{"id":13845,"date":"2023-05-01T21:47:31","date_gmt":"2023-05-01T21:47:31","guid":{"rendered":"https:\/\/cybercrime.rs\/?page_id=13845"},"modified":"2023-06-02T10:49:21","modified_gmt":"2023-06-02T10:49:21","slug":"rs-cyber-security","status":"publish","type":"page","link":"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/","title":{"rendered":"RS Cyber Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"13845\" class=\"elementor elementor-13845\">\n\t\t\t\t\t\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-1c6f29dd elementor-section-items-bottom elementor-section-height-full elementor-section-boxed elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"1c6f29dd\" data-element_type=\"section\" id=\"up\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;background_motion_fx_opacity_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_opacity_direction&quot;:&quot;out-in-out&quot;,&quot;background_motion_fx_opacity_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:92}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;],&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_opacity_level&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f9e0750 ae-bg-gallery-type-default\" data-id=\"7f9e0750\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19e4217f elementor-widget elementor-widget-spacer\" data-id=\"19e4217f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-container{--container-widget-width:100%}.e-container>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));-ms-flex-item-align:stretch;align-self:stretch;-ms-flex-negative:0;flex-shrink:0}.e-container>.elementor-widget-spacer>.elementor-widget-container,.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a25ce6b elementor-widget elementor-widget-heading\" data-id=\"a25ce6b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Cyber Security in Serbia<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90b754c elementor-mobile-align-left elementor-align-left elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"90b754c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/cybercrime.rs\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-list.min.css\">\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cybercrime.rs\/en\/up2date\/\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-target-2\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Know<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cybercrime.rs\/en\/fellowship\/\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-social-share\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Connect<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cybercrime.rs\/en\/contact\/\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-share\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Share<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54eb4f20 elementor-widget elementor-widget-spacer\" data-id=\"54eb4f20\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18b53e2a elementor-widget elementor-widget-spacer\" data-id=\"18b53e2a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-274f6e17 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"274f6e17\" data-element_type=\"section\" id=\"home\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1aeeb08b ae-bg-gallery-type-default\" data-id=\"1aeeb08b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56dbff08 elementor-widget elementor-widget-spacer\" data-id=\"56dbff08\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc046a0 elementor-widget elementor-widget-heading\" data-id=\"4cc046a0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">This page contains information on institutional framework of cyber security in Serbia<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69ad4ac6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"69ad4ac6\" data-element_type=\"widget\" id=\"home\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-down\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d2e1dd elementor-widget elementor-widget-spacer\" data-id=\"5d2e1dd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2231a4d elementor-widget elementor-widget-text-editor\" data-id=\"2231a4d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><a href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#reg\">Legislation &gt;&gt;<\/a><\/p><p><a href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#poj\">Terms &gt;&gt;<\/a><\/p><p><a href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#inst\">Key players &gt;&gt;<\/a><\/p><p><a href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#odg\">Responsibilities &gt;&gt;<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ccc5001 elementor-widget elementor-widget-spacer\" data-id=\"3ccc5001\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d1a98be elementor-widget elementor-widget-heading\" data-id=\"2d1a98be\" data-element_type=\"widget\" id=\"reg\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Legislation<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd84ed5 elementor-widget elementor-widget-heading\" data-id=\"fd84ed5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strategy, law, by-laws<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-305ec4ca elementor-widget elementor-widget-spacer\" data-id=\"305ec4ca\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1865f elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"7c1865f\" data-element_type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;informaciona&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/cybercrime.rs\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-animated-headline.min.css\">\t\t<h3 class=\"elementor-headline\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">Legislator does not use the term 'cyber' but <\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">information<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">security<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a99c3 elementor-widget elementor-widget-spacer\" data-id=\"a5a99c3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64775f2 elementor-widget elementor-widget-toggle\" data-id=\"64775f2\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-toggle{text-align:left}.elementor-toggle .elementor-tab-title{font-weight:700;line-height:1;margin:0;padding:15px;border-bottom:1px solid #d4d4d4;cursor:pointer;outline:none}.elementor-toggle .elementor-tab-title .elementor-toggle-icon{display:inline-block;width:1em}.elementor-toggle .elementor-tab-title .elementor-toggle-icon svg{-webkit-margin-start:-5px;margin-inline-start:-5px;width:1em;height:1em}.elementor-toggle .elementor-tab-title .elementor-toggle-icon.elementor-toggle-icon-right{float:right;text-align:right}.elementor-toggle .elementor-tab-title .elementor-toggle-icon.elementor-toggle-icon-left{float:left;text-align:left}.elementor-toggle .elementor-tab-title .elementor-toggle-icon .elementor-toggle-icon-closed{display:block}.elementor-toggle .elementor-tab-title .elementor-toggle-icon .elementor-toggle-icon-opened{display:none}.elementor-toggle .elementor-tab-title.elementor-active{border-bottom:none}.elementor-toggle .elementor-tab-title.elementor-active .elementor-toggle-icon-closed{display:none}.elementor-toggle .elementor-tab-title.elementor-active .elementor-toggle-icon-opened{display:block}.elementor-toggle .elementor-tab-content{padding:15px;border-bottom:1px solid #d4d4d4;display:none}@media (max-width:767px){.elementor-toggle .elementor-tab-title{padding:12px}.elementor-toggle .elementor-tab-content{padding:12px 10px}}.e-container>.elementor-widget-toggle{width:var(--container-widget-width,100%)}<\/style>\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1051\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1051\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Information Society and Information Security Development Strategy in the Republic of Serbia for the period from 2021 to 2026<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1051\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1051\"><p>It determines the goals and measures for the development of the information society and information security<\/p><p>In terms of information security, the Strategy contains:<\/p><p>1) Description of the current situation:<\/p><ul><li class=\" translation-block\">Realization  of <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/strategija\/2017\/53\/1\/reg\" target=\"_self\">Strategy<\/a> for the development of information security for the period from 2017 to 2020<\/li><li>State of information security (citizens, businesses, ICT systems of special importance)<\/li><\/ul><p>2) Changes achieved through the implementation of the Strategy<\/p><p>3) Goals of the Strategy<\/p><p>4) Strategy implementation mechanism and method of reporting on implementation results<\/p><p>5) Conducted consultations with interested parties;<\/p><p>6) Assessment of financial resources needed for the implementation of the Strategy and analysis of financial effects;<\/p><p>7) Action plan for the implementation of the Information Society and Information Security Development Strategy in the Republic of Serbia for the period from 2021 to 2026;<\/p><p>8) Final part;<\/p><p>9) Table of the Action Plan for the implementation of the Strategy for the period from 2021 to 2023<\/p><p><a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/strategija\/2021\/86\/1\/reg\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1052\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1052\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Law on Information Security (LIS)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1052\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1052\"><p>It regulates:<\/p><ul><li>liability of legal persons in the management and use of information\nand communication systems<\/li><li>lays down protection measures against security risks in information and\ncommunication systems<\/li><li>coordination between protection factors<\/li><li>monitoring the proper application of prescribed protection measures<\/li><\/ul><p><a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/skupstina\/zakon\/2016\/6\/5\/reg\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1053\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-1053\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">By-laws<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1053\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1053\"><ul><li class=\" translation-block\">Regulation on determining the list of activities in areas where activities of general interest are performed and where information and communication systems of special importance are used. <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2019\/94\/6\" target=\"_self\">Link<\/a><\/li><li>Regulation on the closer arrangement of measures for the protection of information and communication systems of special importance.