NIS2, Are you in scope?

Belgium's new cybersecurity law entered into force.

Are your accounts well protected?

Use Multi-Factor Authentication whenever possible.

Slide 1 of

EU CYBER INCIDENT REPORTING NAVIGATOR

Incident Notification Requirements: What? To Whom? When?

This page provides a practical, to the point guide to EU cybersecurity and sector-specific digital legislation and their incident notification requirements in Belgium. The links below offer an overview of the relevant reporting & information channels per legislative framework.

This information is provided for general guidance purposes only and does not constitute legal advice. Users are strongly encouraged to consult the applicable legal texts themselves, as well as any relevant implementing or sector-specific legislation. In case of uncertainty regarding the interpretation or application of legal obligations, organisations should seek advice from a qualified legal or regulatory expert. Note that a single incident can trigger notification and reporting obligations under multiple legal frameworks simultaneously (e.g. cybersecurity, data protection, sectoral or critical infrastructure legislation). It is the responsibility of the organisation to assess all potentially applicable laws and ensure compliance with each of them.

If an incident occurs: use this table to quickly identify where to report?

Legal act

Who is concerned?

What is reportable?

Where to report?

Useful links / guidance

NIS2Essential and important entities in NIS2 sectors – scope testCyber incidents with a significant impact on the provision of services

CCB

(except financial entities → FSMA  under DORA)

GDPRAny organisation processing personal dataPersonal data breaches posing a risk to individuals’ rights and freedoms

DPA

(except Police → COC)

CRAManufacturers, importers, distributors of digital productsSevere security incidents and actively exploited vulnerabilities affecting products

TBD

(ENISA single reporting platform & CCB as national CSIRT)

  • FAQ CRA
  • Reporting obligations begin 11 September 2026.
AI ActProviders and deployers of high-risk AI systemsSerious incidents involving high-risk AI systemsTBD
  • FAQ AI Act
  • Granularly applicable from 2026-2027 (TBC)
CERDesignated critical entitiesIncidents (incl. cyber) disrupting essential servicesTBD
DORAFinancial entities & ICT third-party providersSignificant ICT-related incidents (and major cyber threats)FSMA
eIDAS 2.0Trust service providers & EUDI Wallet actorsSecurity breaches or outages affecting trust servicesTBD
NCCSHigh- / critical-impact electricity entitiesCyber incidents affecting critical electricity infrastructureTBD
MDRIVDRMedical device manufacturers & distributorsSerious incidents impacting patient safety or public healthFAGG
PSR (proposal)Payment service providersMajor operational or security incidents

TBD

(expected alignment with DORA)

EECCTelecom operatorsSecurity incidents affecting networks or servicesBIPT

From Early Warning to Final Report: Reporting Deadlines Across Frameworks

This figure illustrates the different incident notification timelines across EU cybersecurity and digital legislation. Depending on the applicable legal framework, organisations may be subject to multiple reporting deadlines, ranging from early warnings to final reports. The overview highlights how reporting obligations can overlap in time and differ in scope.