LeX-Ray
Measures for a High Common Level of Security of Network and Information Systems Across the Union Directive
Article 1: Subject matter and scope
Article 2: Processing of personal data
Article 3: Minimum harmonisation
Article 4: Definitions
Article 5: Identification of operators of essential services
Article 6: Significant disruptive effect
Article 7: National strategy on the security of network and information systems
Article 8: National competent authorities and single point of contact
Article 9: Computer security incident response teams (CSIRTs)
Article 10: Cooperation at national level
Article 11: Cooperation Group
Article 12: CSIRTs network
Article 13: International cooperation
Article 14: Security requirements and incident notification
Article 15: Implementation and enforcement
Article 16: Security requirements and incident notification
Article 17: Implementation and enforcement
Article 18: Jurisdiction and territoriality
Article 19: Standardisation
Article 20: Voluntary notification
Article 21: Penalties
Article 22: Committee procedure
Article 23: Review
Article 24: Transitional measures
Article 25: Transposition
Article 26: Entry into force
Article 27: Addressees
Recitals
Recital 1
Recital 2
Recital 3
Recital 4
Recital 5
Recital 6
Recital 7
Recital 8
Recital 9
Recital 10
Recital 11
Recital 12
Recital 13
Recital 14
Recital 15
Recital 16
Recital 17
Recital 18
Recital 19
Recital 20
Recital 21
Recital 22
Recital 23
Recital 24
Recital 25
Recital 26
Recital 27
Recital 28
Recital 29
Recital 30
Recital 31
Recital 32
Recital 33
Recital 34
Recital 35
Recital 36
Recital 37
Recital 38
Recital 39
Recital 40
Recital 41
Recital 42
Recital 43
Recital 44
Recital 45
Recital 46
Recital 47
Recital 48
Recital 49
Recital 50
Recital 51
Recital 52
Recital 53
Recital 54
Recital 55
Recital 56
Recital 57
Recital 58
Recital 59
Recital 60
Recital 61
Recital 62
Recital 63
Recital 64
Recital 65
Recital 66
Recital 67
Recital 68
Recital 69
Recital 70
Recital 71
Recital 72
Recital 73
Recital 74
Recital 75
Annexes
REQUIREMENTS AND TASKS OF COMPUTER SECURITY INCIDENT RESPONSE TEAMS (CSIRTs) REQUIREMENTS AND TASKS OF COMPUTER SECURITY INCIDENT RESPONSE TEAMS (CSIRTs)
TYPES OF ENTITIES FOR THE PURPOSES OF POINT (4) OF ARTICLE 4 TYPES OF ENTITIES FOR THE PURPOSES OF POINT (4) OF ARTICLE 4
TYPES OF DIGITAL SERVICES FOR THE PURPOSES OF POINT (5) OF ARTICLE 4 TYPES OF DIGITAL SERVICES FOR THE PURPOSES OF POINT (5) OF ARTICLE 4
Footnote p0: Done at Strasbourg, 6 July 2016.