<a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2016\/94\/2\/reg\" target=\"_blank\" rel=\"noopener\"> Link<\/a><\/li><li>Regulation on the notification procedure for incidents in information and communication systems of special importance. <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2020\/11\/3\/reg\">Link<\/a><\/li><li>Regulation on the detailed content of the act on the security of information and communication systems of special importance, the method of verification and the content of the report on the security of information and communication systems of special importance. <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2016\/94\/1\/reg\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/li><li class=\" translation-block\">Regulation on cryptosecurity and protection against compromising electromagnetic radiation. <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2019\/57\/2\" target=\"_self\">Link<\/a><\/li><li>Regulation on the safety and protection of children when using information and communication technologies. <a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2020\/13\/4\/reg\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/li><li>Rulebook on data contained in the records of operators of information and communication systems of particular importance. <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/ministarstva\/pravilnik\/2020\/9\/2\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/li><li class=\" translation-block\">Rulebook on the type, form and method of submitting statistical data on incidents in information and communication systems of special importance. <a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/drugidrzavniorganiorganizacije\/pravilnik\/2020\/76\/1\" target=\"_self\">Link<\/a><\/li><li class=\" translation-block\">Rulebook on the content, registration and record keeping of special centers for the prevention of security risks in information and communication systems. <a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/drugidrzavniorganizacija\/pravilnik\/2020\/37\/1\" target=\"_self\">Link<\/a><\/li><li>Decision on the formation of the Body for the Coordination of Information Security Affairs. <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/odluka\/2020\/8\/4\/reg\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-913ca4d elementor-widget elementor-widget-spacer\" data-id=\"913ca4d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3c2f8d elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"e3c2f8d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/cybercrime.rs\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-box.min.css\">\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-key\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tHow is information security achieved?\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6354eb4 elementor-widget elementor-widget-spacer\" data-id=\"6354eb4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb94831 elementor-widget elementor-widget-text-editor\" data-id=\"cb94831\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\" translation-block\">1) <strong>Protection measures<\/strong> against security risks in information and communication systems of special importance are prescribed<\/p><p class=\" translation-block\">2) The <strong>responsibility<\/strong> of legal entities during the management and use of information and communication systems is regulated, by prescribing<\/p><ul><li>obligation in risk prevention and management<\/li><li>obligation in the event of an incident<\/li><li>misdemeanors for failure to comply with those obligations<\/li><\/ul><p class=\" translation-block\">3) <strong>Institutions<\/strong> have been determined for the coordination and monitoring of the proper application of prescribed protection measures<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3099341 elementor-widget elementor-widget-spacer\" data-id=\"3099341\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9130be elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"a9130be\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#home\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-up\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5b98a2 elementor-widget elementor-widget-spacer\" data-id=\"c5b98a2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-191f87a elementor-widget elementor-widget-heading\" data-id=\"191f87a\" data-element_type=\"widget\" id=\"poj\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TERMS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5adf25 elementor-widget elementor-widget-heading\" data-id=\"a5adf25\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information security, incident, information and communication system of special importance<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ce3c9a elementor-widget elementor-widget-spacer\" data-id=\"0ce3c9a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89340f elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"89340f\" data-element_type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;podacima&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-headline\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">Information security is a set of measures that enables <\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">data<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">, which are handled through the information and communication system,  <\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec8da7 elementor-widget elementor-widget-text-editor\" data-id=\"ec8da7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li class=\" translation-block\">protection <strong>against unauthorized access<\/strong><\/li><li class=\" translation-block\"><strong>integrity<\/strong> protection<\/li><li class=\" translation-block\"><strong>availability<\/strong> protection<\/li><li class=\" translation-block\"><strong>authenticity<\/strong> protection<\/li><li class=\" translation-block\"><strong>non-repudiation<\/strong> protection<\/li><\/ul><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ec3dc7 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"6ec3dc7\" data-element_type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;IKT&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-headline\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">so that<\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">ICT<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">system functions<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e61b95 elementor-widget elementor-widget-text-editor\" data-id=\"8e61b95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li class=\" translation-block\"><strong>as<\/strong> intended<\/li><li class=\" translation-block\"><strong>when<\/strong> intended<\/li><li class=\" translation-block\">under <strong>control<\/strong> of authorized persons<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cebe8d0 elementor-widget elementor-widget-spacer\" data-id=\"3cebe8d0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b423b5f elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b423b5f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is an information and communication system (ICT system)?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f604b33 elementor-widget elementor-widget-text-editor\" data-id=\"3f604b33\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A technological and\norganizational unit that includes:<\/p><p>(1) electronic communications networks within the meaning of the law\ngoverning electronic communications;<\/p><p>(2)  devices or groups of interconnected devices, such that automatic\nprocessing of data is performed within the devices, or within at least one of the\ngroup of devices, using a computer program;<\/p><p>(3) data, handled, kept, processed, searched or transmitted by elements\ncovered under subitems (1) and (2) of this item, for the purposes of their\noperation, use, protection or maintenance;<\/p><p>(4) organizational structure through which the ICT system is managed;<\/p><p>(5) all types of system and application software and software development\ntools<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ee48ded elementor-widget elementor-widget-spacer\" data-id=\"4ee48ded\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b65e711 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"6b65e711\" data-element_type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;Incident&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-headline\">\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Incident<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">is any event that has a negative impact on security of network and\ninformation systems<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07b6988 elementor-widget elementor-widget-spacer\" data-id=\"07b6988\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38934e9 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"38934e9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">To which incidents does LIS apply?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c5fe643 elementor-widget elementor-widget-text-editor\" data-id=\"7c5fe643\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>LIS is applied only to incidents<\/p>\n<ul>\n<li>incidents in ICT systems of special importance<\/li>\n<li>which can have a significant impact on information security breaches<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f88872d elementor-widget elementor-widget-spacer\" data-id=\"f88872d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa659b8 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"aa659b8\" data-element_type=\"widget\" id=\"inc\" data-settings=\"{&quot;highlighted_text&quot;:&quot;od posebnog zna\\u010daja&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-headline\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">What is ICT system of <\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">special importance<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">?