{"id":15563,"date":"2026-03-08T09:05:50","date_gmt":"2026-03-08T07:05:50","guid":{"rendered":"https:\/\/lexcovery.com\/2026\/03\/on-the-approval-of-the-regulation-on-the-sectoral-cyber-incident-cyberattack-and-cyber-threat-response-team-in-the-healthcare-sector%d0%b2%d1%96%d0%b4%d0%bf%d0%be%d0%b2%d1%96%d0%b4%d0%bd%d0%be\/"},"modified":"2026-03-08T09:05:50","modified_gmt":"2026-03-08T07:05:50","slug":"on-the-approval-of-the-regulation-on-the-sectoral-cyber-incident-cyberattack-and-cyber-threat-response-team-in-the-healthcare-sector%d0%b2%d1%96%d0%b4%d0%bf%d0%be%d0%b2%d1%96%d0%b4%d0%bd%d0%be","status":"publish","type":"post","link":"https:\/\/lexcovery.com\/en\/2026\/03\/on-the-approval-of-the-regulation-on-the-sectoral-cyber-incident-cyberattack-and-cyber-threat-response-team-in-the-healthcare-sector%d0%b2%d1%96%d0%b4%d0%bf%d0%be%d0%b2%d1%96%d0%b4%d0%bd%d0%be\/","title":{"rendered":"## On the Approval of the Regulation on the Sectoral Cyber Incident, Cyberattack, and Cyber Threat Response Team in the Healthcare Sector\n\n\u0412\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e \u0434\u043e \u0447\u0430\u0441\u0442\u0438\u043d\u0438 \u0434\u0440\u0443\u0433\u043e\u0457 \u0441\u0442\u0430\u0442\u0442\u0456 9 \u0417\u0430\u043a\u043e\u043d\u0443 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u00ab\u041f\u0440\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u0437\u0430\u0441\u0430\u0434\u0438 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438\u00bb, \u043f\u0456\u0434\u043f\u0443\u043d\u043a\u0442\u0443 1 \u043f\u0443\u043d\u043a\u0442\u0443 4 \u041f\u043e\u043b\u043e\u0436\u0435\u043d\u043d\u044f \u043f\u0440\u043e \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0423\u043a\u0440\u0430\u0457\u043d\u0438, \u0437\u0430\u0442\u0432\u0435\u0440\u0434\u0436\u0435\u043d\u043e\u0433\u043e \u043f\u043e\u0441\u0442\u0430\u043d\u043e\u0432\u043e\u044e \u041a\u0430\u0431\u0456\u043d\u0435\u0442\u0443 \u041c\u0456\u043d\u0456\u0441\u0442\u0440\u0456\u0432 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u0432\u0456\u0434 25 \u0431\u0435\u0440\u0435\u0437\u043d\u044f 2015 \u0440\u043e\u043a\u0443 \u2116 112, \u0437 \u043c\u0435\u0442\u043e\u044e \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457 \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u0433\u0430\u043b\u0443\u0437\u0435\u0432\u043e\u0457 \u043a\u043e\u043c\u0430\u043d\u0434\u0438 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438, \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f\n\nPursuant to part two of Article 9 of the Law of Ukraine &#8220;On Basic Principles of Ensuring Cybersecurity of Ukraine&#8221;, subparagraph 1 of paragraph 4 of the Regulation on the Ministry of Health of Ukraine, approved by the Resolution of the Cabinet of Ministers of Ukraine of March 25, 2015, No. 112, in order to organize the activities of the sectoral cyber incident, cyberattack, and cyber threat response team in the healthcare sector,\n\n\u041d\u0410\u041a\u0410\u0417\u0423\u042e:\n\nI HEREBY ORDER:\n\n1. \u0417\u0430\u0442\u0432\u0435\u0440\u0434\u0438\u0442\u0438 \u041f\u043e\u043b\u043e\u0436\u0435\u043d\u043d\u044f \u043f\u0440\u043e \u0433\u0430\u043b\u0443\u0437\u0435\u0432\u0443 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438, \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f, \u0449\u043e \u0434\u043e\u0434\u0430\u0454\u0442\u044c\u0441\u044f.\n\n1. To approve the Regulation on the Sectoral Cyber Incident, Cyberattack, and Cyber Threat Response Team in the Healthcare Sector, attached hereto.\n\n2. \u0414\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0430\u0442\u0443 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0457 \u0442\u0440\u0430\u043d\u0441\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u043e\u0445\u043e\u0440\u043e\u043d\u0456 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f (\u041a\u0430\u0440\u0447\u0435\u0432\u0438\u0447 \u0414.