{"id":3690,"date":"2025-09-18T08:50:32","date_gmt":"2025-09-18T08:50:32","guid":{"rendered":"https:\/\/www.cyberbasics.org\/?p=3690"},"modified":"2025-09-18T08:51:30","modified_gmt":"2025-09-18T08:51:30","slug":"blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg","status":"publish","type":"post","link":"https:\/\/www.cyberbasics.org\/en\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/","title":{"rendered":"Blogartikel: De Cyberbeveiligingswet: koppeling met privacy en AVG"},"content":{"rendered":"<p>De <strong>Cyberbeveiligingswet (CBW)<\/strong> brengt niet alleen nieuwe verplichtingen voor cybersecurity, maar verbindt ook bestaande wetgeving zoals de <strong>GDPR<\/strong> aan de eisen van cyberweerbaarheid. De juristen van Waveland European Lawyers geven u een analyse van het wetsvoorstel voor de Cyberbeveiligngswet. Hier een voorbeeld van een opvallend accent van de Nederlandse wetgever.<br><br><strong>Artikel 59 CBW<\/strong>: dit artikel haalt delen uit de AVG (privacy wetgeving in Europa) binnen de vereisten van de Cyberbeveiligingswet (CBW). Als een incident betekent dat persoonsgegevens in gevaar zijn, meldt de toezichthouder CBW dit aan de Autoriteit Persoonsgegevens. Die zal dan bij uw organisatie komen om opheldering. In dat geval moet uw organisatie vastgelegd beleid kunnen tonen over uw privacy beleid.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><br>Wat betekent dit in de praktijk?<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Wanneer de toezichthouder een incident constateert dat persoonsgegevens raakt, wordt dit <strong>doorgespeeld aan de AP<\/strong>.<\/li>\n\n\n\n<li>De AP zal vervolgens bij uw organisatie om opheldering vragen.<\/li>\n\n\n\n<li>U moet dan <strong>aantoonbaar beleid en procedures rondom privacy<\/strong> kunnen laten zien.<\/li>\n<\/ul>\n\n\n\n<p>Met andere woorden: organisaties die onder de CBW vallen, moeten zorgen dat hun privacybeleid niet losstaat van hun cybersecuritybeleid.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><br>De uitdaging voor organisaties<\/h4>\n\n\n\n<p>Veel organisaties hebben wel een privacyverklaring of losse documenten over gegevensbescherming, maar missen een ge\u00efntegreerde aanpak. De CBW vraagt nu om:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Vastgelegd privacybeleid<\/strong> dat aansluit bij cybersecuritymaatregelen.<\/li>\n\n\n\n<li><strong>Duidelijke registraties<\/strong> die aantonen hoe incidenten en persoonsgegevens worden beheerd.<\/li>\n\n\n\n<li><strong>Bewijsvoering<\/strong> dat beleid en praktijk overeenkomen.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Hoe Cyber Basics helpt<\/h4>\n\n\n\n<p>Het <strong>Cyber Basics platform<\/strong> biedt een ge\u00efntegreerde aanpak:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Privacybeleid<\/strong> direct beschikbaar, gebaseerd op de AVG en CBW.<\/li>\n\n\n\n<li><strong>Procedures en registraties<\/strong> voor incidenten en dataverwerking.<\/li>\n\n\n\n<li><strong>Herinneringen en taken<\/strong> voor betrokken medewerkers.<\/li>\n\n\n\n<li><strong>Inzicht en overzicht<\/strong> in alle verplichtingen rondom privacy \u00e9n security.<\/li>\n<\/ul>\n\n\n\n<p>Zo kunt u altijd aantonen dat u voldoet \u2013 zowel aan de Cyberbeveiligingswet als aan de AVG.<\/p>\n\n\n\n<p><br>Wilt u meer weten over de koppeling tussen cybersecurity en privacy?<br>Lees verder of neem <a href=\"https:\/\/www.cyberbasics.org\/en\/contact\/\">contact met ons op<\/a> voor advies.