<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6e0940 elementor-widget elementor-widget-spacer\" data-id=\"d6e0940\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efe6351 elementor-widget elementor-widget-heading\" data-id=\"efe6351\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">These are ICT systems used for:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c50950 elementor-widget elementor-widget-toggle\" data-id=\"3c50950\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6321\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-6321\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">the performance of tasks in public authorities<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6321\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-6321\"><p>Public authority is:<\/p><ul><li>a state authority<\/li><li>an autonomous province's authority<\/li><li>a\nlocal self-government unit's authority<\/li><li>an organization and another legal entity or natural person\nwhom is confidred with the exercise of public powers<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6322\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-6322\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">the processing of special categories of personal data within the meaning of the law\ngoverning the protection of personal data<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6322\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-6322\"><p>In this way, the circle of operators of ICT systems of special importance has been additionally expanded to include all legal entities, authorities, organizational units of authorities that carry out permitted processing of particularly sensitive data.\u00a0<\/p><p><span style=\"text-decoration: underline;\">What are particularly sensitive data?<\/span><\/p><ul><li>data related to race<\/li><li>data related to ethnicity<\/li><li>data related to political opinion<\/li><li>data related to religious or philosophical beliefs<\/li><li>data related to union membership<\/li><li>genetic data<\/li><li>biometric data for identification of a person<\/li><li>data related to health\u00a0<\/li><li>data related to sexual life or sexual orientation of a natural person<\/li><\/ul><p class=\" translation-block\">In terms of Art. 17 of Personal Data Protection Law, <span style=\"text-decoration: underline\">processing<\/span> of special types of personal data is <span style=\"text-decoration: underline\">prohibited<\/span><\/p><p class=\" translation-block\">Exceptionally, the <span style=\"text-decoration: underline\">processing<\/span> of special types of personal data is <span style=\"text-decoration: underline\">permitted<\/span> (Art. 17):<\/p><p class=\"normal translation-block\">1) the person to whom the data refer has given <em>express consent<\/em> to processing for one or more processing purposes, unless it is prescribed by law that processing is not carried out on the basis of consent;<\/p><p class=\"normal translation-block\">2) the processing is <em>necessary in order to fulfill the obligations or apply the legally prescribed powers<\/em> of the controller or the person to whom the data refer in the field of work, social insurance and social protection, if such processing is prescribed by law or a collective agreement that prescribes implementation of appropriate measures to protect the basic rights, freedoms and interests of the persons to whom the data refer;<\/p><p class=\"normal translation-block\">3) processing is<em> necessary in order to protect vital interests of the person<\/em> to whom the data refer or another natural person, if the person to whom the data refer is physically or legally unable to give consent;<\/p><p class=\"normal translation-block\">4) the processing is <em>performed within the framework of the registered activity and with the application of appropriate protection measures<\/em> by an endowment, foundation, association or other non-profit organization with a political, philosophical, religious or trade union goal, provided that the processing is exclusively to members, that is, former members of that organization or persons who have regular contact with it in connection with the organization's goal, as well as that personal data is not disclosed outside of that organization without the consent of the person to whom it relates;<\/p><p class=\"normal translation-block\">5) personal data, that the person to whom they refer <em>obviously made them publicly available<\/em>, is processed;<\/p><p class=\"normal translation-block\">6) processing is <em>necessary<\/em> in order to submit, realize or defend a <em> legal claim<\/em> or in the case when a <em>court is acting<\/em> within its jurisdiction;<\/p><p class=\"normal translation-block\">7) processing is <em>necessary<\/em> in order to achieve <em>significant public interest<\/em> determined by <em>law<\/em>, if such processing is <em>proportional to achieving the goal<\/em>, with respect for the essence of the right to protection of personal data and if the application of appropriate and special measures to protect the basic rights and interests of the persons to whom these data refer is ensured;<\/p><p class=\"normal translation-block\">8) the processing is <em>necessary<\/em> for the purpose of preventive <em>medicine or occupational medicine<\/em>, for the purpose of assessing the working ability of employees, medical diagnostics, provision of health or social protection services, i.e. management of health or social systems, on the basis of the law or on the basis of a contract with a healthcare worker, if the processing is carried out by or under the supervision of a healthcare worker or another person who has an obligation to keep professional secrecy prescribed by law or professional rules;<\/p><p class=\"normal translation-block\">9) processing is necessary in order to achieve public interest <em>in the field of public health<\/em>, such as protection from serious cross-border threats to the health of the population or ensuring high standards of quality and safety of health care and medicines or medical devices, based on the law which provides appropriate and special measures to protect the rights and freedoms of the persons to whom the data refer, especially with regard to professional secrecy;<\/p><p class=\"normal translation-block\">10) processing is <em>necessary for the purposes<\/em> of archiving in the public interest, for the purposes of scientific or historical research and for statistical purposes, in accordance with Article 92, paragraph 1 of this law, if such processing is proportionate to the achievement of the goals they intend to achieve, while respecting the essence of the right to protection of personal data and if the application of appropriate and special measures to protect the basic rights and interests of the persons to whom these data refer is ensured.<\/p><p class=\" translation-block\">Processing of special types of data by competent authorities <span style=\"text-decoration: underline\">for special purposes<\/span> (for the purpose of preventing, investigating and detecting criminal acts, prosecuting perpetrators of criminal acts or enforcing criminal sanctions, including preventing and protection against threats to public and national security) <span style=\"text-decoration: underline\">is allowed<\/span> (Art. 18 <a href=\"http:\/\/www.pravno-informacioni-sistem.rs \/SlGlasnikPortal\/eli\/rep\/sgrs\/skupstina\/zakon\/2018\/87\/13\/reg\" target=\"_blank\" rel=\"noopener\">ZZPL<\/a>):<\/p><ul><li class=\"normal\">if neccessary<\/li><li class=\"normal\">with the application of appropriate measures to protect the rights of the persons to whom the data refer<\/li><li class=\"normal\">in one of the following cases:<\/li><\/ul><p class=\"normal\">1) the competent authority is authorized by law to process special types of personal data;<\/p><p class=\"normal\">2) the processing of special types of personal data is carried out in order to protect vital interests of the person to whom the data refer or another natural person;<\/p><p class=\"normal\">3) processing refers to special types of personal data that the person to whom they relate to has apparently made them available to the public.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6323\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-6323\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">the performance of activities of general interest and other economic activities<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6323\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-6323\"><p class=\" translation-block\">LIS lists the areas in which these activities are carried out, and a detailed list of activities for each of these areas is established by<a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/ ordinance\/2019\/94\/6\" target=\"_self\"> Regulation<\/a><\/p><p>In this way, the circle of ICT system operators of special importance is broadly set in a large number of areas:<\/p><p>(1) Energy:<\/p><p>- production, transmission and distribution of electricity<\/p><p>- coal production and processing\u00a0<\/p><p>- production, processing, transport and distribution of oil and trade of oil and\npetroleum products<\/p><p>- research, production, processing, transport and distribution of natural and liquid\ngas<\/p><p>(2) Transport:<\/p><p>- railway, postal and air traffic<\/p><p>(3) Health sector:<\/p><p>- health care<\/p><p>(4) Banking and financial markets:<\/p><p>- operations of financial institutions<\/p><p>- management of data registry on obligations of natural and legal persons to\nfinancial institutions<\/p><p>- management operations and activities related to the functioning of a regulated\nmarket<\/p><p>5) Digital infrastructure:<\/p><p>- exchange of internet traffic<\/p><p>- management of the national Internet domain registry and the naming system in\na network (DNS systems)<\/p><p>(6) Public goods:<\/p><p>- use, management, protection and improvement of public goods (water, roads,\nmineral resources, forests, navigable rivers, lakes, riverbanks, spas, wildlife,\nprotected areas)<\/p><p>(7) Information society services:<\/p><p>- information society services within the meaning of the law governing electronic commerce<\/p><p>(8) Other areas:<\/p><p>- electronic communication<\/p><p>- publication of an official gazette of the Republic of Serbia<\/p><p>- management of nuclear facilities<\/p><p>- production, trade and transport of weapons and military equipment<\/p><p>- waste management<\/p><p>- utility services<\/p><p>- production and supply of chemicals<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6324\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"tab\" aria-controls=\"elementor-tab-content-6324\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">in legal entities and institutions<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6324\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-6324\"><p>established by the Republic of Serbia, the\nautonomous province or a local self-government unit for the performance of activity referred to\nin item 3) above<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6f1136 elementor-widget elementor-widget-spacer\" data-id=\"d6f1136\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7315c40 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"7315c40\" data-element_type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;zna\\u010dajan uticaj&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-headline\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">Which incidents in ICT systems of special importance have a <\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">significant impact<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">?