\u0412.) \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0438\u0442\u0438 \u043f\u043e\u0434\u0430\u043d\u043d\u044f \u0446\u044c\u043e\u0433\u043e \u043d\u0430\u043a\u0430\u0437\u0443 \u0432 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e\u043c\u0443 \u0437\u0430\u043a\u043e\u043d\u043e\u0434\u0430\u0432\u0441\u0442\u0432\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0443 \u043d\u0430 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0443 \u0440\u0435\u0454\u0441\u0442\u0440\u0430\u0446\u0456\u044e \u0434\u043e \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u0430 \u044e\u0441\u0442\u0438\u0446\u0456\u0457 \u0423\u043a\u0440\u0430\u0457\u043d\u0438.\n\n2. The Directorate of Digital Transformation in Healthcare (Karchevych D.V.) shall ensure the submission of this order for state registration to the Ministry of Justice of Ukraine in accordance with the procedure established by law.\n\n3. \u041a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0437\u0430 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f\u043c \u0446\u044c\u043e\u0433\u043e \u043d\u0430\u043a\u0430\u0437\u0443 \u043f\u043e\u043a\u043b\u0430\u0441\u0442\u0438 \u043d\u0430 \u0437\u0430\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0430 \u041c\u0456\u043d\u0456\u0441\u0442\u0440\u0430 \u0437 \u043f\u0438\u0442\u0430\u043d\u044c \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0433\u043e \u0440\u043e\u0437\u0432\u0438\u0442\u043a\u0443, \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u0445 \u0442\u0440\u0430\u043d\u0441\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439 \u0456 \u0446\u0438\u0444\u0440\u043e\u0432\u0456\u0437\u0430\u0446\u0456\u0457.\n\n3. Control over the execution of this order shall be vested in the Deputy Minister for Digital Development, Digital Transformations and Digitalization.\n\n4. \u0426\u0435\u0439 \u043d\u0430\u043a\u0430\u0437 \u043d\u0430\u0431\u0438\u0440\u0430\u0454 \u0447\u0438\u043d\u043d\u043e\u0441\u0442\u0456 \u0437 \u0434\u043d\u044f \u0439\u043e\u0433\u043e \u043e\u0444\u0456\u0446\u0456\u0439\u043d\u043e\u0433\u043e \u043e\u043f\u0443\u0431\u043b\u0456\u043a\u0443\u0432\u0430\u043d\u043d\u044f.\n\n4. This order shall enter into force on the date of its official publication.\n\n\u0417\u0410\u0422\u0412\u0415\u0420\u0414\u0416\u0415\u041d\u041e\n\nAPPROVED\n\n\u041d\u0430\u043a\u0430\u0437 \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u0430 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0423\u043a\u0440\u0430\u0457\u043d\u0438\n\nOrder of the Ministry of Health of Ukraine\n\n___ __________ 2024 \u0440\u043e\u043a\u0443 \u2116 _____\n\n___ __________ 2024 No. _____\n\n\u041f\u041e\u041b\u041e\u0416\u0415\u041d\u041d\u042f\n\nREGULATION\n\n\u043f\u0440\u043e \u0433\u0430\u043b\u0443\u0437\u0435\u0432\u0443 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438, \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f\n\non the Sectoral Cyber Incident, Cyberattack, and Cyber Threat Response Team in the Healthcare Sector\n\n1. \u0426\u0435 \u041f\u043e\u043b\u043e\u0436\u0435\u043d\u043d\u044f \u0432\u0438\u0437\u043d\u0430\u0447\u0430\u0454 \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u0437\u0430\u0432\u0434\u0430\u043d\u043d\u044f, \u0444\u0443\u043d\u043a\u0446\u0456\u0457, \u043f\u0440\u0430\u0432\u0430 \u0442\u0430 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u044e \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u0433\u0430\u043b\u0443\u0437\u0435\u0432\u043e\u0457 \u043a\u043e\u043c\u0430\u043d\u0434\u0438 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438, \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f (\u0434\u0430\u043b\u0456 \u2013 \u041a\u043e\u043c\u0430\u043d\u0434\u0430).