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. <\/p>","protected":false},"author":1,"featured_media":3696,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_joinchat":[],"footnotes":""},"categories":[11],"tags":[],"class_list":["post-3690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberbeveiligingswet: privacy en AVG | Cyber Basics<\/title>\n<meta name=\"description\" content=\"In artikel 59 CBW staat dat incidenten waarbij persoonsgegevens in gevaar komen niet alleen gevolgen hebben onder de CBW. Lees hoe Cyber Basics helpt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberbasics.org\/en\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberbeveiligingswet: privacy en AVG | Cyber Basics\" \/>\n<meta property=\"og:description\" content=\"In artikel 59 CBW staat dat incidenten waarbij persoonsgegevens in gevaar komen niet alleen gevolgen hebben onder de CBW. Lees hoe Cyber Basics helpt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberbasics.org\/en\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Basics\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-18T08:50:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-18T08:51:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cbadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cbadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/\"},\"author\":{\"name\":\"cbadmin\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#\\\/schema\\\/person\\\/c40229d7c9327d309c3997840048c3b2\"},\"headline\":\"Blogartikel: De Cyberbeveiligingswet: koppeling met privacy en AVG\",\"datePublished\":\"2025-09-18T08:50:32+00:00\",\"dateModified\":\"2025-09-18T08:51:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/\"},\"wordCount\":311,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberbasics.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CBW-artikel-koppeling-met-privacy-en-AVG.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/\",\"url\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/\",\"name\":\"Cyberbeveiligingswet: privacy en AVG | Cyber Basics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberbasics.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CBW-artikel-koppeling-met-privacy-en-AVG.png\",\"datePublished\":\"2025-09-18T08:50:32+00:00\",\"dateModified\":\"2025-09-18T08:51:30+00:00\",\"description\":\"In artikel 59 CBW staat dat incidenten waarbij persoonsgegevens in gevaar komen niet alleen gevolgen hebben onder de CBW. Lees hoe Cyber Basics helpt.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberbasics.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CBW-artikel-koppeling-met-privacy-en-AVG.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberbasics.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CBW-artikel-koppeling-met-privacy-en-AVG.png\",\"width\":1200,\"height\":600,\"caption\":\"Koppeling met privacy en AVG\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberbasics.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogartikel: De Cyberbeveiligingswet: koppeling met privacy en AVG\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberbasics.org\\\/\",\"name\":\"Cyber Basics\",\"description\":\"Start compliance slim en betaalbaar.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#organization\"},\"alternateName\":\"Cyber Basics Compliance platform\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberbasics.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#organization\",\"name\":\"Cyber Basics\",\"alternateName\":\"The Compliance Platform\",\"url\":\"https:\\\/\\\/www.cyberbasics.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyberbasics.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Cyber-Basics-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberbasics.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Cyber-Basics-logo.png\",\"width\":768,\"height\":192,\"caption\":\"Cyber Basics\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyber-basics\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberbasics.org\\\/#\\\/schema\\\/person\\\/c40229d7c9327d309c3997840048c3b2\",\"name\":\"cbadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c9f2e20bbcc6d35221f7e2416ff5682340b1a32eda1f68c32d2d9d1b50decf96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c9f2e20bbcc6d35221f7e2416ff5682340b1a32eda1f68c32d2d9d1b50decf96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c9f2e20bbcc6d35221f7e2416ff5682340b1a32eda1f68c32d2d9d1b50decf96?s=96&d=mm&r=g\",\"caption\":\"cbadmin\"},\"sameAs\":[\"https:\\\/\\\/cbwebsite-d8grhmhsf4dfb0cz.germanywestcentral-01.azurewebsites.net\"],\"url\":\"https:\\\/\\\/www.cyberbasics.org\\\/en\\\/author\\\/cbadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberbeveiligingswet: privacy en AVG | Cyber Basics","description":"In artikel 59 CBW staat dat incidenten waarbij persoonsgegevens in gevaar komen niet alleen gevolgen hebben onder de CBW. Lees hoe Cyber Basics helpt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberbasics.org\/en\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/","og_locale":"en_GB","og_type":"article","og_title":"Cyberbeveiligingswet: privacy en AVG | Cyber Basics","og_description":"In artikel 59 CBW staat dat incidenten waarbij persoonsgegevens in gevaar komen niet alleen gevolgen hebben onder de CBW. Lees hoe Cyber Basics helpt.","og_url":"https:\/\/www.cyberbasics.org\/en\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/","og_site_name":"Cyber Basics","article_published_time":"2025-09-18T08:50:32+00:00","article_modified_time":"2025-09-18T08:51:30+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png","type":"image\/png"}],"author":"cbadmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cbadmin","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/#article","isPartOf":{"@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/"},"author":{"name":"cbadmin","@id":"https:\/\/www.cyberbasics.org\/#\/schema\/person\/c40229d7c9327d309c3997840048c3b2"},"headline":"Blogartikel: De Cyberbeveiligingswet: koppeling met privacy en AVG","datePublished":"2025-09-18T08:50:32+00:00","dateModified":"2025-09-18T08:51:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/"},"wordCount":311,"publisher":{"@id":"https:\/\/www.cyberbasics.org\/#organization"},"image":{"@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/","url":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/","name":"Cyberbeveiligingswet: privacy en AVG | Cyber Basics","isPartOf":{"@id":"https:\/\/www.cyberbasics.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png","datePublished":"2025-09-18T08:50:32+00:00","dateModified":"2025-09-18T08:51:30+00:00","description":"In artikel 59 CBW staat dat incidenten waarbij persoonsgegevens in gevaar komen niet alleen gevolgen hebben onder de CBW. Lees hoe Cyber Basics helpt.","breadcrumb":{"@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/#primaryimage","url":"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png","contentUrl":"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png","width":1200,"height":600,"caption":"Koppeling met privacy en AVG"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberbasics.org\/blogartikel-de-cyberbeveiligingswet-koppeling-met-privacy-en-avg\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberbasics.org\/"},{"@type":"ListItem","position":2,"name":"Blogartikel: De Cyberbeveiligingswet: koppeling met privacy en AVG"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberbasics.org\/#website","url":"https:\/\/www.cyberbasics.org\/","name":"Cyber Basics","description":"Start compliance slim en betaalbaar.","publisher":{"@id":"https:\/\/www.cyberbasics.org\/#organization"},"alternateName":"Cyber Basics Compliance platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberbasics.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cyberbasics.org\/#organization","name":"Cyber Basics","alternateName":"The Compliance Platform","url":"https:\/\/www.cyberbasics.org\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberbasics.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/01\/Cyber-Basics-logo.png","contentUrl":"https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/01\/Cyber-Basics-logo.png","width":768,"height":192,"caption":"Cyber Basics"},"image":{"@id":"https:\/\/www.cyberbasics.