<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6d7fdc elementor-widget elementor-widget-text-editor\" data-id=\"b6d7fdc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\" translation-block\">1) incidents having a disruptive effect on the performance of tasks and provision of\nservices, or causing significant difficulties in performance of tasks and provision of services<\/p><p class=\" translation-block\">2) incidents impacting a great number of users, lasting for a long time<\/p><p class=\" translation-block\">3) incidents having a disruptive effect on, or causing difficulties in performance of tasks\nand provision of services, with an impact on performance of tasks and provision of services of\nother operators of ICT systems of special importance or on public safety<\/p><p class=\" translation-block\">4) incidents having a disruptive effect, or causing difficulties in performance of tasks\nand provision of services and affecting a major part of the territory of the Republic of Serbia<\/p><p class=\" translation-block\">5) incidents leading to unauthorized access to protected data whose disclosure may\njeopardize rights and interest of data subjects<\/p><p class=\" translation-block\">6) incidents resulting from incidents in the ICT system in the area of information society services, when the ICT system of special importance uses the\ninformation services of this ICT system<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-064a737 elementor-widget elementor-widget-spacer\" data-id=\"064a737\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfb863b elementor-widget elementor-widget-heading\" data-id=\"cfb863b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How and to whom to report an incident?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90d0410 elementor-widget elementor-widget-button\" data-id=\"90d0410\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cybercrime.rs\/en\/report-a-crime\/\" target=\"_blank\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-alt-circle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Report!<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8eabf30 elementor-widget elementor-widget-spacer\" data-id=\"8eabf30\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92935d8 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"92935d8\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#home\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-up\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99f3a77 elementor-widget elementor-widget-spacer\" data-id=\"99f3a77\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-886c435 elementor-widget elementor-widget-heading\" data-id=\"886c435\" data-element_type=\"widget\" id=\"inst\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">KEY PLAYERS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0421551 elementor-widget elementor-widget-heading\" data-id=\"0421551\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protection factors<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa004fd elementor-widget elementor-widget-spacer\" data-id=\"fa004fd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-inner-section elementor-element elementor-element-434b098c elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"434b098c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-76dfa313 ae-bg-gallery-type-default\" data-id=\"76dfa313\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c9323ec elementor-widget elementor-widget-heading\" data-id=\"7c9323ec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ministry of Information and Telecommunications <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74eba89c elementor-widget elementor-widget-spacer\" data-id=\"74eba89c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62a0db02 elementor-widget elementor-widget-text-editor\" data-id=\"62a0db02\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\" translation-block\">The <a href=\"https:\/\/www.mit.gov.rs\/\" target=\"_self\">Ministry of Information and Telecommunications<\/a> (Competent authority) is responsible for the security of ICT systems<\/p><p class=\" translation-block\">Previously, the Ministry of Trade, Tourism and Telecommunications was responsible, within which there was <a href=\"https:\/\/mtt.gov.rs\/tekst\/99\/sektor-za-informaciono-drustvo-i-informacionu-bezbednost.php \" target=\"_self\">Sector for Information Society and Information Security<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57aca620 ae-bg-gallery-type-default\" data-id=\"57aca620\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4aff303a elementor-widget elementor-widget-heading\" data-id=\"4aff303a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sector for information society and information security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29b422cf elementor-widget elementor-widget-spacer\" data-id=\"29b422cf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1beb4d68 elementor-widget elementor-widget-text-editor\" data-id=\"1beb4d68\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Within <a href=\"https:\/\/www.mit.gov.rs\/tekst\/702\/sektor-za-informaciono-drustvo-i-informacionu-bezbednost.php\" target=\"_blank\" rel=\"noopener\">the Ministry of Information and Telecommunications<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9ebe83 elementor-widget elementor-widget-toggle\" data-id=\"b9ebe83\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1941\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1941\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Tasks in the field of information security:<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1941\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1941\"><ul><li>preparation and drafting of laws and other regulations from the scope of the Sector<\/li><li>preparation and drafting of opinions on laws and other regulations from the scope of the Sector and preparation and drafting of opinions on laws and other regulations of other state bodies, which are related to the scope of the Sector<\/li><li>preventive action and inspection supervision over the implementation of laws and other regulations regulating information security<\/li><li>providing professional assistance in the preparation of tender documentation and preparing for the publication and implementation of the competition<\/li><li>analyzing database structure and data exchange format<\/li><li>data protection and information security<\/li><li>participation in processes related to professional development of civil servants in the Sector and other tasks within the scope of the Sector<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1942\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1942\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Internal units of the Sector:<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1942\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1942\"><ol><li>Department for regulation in the field of information society<\/li><li>Support Group for the work of the National Contact Center for Child Internet Safety<\/li><li>Group for analysis and planning in the field of information society<\/li><li class=\" translation-block\"><span style=\"text-decoration: underline\">Inspection supervision and control group<\/span> in the field of electronic identification, trusted services and information security for planning and preparation of ICT system protection measures<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-inner-section elementor-element elementor-element-45fe3342 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"45fe3342\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-282c856c ae-bg-gallery-type-default\" data-id=\"282c856c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8345924 elementor-widget elementor-widget-heading\" data-id=\"8345924\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ministry of Defense<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cd68a31 elementor-widget elementor-widget-spacer\" data-id=\"6cd68a31\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cfa86d6 elementor-widget elementor-widget-text-editor\" data-id=\"6cfa86d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The Ministry of Defense is responsible for information security related to<\/p><ul><li>approval of cryptographic products<\/li><li>distribution of crypto materials<\/li><li>protection against compromised electromagnetic radiation (CEMR)<\/li><li>other tasks and activities in\naccordance with the law and regulations adopted on the basis of the law<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68c95ae8 elementor-widget elementor-widget-toggle\" data-id=\"68c95ae8\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1751\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1751\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Tasks<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1751\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1751\"><p>1) organize and implement the scientific research in the field of cryptographic security\nand protection against CEMR<\/p><p>2) develop, implement, verify and classify the cryptographic algorithms<\/p><p>3) research, develop, verify and classify its own cryptographic products and solutions\nfor CEMR protection<\/p><p>4) verify and classify national and foreign cryptographic products and solutions for\nCEMR protection<\/p><p>5) define procedures and criteria for the evaluation of cryptographic security\nsolutions<\/p><p>6) perform the function of a national body for approval of cryptographic products, and\nensure that these products are approved in accordance with the