Agefi Luxembourg - mai 2026
Mai 2026 47 AGEFI Luxembourg IA & Tech ByVincentWELLENS,Partner,NautaDutilhAvocats Luxembourg T he loi du 5mai 2026 concernant des mesures destinées à assurer un ni veau élevé de cybersécurité trans posesDirective (EU) 2022/2555 of 14December 2022 (the “NIS2 Directive”) intoLuxembourg law. The textwas adoptedby theChamber ofDeputies on 28 April 2026 and the lawwas published in the Luxembourg Official Journal (Mémorial An° 225) on 6May 2026. Luxembourgislateinitstransposition: the NIS2 Directive, like the Critical Entities Resilience Directive (EU) 2022/2557, required EU Member States to adopt and publish transposition measures by 17 October 2024 and to apply them from 18 October 2024. The two Luxembourg trans positionlaws–NIS2andCER–wereadoptedonthe same day (5 May 2026) to ensure consistency be tween their crossreferences andcoordinated imple mentation. The newNIS2 law repeals and replaces the law of 28 May 2019, which transposed the first generationNIS1 Directive (EU) 2016/1148. Scope—Who Is Covered? General Threshold As ageneral rule, the lawapplies topublic or private entities of a type listed in Annex I or Annex II that qualify as SME (within the meaning of Article 2 of the Annex to Commission Recommendation 2003/361/CE) and that provide their services or carry out their activities within the EuropeanUnion. SizeIndependent Application incl. CER/ Critical Entities The law also applies regardless of size where services are provided by: (i) providers of public electronic com munications networks or publicly available electronic communications services; (ii) trust service providers; or (iii) toplevel domain (TLD) name reg istries and DNS service providers or, (iv) where : the entity is the sole provider in Luxembourg of a service essential to the maintenance of critical societal or economic activities; a disruption could have a significant impact on public security, public safety or public health; a disruption could create a significant systemic risk (including transborder im pact); or the entity is a public administration entity. The law applies to entities identified as critical enti ties under the loi du 5 mai 2026 sur la résilience des entités critiques (the companion CER transposition law, adopted simultaneously), regardless of their size. This is a critical point: entitiesdesignatedunder the CER regime are automatically brought into NIS2’s scope in their entirety, irrespective of head count or turnover. Exclusions Entities excluded from the scope of the DORAReg ulation(EU)2022/2554pursuanttoArticle2(4)ofthat regulation, also fall outside the scopeof this law. The core security obligations (Articles 12, 13, 14, and 15) and the supervisionandenforcement chapterdonot apply to the State intelligence service (SREL), the Ministry of Defence, or the LuxembourgArmy, nor to classified information systems. Where sectorspecific EU legal acts (such as DORA) impose cybersecurity risk management or incident notification requirements on entities with at least equivalent effect to this law, the overlapping provi sions(includingsupervisionandenforcement)ofthe NIS2 lawdo not apply to those entities. Covered Sectors The law covers a wide range of sectors through its two annexes: Annex I—HighlyCritical Sectors: Energy; Trans port, Banking, Financial market infrastructures, Health, Drinking &Waste water, Digital infrastruc ture (IXPs, DNS providers, TLD registries, cloud providers,datacentres,CDNproviders,trustservice providers, public electronic communications net worksandservices),ICTServiceManagement(man agedserviceprovidersandmanagedsecurityservice providers), Public administration, and Space. Annex II — Other Critical Sectors: Postal / courier services, Waste management, Manufac ture/production/ distribution of chemical sub stances, Food production/processing/distribution (wholesale and industrial), Manufacturing (medi cal devices, computers/ electronics/ optics, electri cal equipment, machinery, motor vehicles, other transport equipment), Digital providers (online marketplaces, online search engines, social networking platforms), and Research. Essential vs. Important Entities Entities of the types listed inAnnex I that exceed the SME thresholds are classified as essential entities . The category also covers: qualified trust service providers, TLD registries, and DNS service providers regard less of size; providers of public electronic communications net works or services that are mediumsized enterprises; public administration entities; entities identi fied by the competent authority on the basis of the sizeindependent criteria (sole provider, systemic risk, etc.); entities identified as critical en tities under the CER law; and entities previously identified as operators of essential services under the former NIS1 law of 28May 2019. All other inscope entities that do not qualify as es sentialentitiesareclassifiedas importantentities ,in cluding those identified by the competent authority pursuant to the sizeindependent criteria. The distinction is significant: essential entities are subject to ex ante supervision, while important enti ties are generally subject to ex post supervision trig gered by evidence of noncompliance. Competent Authorities Core Obligations Cybersecurity