\n\n1. This Regulation defines the main tasks, functions, rights, and organization of the activities of the sectoral cyber incident, cyberattack, and cyber threat response team in the healthcare sector (hereinafter \u2013 the Team).\n\n2. \u0423 \u0446\u044c\u043e\u043c\u0443 \u041f\u043e\u043b\u043e\u0436\u0435\u043d\u043d\u0456 \u0442\u0435\u0440\u043c\u0456\u043d\u0438 \u0432\u0436\u0438\u0432\u0430\u044e\u0442\u044c\u0441\u044f \u0443 \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f\u0445, \u043d\u0430\u0432\u0435\u0434\u0435\u043d\u0438\u0445 \u0432 \u0417\u0430\u043a\u043e\u043d\u0430\u0445 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u00ab\u041f\u0440\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u0437\u0430\u0441\u0430\u0434\u0438 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438\u00bb, \u00ab\u041f\u0440\u043e \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445\u00bb.\n\n2. In this Regulation, the terms are used in the meanings given in the Laws of Ukraine &#8220;On Basic Principles of Ensuring Cybersecurity of Ukraine&#8221;, &#8220;On Protection of Information in Information and Communication Systems&#8221;.\n\n3. \u041a\u043e\u043c\u0430\u043d\u0434\u0430 \u0443 \u0441\u0432\u043e\u0457\u0439 \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u043a\u0435\u0440\u0443\u0454\u0442\u044c\u0441\u044f \u041a\u043e\u043d\u0441\u0442\u0438\u0442\u0443\u0446\u0456\u0454\u044e \u0442\u0430 \u0437\u0430\u043a\u043e\u043d\u0430\u043c\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438, \u0430\u043a\u0442\u0430\u043c\u0438 \u041f\u0440\u0435\u0437\u0438\u0434\u0435\u043d\u0442\u0430 \u0423\u043a\u0440\u0430\u0457\u043d\u0438, \u041a\u0430\u0431\u0456\u043d\u0435\u0442\u0443 \u041c\u0456\u043d\u0456\u0441\u0442\u0440\u0456\u0432 \u0423\u043a\u0440\u0430\u0457\u043d\u0438, \u0456\u043d\u0448\u0438\u043c\u0438 \u043d\u043e\u0440\u043c\u0430\u0442\u0438\u0432\u043d\u043e-\u043f\u0440\u0430\u0432\u043e\u0432\u0438\u043c\u0438 \u0430\u043a\u0442\u0430\u043c\u0438, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0446\u0438\u043c \u041f\u043e\u043b\u043e\u0436\u0435\u043d\u043d\u044f\u043c.\n\n3. In its activities, the Team is guided by the Constitution and laws of Ukraine, acts of the President of Ukraine, the Cabinet of Ministers of Ukraine, other regulatory legal acts, as well as this Regulation.\n\n4. \u041e\u0441\u043d\u043e\u0432\u043d\u0438\u043c\u0438 \u0437\u0430\u0432\u0434\u0430\u043d\u043d\u044f\u043c\u0438 \u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u0454:\n\n4. The main tasks of the Team are:\n\n1) \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f;\n\n1) ensuring a prompt response to cyber incidents, cyberattacks, and cyber threats in the healthcare sector;\n\n2) \u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0430\u0446\u0456\u044f \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u0441\u0443\u0431\u2019\u0454\u043a\u0442\u0456\u0432 \u0441\u0444\u0435\u0440\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0437 \u043f\u0438\u0442\u0430\u043d\u044c \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438;\n\n2) coordination of the activities of healthcare sector entities on responding to cyber incidents, cyberattacks, and cyber threats;\n\n3) \u043d\u0430\u0434\u0430\u043d\u043d\u044f \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u043d\u043e\u0457 \u0442\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u043e\u0457 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u0438 \u0441\u0443\u0431\u2019\u0454\u043a\u0442\u0430\u043c \u0441\u0444\u0435\u0440\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0437 \u043f\u0438\u0442\u0430\u043d\u044c \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438.