relevant regulations<\/p><p>7) perform the function of a national body for protection from CEMR<\/p><p>8) check the ICT system from the aspect of crypto security and protection against\nCEMR<\/p><p>9) perform the function of a national body for distribution of crypto material, and\ndefine the management, handling, storage, distribution and recording of crypto material in\naccordance with the regulations<\/p><p>10) plan and coordinate the production of crypto parameters (parameters of\ncryptographic algorithm), the distribution of crypto material and the protection against\ncompromising electromagnetic radiation in cooperation with independent ICT system\noperators<\/p><p>11) establish and maintain a central register of verified and distributed crypto\nmaterial<\/p><p>12) establish and maintain a register of issued approvals for cryptographic products<\/p><p>13) create electronic certificates for cryptographic systems based on public key\ninfrastructure<\/p><p>14) propose the adoption of regulations in the field of crypto security and protection\nagainst CEMR, pursuant to this Law<\/p><p>15) perform expert supervision related to crypto security and protection against\nCEMR<\/p><p>16) provide expert assistance to the inspector for the information security in the field\nof crypto security and protection against CEMR<\/p><p>17) provide services for a fee to legal and natural persons, outside the public\nauthorities, in the field of crypto security and protection against CEMR, according to the\nregulation of the Government on the proposal of the Minister of Defense<\/p><p>18) cooperate with national and international bodies and organizations within its\ncompetencies regulated by this Law<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d2b7455 ae-bg-gallery-type-default\" data-id=\"d2b7455\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c80a59e elementor-widget elementor-widget-heading\" data-id=\"c80a59e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Body for the Coordination of Information Security Affairs<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b885114 elementor-widget elementor-widget-spacer\" data-id=\"b885114\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a45289 elementor-widget elementor-widget-text-editor\" data-id=\"3a45289\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\" translation-block\">Established by the Government's <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/odluka\/2020\/8\/4\/reg\" target=\"_self\">Decision<\/a> on the basis of Art. 5 of the Law on Information Security<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a84e39a elementor-widget elementor-widget-toggle\" data-id=\"a84e39a\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1761\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1761\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Purpose<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1761\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1761\"><ul><li>to achieve cooperation and harmonized performance of tasks in the function\nof improving information security<\/li><li>to initiate and monitor preventive and other\nactivities in the field of information security<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1762\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1762\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Tasks<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1762\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1762\"><p class=\" translation-block\"><a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/odluka\/2020\/8\/4\/reg\" target=\"_self\">By decision<\/a> on the formation of the Body for Coordination of Information Security Affairs, the tasks of the Body are:<\/p><ol><li>achieving cooperation between authorities and harmonizing the performance of work in the function of improving information security<\/li><li>initiation and monitoring of preventive and other activities in the field of information security<\/li><li>proposing measures to improve information security in the Republic of Serbia<\/li><li>proposing measures to improve information security in the Republic of Serbia<\/li><li>determination of mutual cooperation in the event of incidents that may have a significant impact on the violation of information security in the Republic of Serbia<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1763\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-1763\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Members<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1763\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1763\"><p>Representatives of<\/p><ul><li>ministries\nresponsible for information security, defense, internal affairs, foreign affairs, justice<\/li><li>security services<\/li><li>Office of the National Security Council and Classified Information\nProtection<\/li><li>General Secretariat of the Government<\/li><li>National Bank of Serbia<\/li><li>Centre for ICT\nSystem Security of Authorities\u00a0<\/li><li>National Center for the Prevention of Security Risks in ICT\nSystems<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-inner-section elementor-element elementor-element-9bf2701 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"9bf2701\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e1ea1f6 ae-bg-gallery-type-default\" data-id=\"e1ea1f6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60b7003 elementor-widget elementor-widget-heading\" data-id=\"60b7003\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">National CERT<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7bbf6e elementor-widget elementor-widget-spacer\" data-id=\"f7bbf6e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91a8e00 elementor-widget elementor-widget-text-editor\" data-id=\"91a8e00\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>CERT (Computer Emergency Response Team) is a center for prevention and protection against security risks in ICT (information and communication) systems<\/p><p>The National CERT performs tasks of coordination of prevention and protection against security risks in ICT systems at the national level<\/p><p class=\" translation-block\">The tasks of the national CERT are performed by <a href=\"https:\/\/www.ratel.rs\/cyr\/\" target=\"_self\">Regulatory Agency for Electronic Communications and Postal Services RATEL<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87fe317 elementor-widget elementor-widget-toggle\" data-id=\"87fe317\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1421\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1421\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Tasks<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1421\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1421\"><p>The National CERT shall collect and exchange information on the risks to the ICT\nsystems security, and the events that jeopardize the ICT system security, and it shall inform,\nprovide support, warn and advise, in this regard, the persons who manage ICT systems in the\nRepublic of Serbia, as well as the public, and it shall in particular:<\/p><p>1) monitor the state of incidents at the national level<\/p><p>2) provide early warnings, alerts and announcements, and inform relevant persons\nabout risks and incidents<\/p><p>3) respond to reported or otherwise detected incidents in ICT systems of special\nimportance, as well as to reports by individuals and legal entities, by providing advice and\nrecommendations on the basis of available information to persons affected by the incident, and\nundertake other necessary measures within its jurisdiction on the basis of the obtained\nknowledge<\/p><p>4) continuously prepare risk and incidents analyses<\/p><p>5) raise awareness among citizens, business entities and public authorities about the\nimportance of information security, the risks and protection measures, including the\nimplementation of campaigns aimed at raising this awareness<\/p><p>6) keeps records of Special CERTs<\/p><p>7) submits quarterly reports on undertaken activities to the competent authority<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1422\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1422\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Supervision<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1422\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1422\"><p>Supervision of the work of the National CERT in the performance of tasks entrusted by LIS is carried out by the Competent Authority (Ministry of Information and Telecommunications), through the Group for Inspection Supervision and Control, formed within the Sector for Information Society and Information Security<\/p><p>Periodically, and at least once a year, it is checked whether<\/p><ul><li>National CERT has adequate resources<\/li><li>organizes at least three annual meetings of the National CERT, CERTs of government bodies and CERTs of independent operators of ICT systems, as well as when necessary in the event of incidents that significantly threaten information security in the Republic of Serbia<\/li><li>controls the performance of established security incident management processes<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0a0ce70 ae-bg-gallery-type-default\" data-id=\"0a0ce70\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-efaa31f elementor-widget elementor-widget-heading\" data-id=\"efaa31f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Special CERTs<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-708a7b2 elementor-widget elementor-widget-spacer\" data-id=\"708a7b2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3880e34 elementor-widget elementor-widget-text-editor\" data-id=\"3880e34\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The special Center for the Prevention of Security Risks in ICT Systems (Special CERT) performs the tasks of prevention and protection against security risks in\nICT systems within a certain legal person, a group of legal persons, a business area and the\nlike.<\/p><p>The Special CERT is a legal person or an organizational unit within a legal person,\nwhich is entered in the records of special CERTs managed by the National CERT.