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber-basics\/"]},{"@type":"Person","@id":"https:\/\/www.cyberbasics.org\/#\/schema\/person\/c40229d7c9327d309c3997840048c3b2","name":"cbadmin","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/c9f2e20bbcc6d35221f7e2416ff5682340b1a32eda1f68c32d2d9d1b50decf96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c9f2e20bbcc6d35221f7e2416ff5682340b1a32eda1f68c32d2d9d1b50decf96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c9f2e20bbcc6d35221f7e2416ff5682340b1a32eda1f68c32d2d9d1b50decf96?s=96&d=mm&r=g","caption":"cbadmin"},"sameAs":["https:\/\/cbwebsite-d8grhmhsf4dfb0cz.germanywestcentral-01.azurewebsites.net"],"url":"https:\/\/www.cyberbasics.org\/en\/author\/cbadmin\/"}]}},"spectra_custom_meta":{"_uag_custom_page_level_css":[""],"site-sidebar-layout":["default"],"site-content-layout":[""],"ast-site-content-layout":["default"],"site-content-style":["default"],"site-sidebar-style":["default"],"ast-global-header-display":[""],"ast-banner-title-visibility":[""],"ast-main-header-display":[""],"ast-hfb-above-header-display":[""],"ast-hfb-below-header-display":[""],"ast-hfb-mobile-header-display":[""],"site-post-title":[""],"ast-breadcrumbs-content":[""],"ast-featured-img":[""],"footer-sml-layout":[""],"theme-transparent-header-meta":[""],"adv-header-id-meta":[""],"stick-header-meta":[""],"header-above-stick-meta":[""],"header-main-stick-meta":[""],"header-below-stick-meta":[""],"astra-migrate-meta-layouts":["set"],"ast-page-background-enabled":["default"],"ast-page-background-meta":["a:3:{s:7:\"desktop\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-4)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"tablet\";a:12:{s:16:\"background-color\";s:0:\"\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"mobile\";a:12:{s:16:\"background-color\";s:0:\"\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}}"],"ast-content-background-meta":["a:3:{s:7:\"desktop\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-5)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"tablet\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-5)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"mobile\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-5)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}}"],"footnotes":[""],"_elementor_edit_mode":[""],"_elementor_data":[""],"_yoast_wpseo_primary_category":["11"],"_yoast_wpseo_estimated-reading-time-minutes":["2"],"_yoast_wpseo_content_score":["90"],"_wp_old_slug":["test-bsf4","cyber-basics-nu-beschikbaar-in-microsoft-marketplace-appsource-en-azure-portal","cyber-basics-blog-dossier-cyberbeveiligingswet-cbw","blogartikel-de-cyberbeveiligingswet-vastgelegd-beleid-is-verplicht"],"_wp_old_date":["2025-05-12"],"_yoast_wpseo_focuskw":["Cyberbeveiligingswet koppeling met privacy en AVG"],"_yoast_wpseo_metadesc":["In artikel 59 CBW staat dat incidenten waarbij persoonsgegevens in gevaar komen niet alleen gevolgen hebben onder de CBW. Lees hoe Cyber Basics helpt."],"_yoast_wpseo_linkdex":["71"],"_yoast_wpseo_title":["Cyberbeveiligingswet: privacy en AVG | Cyber Basics"],"_thumbnail_id":["3696"],"_dp_original":["3663"],"_edit_lock":["1759230527:2"],"_edit_last":["2"],"_uagb_previous_block_counts":["a:90:{s:21:\"uagb\/advanced-heading\";i:0;s:15:\"uagb\/blockquote\";i:0;s:12:\"uagb\/buttons\";i:0;s:18:\"uagb\/buttons-child\";i:0;s:19:\"uagb\/call-to-action\";i:0;s:15:\"uagb\/cf7-styler\";i:0;s:11:\"uagb\/column\";i:0;s:12:\"uagb\/columns\";i:0;s:14:\"uagb\/container\";i:0;s:21:\"uagb\/content-timeline\";i:0;s:27:\"uagb\/content-timeline-child\";i:0;s:14:\"uagb\/countdown\";i:0;s:12:\"uagb\/counter\";i:0;s:8:\"uagb\/faq\";i:0;s:14:\"uagb\/faq-child\";i:0;s:10:\"uagb\/forms\";i:0;s:17:\"uagb\/forms-accept\";i:0;s:19:\"uagb\/forms-checkbox\";i:0;s:15:\"uagb\/forms-date\";i:0;s:16:\"uagb\/forms-email\";i:0;s:17:\"uagb\/forms-hidden\";i:0;s:15:\"uagb\/forms-name\";i:0;s:16