectionPublication: Latvijas Vēstnesis, 128A, 04.07.2024. OP number: 2024/128A.1
Language:
LVEN
Related documents
  • Changes legal status of
  • Legal basis of
  • Annotation / draft legal act
  • Other related documents
353390
01.09.2024
84
0
  • X
  • Facebook
  • Draugiem.lv
 
0
Latvijas Vestnesis, the official publisher
ensures legislative acts systematization
function on this site.
All Likumi.lv content is intended for information purposes.
About Likumi.lv
News archive
Useful links
For feedback
Contacts
Mobile version
Terms of service
Privacy policy
Cookies
Accessibility
Latvijas Vēstnesis "Everyone has the right to know about his or her rights."
Article 90 of the Constitution of the Republic of Latvia
© Official publisher "Latvijas Vēstnesis"