<\/p><p class=\" translation-block\">The <a href=\"https:\/\/www.cert.rs\/rs\/evidencija-certova.html\" target=\"_blank\" rel=\"noopener\">Registry<\/a> of special CERTs is maintained by the National CERT<\/p><p class=\" translation-block\">The procedure for registration in the Register of special CERTs is determined in <a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/drugidrzavniorganizacija\/pravilnik\/2020\/37\/1\" target=\"_blank\" rel=\"noopener\">Regulation<\/a><\/p><p class=\" translation-block\"><a href=\"https:\/\/www.ratel.rs\/uploads\/documents\/empire_plugin\/PrijavazaupisuEvidencijuposebnihCERT-ova.pdf\" target=\"_self\">Application form<\/a> for registration in the Register of special CERTs<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-inner-section elementor-element elementor-element-306fbaa elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"306fbaa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a936373 ae-bg-gallery-type-default\" data-id=\"a936373\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff9118c elementor-widget elementor-widget-heading\" data-id=\"ff9118c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CERT of public authorities <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76440a4 elementor-widget elementor-widget-spacer\" data-id=\"76440a4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dec7d7 elementor-widget elementor-widget-text-editor\" data-id=\"8dec7d7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Centre for Security of ICT Systems within authorities perform the tasks related to the protection against\nincidents in the ICT systems of authorities, except for the ICT system of independent operators<\/p><ul><li>Public authority means a state authority, an autonomous province's authority, a\nlocal self-government unit's authority, an organization and another legal entity or natural person\nwhom is confidred with the exercise of public powers<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4157ca elementor-widget elementor-widget-toggle\" data-id=\"b4157ca\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1881\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1881\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Tasks<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1881\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1881\"><p>The work of the CERT of public authorities shall be carried out by the authority\nresponsible for the design, development, construction, maintenance and improvement of the\ncomputer network of republic authorities<\/p><p>The tasks of the CERT of public authorities include:<\/p><p>1) protection of the ICT system of the Computer network of republic authorities<\/p><p>2) coordination and cooperation with ICT system operators connected by CNRA in\nincident prevention, detection of incidents, gathering of information on incidents, and\neliminating the consequences of incidents<\/p><p>3) publication of professional recommendations for the protection of the ICT systems\nof public authorities, except the ICT system dealing with classified information<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-145febd ae-bg-gallery-type-default\" data-id=\"145febd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13772f1 elementor-widget elementor-widget-heading\" data-id=\"13772f1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CERT of an Independent ICT System Operator <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-390c7a7 elementor-widget elementor-widget-spacer\" data-id=\"390c7a7\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c23291d elementor-widget elementor-widget-text-editor\" data-id=\"c23291d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Independent ICT System Operator are<\/p><ul><li>ministry in charge of defense affairs<\/li><li>ministry in charge of internal affairs<\/li><li>ministry in charge of foreign affairs<\/li><li>security services<\/li><\/ul><p class=\" translation-block\">They are required to establish their own security\ncenters for ICT systems to manage the incidents in their own systems<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p>These Centers mutually exchange\ninformation about incidents, as well as with the National CERT and with the CERT of public\nauthorities, and, if necessary, with other organizations<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abf861d elementor-widget elementor-widget-toggle\" data-id=\"abf861d\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1801\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1801\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Tasks<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1801\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1801\"><p>The scope of work:<\/p><p>1) development of internal acts in the field of information security<\/p><p>2) selection, testing and implementation of technical, physical and organizational\nmeasures for protection, equipment and programs<\/p><p>3) selection, testing and implementation of CEMR protection measures<\/p><p>4) supervision of the implementation of security procedures<\/p><p>5) management and use of cryptographic products;<\/p><p>6) analysis of the security of the ICT system in order to assess the risks<\/p><p>7) training of employees in the field of information security<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-inner-section elementor-element elementor-element-17de5b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"17de5b6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9e052b8 ae-bg-gallery-type-default\" data-id=\"9e052b8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a972e7d elementor-widget elementor-widget-heading\" data-id=\"a972e7d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inspekcija za informacionu bezbednost<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc60f48 elementor-widget elementor-widget-spacer\" data-id=\"fc60f48\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c09b363 elementor-widget elementor-widget-text-editor\" data-id=\"c09b363\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\" translation-block\">Inspection work is performed by the Ministry of Information and Telecommunications through the Information Security Inspectorate<\/p><p>Within <a href=\"https:\/\/www.mit.gov.rs\/tekst\/702\/sektor-za-informaciono-drustvo-i-informacionu-bezbednost.php\" target=\"_blank\" rel=\"noopener\">Sector for information society and information security<\/a> a Group for inspection supervision and control in the field of electronic identification, trusted services and information security was formed for the planning and preparation of ICT system protection measures<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a43640d elementor-widget elementor-widget-toggle\" data-id=\"a43640d\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1721\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1721\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Tasks<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1721\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1721\"><p class=\" translation-block\">The Information Security Inspection carries out <span style=\"text-decoration: underline\">inspection supervision<\/span> over<\/p><ol><li>Law on Information Security implementation<\/li><li>the work of operators of ICT system of particular importance<\/li><\/ol><p class=\" translation-block\">The Inspectorate for Information Security <span style=\"text-decoration: underline\">does not<\/span> inspect the work<\/p><ul><li>independent ICT system operators (ministry responsible for defense affairs, ministry responsible for internal affairs, ministry responsible for foreign affairs, security services)<\/li><li class=\" translation-block\">ICT system for working with secret data<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1722\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1722\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Powers of inspector<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1722\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1722\"><p>The information security inspector determines whether the conditions prescribed by the Law on Information Security and the regulations adopted on the basis of that law have been met<\/p><p class=\" translation-block\">Acts in accordance with the <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/skupstina\/zakon\/2018\/95\/39\" target=\"_self\">Law on Inspection supervision<\/a><\/p><p class=\" translation-block\">In the implementation of inspection supervision, in addition to the authorization from <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/skupstina\/zakon\/2018\/95\/39\" target=\"_self\">Act on Inspection Supervision<\/a> (Art. 21-34), the Inspector is also authorized to:<\/p><p>1) order the removal of established irregularities and leave a deadline for this<\/p><p>2) prohibit the use of procedures and technical means that endanger or violate information security and leave a deadline for this<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b0bde3 elementor-widget elementor-widget-text-editor\" data-id=\"4b0bde3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Annual inspection plan available for <a href=\"https:\/\/www.mit.gov.rs\/extfile\/sr\/1767\/Plan%20inspekcijskog%20nadzora%202023%20Inspekcija%20za%20IB-za%20sajt1.pdf\" target=\"_blank\" rel=\"noopener\">2023<\/a>, <a href=\"https:\/\/www.mit.gov.rs\/extfile\/sr\/1770\/1Plan%20inspekcijskog%20nadzora%2020221.pdf\" target=\"_blank\" rel=\"noopener\">2022<\/a>, <a href=\"https:\/\/www.mit.gov.rs\/tekst\/702\/sektor-za-informaciono-drustvo-i-informacionu-bezbednost.php\" target=\"_blank\" rel=\"noopener\">2021<\/a>, <a href=\"https:\/\/www.mit.gov.rs\/extfile\/sr\/1776\/plan-inspekcijskog-nadzora-20201.pdf\" target=\"_blank\" rel=\"noopener\">2020<\/a><\/p><p>Annual Report of the Inspectorate is available for <a href=\"https:\/\/www.mit.gov.rs\/extfile\/sr\/1780\/Godisnji%20izvestaj%20za%202022.%20godinu%20(1).pdf\" target=\"_blank\" rel=\"noopener\">2022<\/a>, <a href=\"https:\/\/www.mit.gov.rs\/extfile\/sr\/1783\/1Godisnji%20izvestaj%20za%202021.