RiskManagement Essential and important entitiesmust takeappropri ate and proportionate technical, operational and or ganisationalmeasurestomanageriskstothesecurity of thenetworks and informationsystems theyuse in thecontextoftheiractivitiesorserviceprovision,and to eliminate or reduce the consequences of incidents for the recipients of their services. These measures must be based on an “allhaz ards” approach aimed at protecting networks and information systems and their physical environ ment. Theymust include at least the following ten categories: 1. Policies on risk analysis and information system security; 2. Incident management; 3. Business continuity (backupmanagement, disas ter recovery) and crisismanagement; 4. Supply chain security, including security aspects of relationships with direct suppliers and service providers; 5. Security in network and information system ac quisition, development andmaintenance, including vulnerability handling and disclosure; 6. Policies andprocedures for assessing theeffective ness of cybersecurity riskmanagement measures; 7. Basic cyber hygiene practices and cybersecurity training; 8. Policies and procedures on the use of cryptogra phy and, where appropriate, encryption; 9. Human resources security, access control policies, and asset management; 10. Use of multifactor authentication or continuous authentication, secure voice/video/text communica tions, and secure emergency communication sys tems within the entity, as appropriate. As it seems, the competent authorities requireadop tion of measures in compliance with ISO 27k rules of the Belgian CyFun framework. Apparently, the Agence nationale de la sécurité des systèmes d’information (ANSSI) will release it framework soon. Essentialentitiesmustnotifytheircompetentauthor ityofthemeasurestaken:themodalities,format,and timeline for such notification are to be determined by the competent authority by way of regulation or circular. If the ILR remains consistent with its notifi cationrequirements in the telecomsector,whichwill be governed by NIS2 too, then measures are likely to be notified by 31March of each year. Governance—Management Body Responsibilities Themanagement bodies of essential and important entities must approve the cybersecurity risk man agement measures, supervise their implementa tion, andmay be helddirectly liable for breaches of the law by the entity. Members of management bodies must undergo regular training, and entities must offer similar training to their staff, to acquire sufficient knowledge and skills to identify risks and assess cybersecurity risk management practices and their impact on the entity’s services. Significant Incident Notification Essentialandimportantentitiesmustnotifythecom petent authorityof any significant incident without undue delay. The mere act of notification does not increase the entity’s liability. An incident is “signifi cant” if it has caused, or is likely tocause, serious op erational disruption or financial losses, or if it has affectedorislikelytoaffectothernaturalorlegalper sons by causing considerable material, physical, or moral damage. The notification timeline is as follows and notifica tion requirements may be streamlined with other notification requirements as a result of the ongoing “omnibus” simplification initiatives on EU level: Preliminary notification (incl.indication of sus pectedmalicious act or potential crossborder im pact): Within 24 hours of awareness Incident notification (initial assessment of sever ity, impact, and indicators of compro mise): Within 72 hours of awareness Interim report (if requested by CSIRT or competent authority): Upon request Final report (detailed description, threat/root cause, mitigationmeasures, crossborder impact): Within 1 month of notification By exception, trust service providers, suchasLuxTrust,mustnotifysignificant incidentswithin24hours(ratherthan72 hours) of awareness. Supervision and Enforcement For essentialentities ,thecompetentau thorities exercise ex ante supervision on the basis of notified security measures and may conduct onsite inspections and remote controls (including random audits), regular and targeted security audits (by in dependent bodies or the authority), ad hoc audits (including following a significant incident), security scans, and requests for information, documents, or evidenceof implementation. For important entities , supervision is ex post in nature, triggered by evi dence, indications, or information suggesting non compliance. Enforcement powers in respect of essential entities include: issuingwarnings, adoptingbinding instruc tions (including remediation measures and dead lines), ordering cessationof infringing conduct, and ordering entities to ensure compliance with risk management and notification requirements. If enforcementmeasures remain ineffective, the com petent authoritymay apply to the President of the LuxembourgDistrict Court (sitting in interimpro ceedings) to seek a temporary suspension of certi fications or authorisations, or a temporary ban on aCEOor legal representative fromexercisingman agement functions—until the entity remedies the situation. These measures cannot be applied to public administration entities. Administrative Sanctions For essential entities in