:\"uagb\/forms-phone\";i:0;s:16:\"uagb\/forms-radio\";i:0;s:17:\"uagb\/forms-select\";i:0;s:19:\"uagb\/forms-textarea\";i:0;s:17:\"uagb\/forms-toggle\";i:0;s:14:\"uagb\/forms-url\";i:0;s:14:\"uagb\/gf-styler\";i:0;s:15:\"uagb\/google-map\";i:0;s:11:\"uagb\/how-to\";i:0;s:16:\"uagb\/how-to-step\";i:0;s:9:\"uagb\/icon\";i:0;s:14:\"uagb\/icon-list\";i:0;s:20:\"uagb\/icon-list-child\";i:0;s:10:\"uagb\/image\";i:0;s:18:\"uagb\/image-gallery\";i:0;s:13:\"uagb\/info-box\";i:0;s:18:\"uagb\/inline-notice\";i:0;s:11:\"uagb\/lottie\";i:0;s:21:\"uagb\/marketing-button\";i:0;s:10:\"uagb\/modal\";i:0;s:18:\"uagb\/popup-builder\";i:0;s:16:\"uagb\/post-button\";i:0;s:18:\"uagb\/post-carousel\";i:0;s:17:\"uagb\/post-excerpt\";i:0;s:14:\"uagb\/post-grid\";i:0;s:15:\"uagb\/post-image\";i:0;s:17:\"uagb\/post-masonry\";i:0;s:14:\"uagb\/post-meta\";i:0;s:18:\"uagb\/post-taxonomy\";i:0;s:18:\"uagb\/post-timeline\";i:0;s:15:\"uagb\/post-title\";i:0;s:20:\"uagb\/restaurant-menu\";i:0;s:26:\"uagb\/restaurant-menu-child\";i:0;s:11:\"uagb\/review\";i:0;s:12:\"uagb\/section\";i:0;s:14:\"uagb\/separator\";i:0;s:11:\"uagb\/slider\";i:0;s:17:\"uagb\/slider-child\";i:0;s:17:\"uagb\/social-share\";i:0;s:23:\"uagb\/social-share-child\";i:0;s:16:\"uagb\/star-rating\";i:0;s:23:\"uagb\/sure-cart-checkout\";i:0;s:22:\"uagb\/sure-cart-product\";i:0;s:15:\"uagb\/sure-forms\";i:0;s:22:\"uagb\/table-of-contents\";i:0;s:9:\"uagb\/tabs\";i:0;s:15:\"uagb\/tabs-child\";i:0;s:18:\"uagb\/taxonomy-list\";i:0;s:9:\"uagb\/team\";i:0;s:16:\"uagb\/testimonial\";i:0;s:14:\"uagb\/wp-search\";i:0;s:19:\"uagb\/instagram-feed\";i:0;s:10:\"uagb\/login\";i:0;s:17:\"uagb\/loop-builder\";i:0;s:18:\"uagb\/loop-category\";i:0;s:20:\"uagb\/loop-pagination\";i:0;s:15:\"uagb\/loop-reset\";i:0;s:16:\"uagb\/loop-search\";i:0;s:14:\"uagb\/loop-sort\";i:0;s:17:\"uagb\/loop-wrapper\";i:0;s:13:\"uagb\/register\";i:0;s:19:\"uagb\/register-email\";i:0;s:24:\"uagb\/register-first-name\";i:0;s:23:\"uagb\/register-last-name\";i:0;s:22:\"uagb\/register-password\";i:0;s:30:\"uagb\/register-reenter-password\";i:0;s:19:\"uagb\/register-terms\";i:0;s:22:\"uagb\/register-username\";i:0;}"]},"uagb_featured_image_src":{"full":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png",1200,600,false],"thumbnail":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG-150x150.png",150,150,true],"medium":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG-300x150.png",300,150,true],"medium_large":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG-768x384.png",768,384,true],"large":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG-1024x512.png",1024,512,true],"1536x1536":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png",1200,600,false],"2048x2048":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG.png",1200,600,false],"trp-custom-language-flag":["https:\/\/www.cyberbasics.org\/wp-content\/uploads\/2025\/09\/CBW-artikel-koppeling-met-privacy-en-AVG-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"cbadmin","author_link":"https:\/\/www.cyberbasics.org\/en\/author\/cbadmin\/"},"uagb_comment_info":1,"uagb_excerpt":"Lorem ipsum dolor sit amet, consectetur adipiscing elit.","_links":{"self":[{"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/posts\/3690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/comments?post=3690"}],"version-history":[{"count":5,"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/posts\/3690\/revisions"}],"predecessor-version":[{"id":3702,"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/posts\/3690\/revisions\/3702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/media\/3696"}],"wp:attachment":[{"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/media?parent=3690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/categories?post=3690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberbasics.org\/en\/wp-json\/wp\/v2\/tags?post=3690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}