%20godinu1.pdf\" target=\"_blank\" rel=\"noopener\">2021<\/a>, <a href=\"https:\/\/www.mit.gov.rs\/extfile\/sr\/1786\/gizv20201.pdf\" target=\"_blank\" rel=\"noopener\">2020<\/a>, <a href=\"https:\/\/www.mit.gov.rs\/extfile\/sr\/1789\/gi20191.pdf\" target=\"_blank\" rel=\"noopener\">2019<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-605f6ab ae-bg-gallery-type-default\" data-id=\"605f6ab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-210a915 elementor-widget elementor-widget-heading\" data-id=\"210a915\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Operator of ICT systems of special importance<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c13ee8a elementor-widget elementor-widget-spacer\" data-id=\"c13ee8a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-996907f elementor-widget elementor-widget-text-editor\" data-id=\"996907f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>a legal entity<\/li><li>an authority\u00a0\u00a0<\/li><li>an organizational unit of\nan authority<\/li><\/ul><p>that uses the ICT system in performing its activities, i.e. the activities within the\nscope of its competence<\/p><p class=\" translation-block\">In order to understand who should be considered the operator of such a system, one should start from what is meant by <a href=\"https:\/\/cybercrime.rs\/rs-cyber-security\/#inc\" target=\"_self\">ICT system of special importance<\/a><\/p><p>In this way, a wide range of legal entities, authorities and their organizational units are reached<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2760bd7 elementor-widget elementor-widget-spacer\" data-id=\"2760bd7\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bccef1 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"1bccef1\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#home\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-up\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f2534e elementor-widget elementor-widget-spacer\" data-id=\"8f2534e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6150e1d6 elementor-widget elementor-widget-heading\" data-id=\"6150e1d6\" data-element_type=\"widget\" id=\"odg\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RESPONSIBILITY<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-547c861 elementor-widget elementor-widget-heading\" data-id=\"547c861\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Obligations of ICT system operators of special importance and consequences of non-compliance with these obligations<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6db3f90a elementor-widget elementor-widget-spacer\" data-id=\"6db3f90a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58705f6 elementor-widget elementor-widget-heading\" data-id=\"58705f6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the obligations of operators of ICT system of special importance? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5639e0 elementor-widget elementor-widget-spacer\" data-id=\"b5639e0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84d0544 elementor-widget elementor-widget-heading\" data-id=\"84d0544\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Based on Art. 6a LIS, an operator of ICT system of special importance is obliged to:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ab98b4 elementor-widget elementor-widget-spacer\" data-id=\"3ab98b4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1052ad6e elementor-widget elementor-widget-toggle\" data-id=\"1052ad6e\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2731\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-2731\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">List the ICT system of special importance it operates in the registry of operators of\nICT systems of special importance (Art. 6b)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2731\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2731\"><p>The Registry is kept by the Competent Authority (Ministry of Information and Telecommunications)<\/p><p>The record contains the data specified in Art. 6 b LIS<\/p><p class=\" translation-block\">More detailed conditions for keeping records are prescribed by <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/ministarstva\/pravilnik\/2020\/9\/2\" target=\"_self\"> Rulebook<\/a><\/p><p class=\" translation-block\">If the operator does not make an entry in the records within 90 days from the day of adoption of the Rulebook, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 30 st. 1 point. 1 of LIS<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2732\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-2732\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Undertake protection measures of ICT systems of special importance (Art. 7)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2732\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2732\"><p>Protection measures ensure the prevention of incidents, that is, the prevention and reduction of damage from incidents that threaten the exercise of competence and the performance of activities, especially within the scope of providing services to other persons.<\/p><p>Art. 7 ZIB prescribes what protection measures refer to<\/p><p class=\" translation-block\">Certain protection measures are more closely regulated by<a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2016\/94\/2\/reg\" target=\"_self\"> Ordinance<\/a><\/p><p class=\" translation-block\">In the ICT system security act, the operator determines the protection measures, in the manner established by <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2016\/94\/1 \/reg\" target=\"_self\">Regulation<\/a><\/p><p class=\" translation-block\">If the operator does not apply the protection measures specified by the act, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 30 st. 1 point. 3 of LIS<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2733\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-2733\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Adopt an act on the security of the ICT system (Art. 8)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2733\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2733\"><p>The act determines the protection measures, and in particular the principles, methods and procedures of achieving and maintaining an adequate level of system security, as well as the powers and responsibilities related to the security and resources of ICT systems of particular importance.<\/p><p class=\" translation-block\">The detailed content of the act is prescribed by<a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2016\/94\/1\/reg\" target=\"_self\"> Regulation<\/a><\/p><p class=\" translation-block\">If the operator does not pass the act, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 30 st. 1 point. 2 of LIS<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2734\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"tab\" aria-controls=\"elementor-tab-content-2734\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Perform a check of compliance of implemented ICT system protection measures with\nthe act on the security of the ICT system at least once a year (Art. 8)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2734\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2734\"><p>The operator is obliged to independently or with the engagement of external experts carry out a check and to prepare a report on it<\/p><p class=\" translation-block\">The method of checking ICT systems of special importance and the content of the check report is prescribed by <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2016\/94\/1 \/reg\" target=\"_self\">Regulation<\/a><\/p><p class=\" translation-block\">If the operator does not check the compliance of the applied measures, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 30 st. 1 point. 4 of LIS<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2735\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"tab\" aria-controls=\"elementor-tab-content-2735\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Arrange its relationship with third parties in a manner that ensures that protection\nmeasures for that ICT system are undertaken in accordance with the law, if it entrusts its\nactivities related to the ICT system of special importance to third parties (Art. 9-10)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2735\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2735\"><p>The operator can entrust activities related to the ICT system to third parties, but is obliged to regulate the relationship with those persons in a way that ensures the taking of protection measures for that ICT system in accordance with the law.<\/p><p>A third party is also a business entity that is connected to the ICT system operator of special importance by property and management relations (participants, members of the group of companies to which that business entity belongs, etc.).<\/p><p>The following activities can be entrusted to third parties:<\/p><ul><li>activities that include processing, storage, i.e. the ability to access data at the disposal of the operator of the ICT system of particular importance, and related to his business<\/li><li>activities of development, i.e. maintenance of software and hardware components, on which its correct behavior directly depends when performing tasks within its competence, i.e. providing services<\/li><\/ul><p>Entrustment is carried out on the basis of a contract or a special regulation<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2736\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"tab\" aria-controls=\"elementor-tab-content-2736\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Submit notifications of incidents having a significant impact on information security\nof the ICT system (Art. 11)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2736\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2736\"><p>Operators are obliged to submit to the Competent Authority (Ministry of Information and Telecommunications) or National CERT:<\/p><ol><li>incident notification<\/li><li>after reporting the incident, if the incident is still ongoing, notifications about important events related to the incident and the activities they undertake until the incident ends\u00a0<\/li><li>final report on the incident within 15 days from the day the incident ended (the report must contain the type and description of the incident, the time and duration of the incident, the consequences the incident caused, the activities undertaken to eliminate the consequences of the incident and, if necessary, other relevant information)<\/li><\/ol><p class=\" translation-block\">The procedure for informing about incidents is regulated in more detail by <a href=\"https:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/uredba\/2020\/11\/3\/reg\" target=\"_self \">Ordinance<\/a><\/p><p>The notification obligation applies only to<\/p><ul><li>incidents which can have a significant impact on information security breaches<\/li><li>incidents that led to a significant increase in the risk of consequences\u00a0<\/li><\/ul><p class=\" translation-block\">If the operator does not submit a notification about the incident, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 31 st. 1 point. 1 of  LIS<\/p><p class=\" translation-block\">If the operator does not submit notifications about the incident that is still ongoing, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 31 st. 1 point. 