breach of the riskmanage ment obligations or significant incident notification duties: administrative fines of up to €10,000,000 or 2%of totalworldwide annual turnover of the pre ceding financial year of the undertaking to which the entity belongs, whichever is higher. For impor tant entities in breach of the same obligations: ad ministrative fines of up to €7,000,000 or 1.4% of total worldwide annual turnover , whichever is higher. For other breaches (registration/identifica tion, governance, reporting to the authority, DNS data obligations), sanctions include warnings, for mal reprimands, and administrative fines not ex ceeding €250,000 . Key ImplementationTakeaways Act nowon registration: Entities fallingwithin the scope of the lawmust provide registration informa tion to the ILRor CSSF by 10 July 2026. Assess your classification: Determine whether you are an essential or important entity – the dis tinction drives the intensity of supervision (ex ante vs. ex post). CERcritical entities: If you are (or are likely to be) designated as a critical entity under the CER law, you are automatically an essential entityunder this NIS2 law and must comply with the full suite of NIS2 obligations regardless of your size as from CER designation which is supposed to take place as by or around 17 July 2026. Management body accountability: Directors and seniormanagement are personally involved – they must approve cybersecuritymeasures, receive reg ular training, and may bear personal liability for failures. Review your incident response procedures: The 24hour preliminary notification obligation is de mandingandrequires robust internal escalationand logging procedures to be in place before an incident occurs. Supply chain: The explicit inclusion of supply chain security in the mandatory measures requires entitiestoassessandmanagecyberrisksarisingfrom their direct suppliers and service providers. The NIS2 Directive has been transposed: The Law of 5 May 2026 on Cybersecurity has been adopted General ȱ competent ȱ authority ȱ (Annex ȱ I ȱ & ȱ II ȱ sectors, ȱ and ȱ CER ȱ entities) ȱȱ Institut ȱ luxembourgeois ȱ de ȱ régulation ȱ (ILR) ȱȱ ȱ Banking ȱ and ȱ financial ȱ market ȱ infrastructure ȱ sectors; ȱ digital ȱ infrastructure ȱ and ȱ ICT ȱ services ȱ management ȱ for ȱ activities ȱ under ȱ CSSF ȱ supervision ȱȱ Commission ȱ de ȱ surveillance ȱ du ȱ secteur ȱ financier ȱ (CSSF) ȱȱ ȱ Single ȱ point ȱ of ȱ contact ȱ (cross Ȭ border ȱ liaison, ȱ intersectoral ȱ coordination) ȱȱ Haut Ȭ Commissariat ȱ à ȱ la ȱ Protection ȱ nationale ȱ (HCPN) ȱȱ Crisis ȱ management ȱ for ȱ major ȱ cybersecurity ȱ incidents ȱ (EU Ȭ CyCLONe ȱ representative) ȱȱ HCPN ȱȱ ȱ CSIRT ȱ for ȱ State ȱ administrations, ȱ public ȱ establishments, ȱ and ȱ CER ȱ critical ȱ entities ȱ (as ȱ GOVCERT.LU) ȱȱ HCPN ȱ / ȱ GOVCERT.LU ȱ ȱ ȱ CSIRT ȱ for ȱ all ȱ other ȱ cases ȱȱ ȱ CIRCL ȱ (Computer ȱ Incident ȱ Response ȱ Center ȱ Luxembourg) ȱ – ȱ also ȱ acts ȱ as ȱ the ȱ national ȱ coordinator ȱ for ȱ the ȱ coordinated ȱ vulnerability ȱ disclosure ȱ process, ȱ acting ȱ as ȱ a ȱ trusted ȱ intermediary ȱ between ȱ vulnerability ȱ reporters ȱ and ȱ TIC ȱ product/service ȱ manufacturers ȱ or ȱ providers ȱ ȱ Abonnement aumensuel (journal + éditiondigitale) 1an (11numéros) =55€abonnement pourLuxembourget Belgique - 65€pour autrespays L’édition digitale du mensuel en ligne sur notre site Internet www.agefi.lu est accessible automatiquement aux souscripteurs de l’éditionpapier. NOM:....................................................................................................................................................................... ADRESSE:.............................................................................................................................................................. LOCALITÉ:............................................................................................................................................................ PAYS:....................................................................................................................................................................... TELEPHONE:...................................................................................................................................................... EMAIL:.................................................................................................................................................................... - Je verse ……€ au compte d’AGEFI Luxembourg à la BIL / LU71 0020 1562 9620 0000 (BIC/Swift : BILLLULL) -Jedésireunefacture :...................................................................................................................................... -N°TVA : ................................................................................................................................................................ Abonnement aumensuel en ligne Si vouspréférezvous abonner en ligne, rendez-vous à lapage ‘S’abonner’ sur notre site In- ternet https://www.agefi.lu/Abonnements.aspx Abonnement à notre newsletter / Le Fax quotidien (5 jours/semaine, du lundi auvendredi) Informations en ligne sur https://www.agefi.lu/Abonnements.aspx Abonnez-vous / Subscribe
Made with FlippingBook
RkJQdWJsaXNoZXIy Nzk5MDI=