Over the coming months, the Dutch Data Protection Authority (Autoriteit Persoonsgegevens, AP) will carry out random inspections of healthcare providers, focusing on data security and the proper handling of personal data. These inspections follow a recent announcement by the Minister of Health, Welfare and Sport (VWS). Healthcare providers are being urged to improve compliance with the legal frameworks for data security and to strengthen security awareness among staff.
The AP can take enforcement action even if no actual data breach or security incident has occurred, for example where information security measures are inadequately designed or implemented. For healthcare providers, this means it is time to critically assess how information security is organized and how it operates in practice within their organization.
It is no surprise that the AP is focusing on the healthcare sector. Healthcare providers process large volumes of health data. Under the General Data Protection Regulation (GDPR), such data qualifies as special category personal data. Stricter requirements apply to these data, particularly in relation to information security. Healthcare providers must implement appropriate technical and organizational measures and must also be able to demonstrate that these measures are genuinely effective.
Despite these stricter requirements, the healthcare sector has been a long-standing leader in the number of reported data breaches. This remained the case in 2024, as shown by the AP’s annual data breach report. A key driver is the rise in cyber threats. Medical data has a high value on the dark web, making healthcare providers an attractive target for ransomware attacks and identity fraud. A recent large-scale data breach in the healthcare sector, in which data relating to hundreds of thousands of patients ended up in the hands of cybercriminals, illustrates how significant these risks can be in practice.
At the same time, a substantial proportion of data breaches are not caused by external attacks, but by internal threats. Employees play a crucial role in handling personal data. In practice, it is often employees who cause incidents through unauthorised or careless actions. A recent example in the healthcare sector, where employees were dismissed after accessing more than a thousand patient records without a valid reason, once again underlines this risk.
Although the AP has not published its assessment criteria, the GDPR, previous investigations and enforcement decisions provide a clear indication of where the emphasis will lie. Below, we set out the legal framework per topic and explain what healthcare providers can do in practice to meet these requirements.
Employees may only have access to patient data to the extent necessary for the performance of their role (need-to-know). Excessively broad authorisations, the use of generic accounts and the absence of periodic reviews of access rights pose significant risks.
What can you do?
Healthcare providers are required to log actions carried out in patient records. It must be possible to see which employee accessed or amended which patient data, and when. Attempts at unauthorised access must also be recorded. Incomplete logging or the failure to review log files on a regular basis increases the risk of unauthorised access and undetected misuse.
What can you do?
The GDPR requires organizations to record data breaches in a data breach register and, where necessary, to notify the AP and/or the affected individuals in a timely manner. Failure to identify, record and evaluate data breaches in time leads to a lack of insight into structural vulnerabilities. This increases the risk that similar incidents will continue to occur.
What can you do?
The effectiveness of information security depends on how employees deal with it. Employees have daily access to patient data and therefore play a key role in protecting this data. It is essential that they recognize data security risks in time, are familiar with the applicable rules and are aware of their own responsibility. We discuss this topic in more detail in an earlier blog post.
What can you do?
Healthcare providers are required to organize their information security in line with the applicable NEN standards 7510, 7512 and 7513. The obligations described above also arise from these standards. They translate legal requirements into concrete measures for risk management, secure data exchange and logging access to patient records. By working in accordance with these standards, healthcare organizations can demonstrate that their security measures are appropriate and auditable. The PDCA cycle (Plan-Do-Check-Act) helps healthcare providers to comply with the NEN standards on a structural basis, as explained below.
What can you do?
Do you want to be well prepared for a possible inspection? At a minimum, make sure you have a clear dawn raid policy and an accompanying procedure in place, so you know exactly what to do if a regulator unexpectedly turns up at your doorstep. A dawn raid procedure sets out how your organization should act during an unannounced visit by a supervisory authority, including who must be informed, what information may and may not be shared, and how the visit should be documented.
This preparation is essential. If the AP identifies a breach of the data security requirements, it can take enforcement action. For healthcare providers, this creates a concrete risk of an administrative fine, a penalty payment order, a processing ban, a reprimand or a warning.
The AP’s intensified supervision highlights the importance of robust data security in healthcare. Healthcare providers cannot rely on policies on paper alone; practical implementation is just as important. Use this moment to critically review your organization. Have risks been assessed recently, are the control measures still appropriate, and do employees know what is expected of them? To be properly prepared for future inspections, it is advisable to have a dawn raid policy in place. Acting now reduces the risk of incidents and sanctions.
Would you like to know where your organization stands, or do you need support in setting up your information security framework? Contact us.