2 of LIS<\/p><p class=\" translation-block\">If the operator does not submit an incident report, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 31 st. 1 point. 3 of LIS<\/p><p class=\" translation-block\">The obligation to report an incident in the manner described <u>does not apply<\/u> to:<\/p><ul><li>independent ICT system operators (ministry responsible for defense affairs, ministry responsible for internal affairs, ministry responsible for foreign affairs, security services)<\/li><li>operators of ICT systems for working with secret data<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2737\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"tab\" aria-controls=\"elementor-tab-content-2737\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Supply statistical data on incidents in the ICT system (Art. 11b)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2737\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2737\"><p>The operator is obliged to provide the National CERT with statistical data on all incidents in the previous year, which consolidates these data, submits them to the Competent Authority (Ministry of Information and Telecommunications) and publishes them on the website of the National CERT<\/p><p>Data shall be submitted no later than February 28 of the current year<\/p><p class=\" translation-block\">If the operator does not submit a notification about the incident, <span style=\"text-decoration: underline\">commits a violation<\/span> from Art. 30 st. 1 point. 5 of LIS<\/p><p class=\" translation-block\">The type, form and method of submitting statistical data are determined in <a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/drugidrzavniorganizacija\/pravilnik\/2020\/76\/1\" target=\"_self\">Regulations<\/a> of the National CERT<\/p><p>Na <a href=\"https:\/\/www.cert.rs\/rs\/izvestaji.html\" target=\"_blank\" rel=\"noopener\">sajtu<\/a> Nacionalnog CERT-a su dostupni statisti\u010dki podaci za <a href=\"https:\/\/www.cert.rs\/files\/shares\/Izvestaj%20o%20statisti%C4%8Dkim%20podacima%20za%202021%20godinu.pdf\" target=\"_blank\" rel=\"noopener\">2021<\/a> and <a href=\"https:\/\/www.cert.rs\/files\/shares\/Izve%C5%A1taj%20o%20statisti%C4%8Dkim%20podacima%20za%202020.%20godine.pdf\" target=\"_blank\" rel=\"noopener\">2020<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58c5f14 elementor-widget elementor-widget-spacer\" data-id=\"58c5f14\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8075dbf elementor-widget elementor-widget-heading\" data-id=\"8075dbf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What if the operator of the ICT system of special importance does not comply with these obligations? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc0dce1 elementor-widget elementor-widget-spacer\" data-id=\"cc0dce1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6292134 elementor-widget elementor-widget-heading\" data-id=\"6292134\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">&gt; If the operator does not act according to the established obligations, he commits violations from Art. 30 and 31 ZIB.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a50ce93 elementor-widget elementor-widget-spacer\" data-id=\"a50ce93\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-884c17e elementor-widget elementor-widget-toggle\" data-id=\"884c17e\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1421\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1421\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Violation from Art. 30<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1421\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1421\"><p>If:<\/p><p>1) fails to execute the entry in the registry within the time limit referred to in Article 6b\nhereof<\/p><p>2) fails to adopt the Act on security of ICT systems referred to in Article 8 paragraph 1\nof this Law<\/p><p>3) fails to apply the protection measures determined by the Act on security of ICT\nsystems referred to in Article 8, paragraph 2 of this Law<\/p><p>4) fails to verify the compliance of implemented measures referred to in Article 8,\nparagraph 4 of this Law<\/p><p>5) fails to submit the statistical data referred to in Article 11b hereof<\/p><p>6) fails to comply with the order of the information security inspector within the given\ndeadline referred to in Article 29, paragraph 1, item 1 of this Law<\/p><p>\u00a0<\/p><ul><li class=\" translation-block\">operator of an ICT system of special importance shall be imposed a penalty in the amount of  50,000.00 to 2,000,000.00 dinars<\/li><li class=\" translation-block\">the responsible person\nof an operator of an ICT system of special importance shall also be punished with a fine ranging\nfrom 5,000.00 to 50,000.00 dinars<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1422\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1422\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">Violation from Art. 31<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1422\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1422\"><p>If:\u00a0<\/p><p>1) fails to inform the authorities referred to in Article 11, paragraphs 1, 3 and 7) hereof\nabout incidents in the ICT system<\/p><p>2) fails to deliver notifications on important events regarding incident and activities\nfrom Article 11 paragraph 5 hereby;<\/p><p>3) fails to deliver final report from Article 11. paragraph 6 hereby<\/p><ul><li class=\" translation-block\">operator of an ICT system of special importance shall be imposed a penalty in the amount of 50,000.00 to 500,000.00 dinars<\/li><li class=\" translation-block\">the responsible person\nof an operator of an ICT system of special importance shall also be punished with a fine ranging\nfrom 5,000.00 to 50,000.00 dinars<\/li><\/ul><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-278ccad elementor-widget elementor-widget-spacer\" data-id=\"278ccad\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16a7aee elementor-widget elementor-widget-text-editor\" data-id=\"16a7aee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Misdemeanor proceedings are initiated upon request:<\/p><ul><li>authorized body (Inspection for Information Security)<\/li><li>injured person\u00a0<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a29cf14 elementor-widget elementor-widget-spacer\" data-id=\"a29cf14\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bcbb79 elementor-widget elementor-widget-heading\" data-id=\"9bcbb79\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">&gt; If the operator were to fail to apply protective measures, it could be criminal liability\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7288bf elementor-widget elementor-widget-spacer\" data-id=\"c7288bf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-860ecfc elementor-widget elementor-widget-text-editor\" data-id=\"860ecfc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>However, the Criminal Code currently does not prescribe a criminal offense under which the omission of an ICT operator of special importance could be classified<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff39786 elementor-widget elementor-widget-spacer\" data-id=\"ff39786\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bf1d7c elementor-widget elementor-widget-heading\" data-id=\"3bf1d7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">&gt; If the elements of a criminal offense are realized as a result of the incident, that could constitute a cybercrime act\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-156c06d elementor-widget elementor-widget-spacer\" data-id=\"156c06d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f1389c elementor-widget elementor-widget-text-editor\" data-id=\"2f1389c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Primarily, it could be about crimes against the security of computer data (Art. 298-304a CC), but also about other criminal acts<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a0419e elementor-widget elementor-widget-spacer\" data-id=\"1a0419e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e25c23c elementor-widget elementor-widget-heading\" data-id=\"e25c23c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How and to whom to address?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da3a414 elementor-widget elementor-widget-button\" data-id=\"da3a414\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cybercrime.rs\/en\/report-a-crime\/\" target=\"_blank\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-alt-circle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Report!<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1d5d53 elementor-widget elementor-widget-spacer\" data-id=\"e1d5d53\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-642877fe elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"642877fe\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/#up\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-up\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df98f81 elementor-widget elementor-widget-spacer\" data-id=\"df98f81\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Sajber bezbednost u Srbiji Saznaj Pove\u017ei se Podeli Ova stranica sadr\u017ei informacije o institucionalnom okviru sajber bezbednosti u Srbiji Regulativa &gt;&gt; Pojmovi &gt;&gt; Akteri &gt;&gt; Odgovornost &gt;&gt; REGULATIVA Strategija, zakon, podzakonski akti U regulativi se ne koristi termin &#8216;sajber&#8217;, nego informaciona bezbednost Strategija razvoja informacionog dru\u0161tva i informacione bezbednosti u Republici Srbiji za period od &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/cybercrime.rs\/en\/rs-cyber-security\/\"> <span class=\"screen-reader-text\">RS Cyber Security<\/span> Read More &raquo;<\/a><\/p>","protected":false},"author":1,"featured_media":10353,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"om_disable_all_campaigns":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-13845","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/pages\/13845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/comments?post=13845"}],"version-history":[{"count":228,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/pages\/13845\/revisions"}],"predecessor-version":[{"id":15664,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/pages\/13845\/revisions\/15664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media\/10353"}],"wp:attachment":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media?parent=13845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}