\n\n3) providing methodological and practical assistance to healthcare sector entities on responding to cyber incidents, cyberattacks, and cyber threats.\n\n5. \u041a\u043e\u043c\u0430\u043d\u0434\u0430 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e \u0434\u043e \u043f\u043e\u043a\u043b\u0430\u0434\u0435\u043d\u0438\u0445 \u043d\u0430 \u043d\u0435\u0457 \u0437\u0430\u0432\u0434\u0430\u043d\u044c:\n\n5. In accordance with the tasks assigned to it, the Team:\n\n1) \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454 \u043c\u043e\u043d\u0456\u0442\u043e\u0440\u0438\u043d\u0433 \u0442\u0430 \u0430\u043d\u0430\u043b\u0456\u0437 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u043f\u0440\u043e \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f;\n\n1) monitors and analyzes information on cyber incidents, cyberattacks, and cyber threats in the healthcare sector;\n\n2) \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u044f\u0454 \u0442\u0430 \u0432\u043f\u0440\u043e\u0432\u0430\u0434\u0436\u0443\u0454 \u0437\u0430\u0445\u043e\u0434\u0438 \u0449\u043e\u0434\u043e \u0437\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0442\u0430 \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0456\u0432, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f;\n\n2) develops and implements measures to prevent and neutralize cyber incidents, cyberattacks, and cyber threats in the healthcare sector;\n\n3) \u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0443\u0454 \u0434\u0456\u044f\u043b\u044c\u043d\u0456\u0441\u0442\u044c \u0441\u0443\u0431\u2019\u0454\u043a\u0442\u0456\u0432 \u0441\u0444\u0435\u0440\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u043f\u0456\u0434 \u0447\u0430\u0441 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438, \u0437\u043e\u043a\u0440\u0435\u043c\u0430, \u043d\u0430\u0434\u0430\u0454 \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0446\u0456\u0439\u043d\u0443 \u0442\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u0443 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u0443;\n\n3) coordinates the activities of healthcare sector entities during the response to cyber incidents, cyberattacks, and cyber threats, including providing advisory and practical assistance;\n\n4) \u0432\u0437\u0430\u0454\u043c\u043e\u0434\u0456\u0454 \u0437 \u0456\u043d\u0448\u0438\u043c\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0430\u043c\u0438 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438, \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u0437 \u0423\u0440\u044f\u0434\u043e\u0432\u043e\u044e \u043a\u043e\u043c\u0430\u043d\u0434\u043e\u044e \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u043d\u0430\u0434\u0437\u0432\u0438\u0447\u0430\u0439\u043d\u0456 \u043f\u043e\u0434\u0456\u0457 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 CERT-UA;\n\n4) interacts with other cyber incident, cyberattack, and cyber threat response teams, including the Governmental Computer Emergency Response Team of Ukraine CERT-UA;\n\n5) \u0431\u0435\u0440\u0435 \u0443\u0447\u0430\u0441\u0442\u044c \u0443 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u0456 \u043d\u0430\u0432\u0447\u0430\u043d\u044c \u0442\u0430 \u0442\u0440\u0435\u043d\u0456\u043d\u0433\u0456\u0432 \u0437 \u043f\u0438\u0442\u0430\u043d\u044c \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0434\u043b\u044f \u043f\u0440\u0430\u0446\u0456\u0432\u043d\u0438\u043a\u0456\u0432 \u0441\u0443\u0431\u2019\u0454\u043a\u0442\u0456\u0432 \u0441\u0444\u0435\u0440\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f;\n\n5) participates in training and exercises on cybersecurity for employees of healthcare sector entities;\n\n6) \u0433\u043e\u0442\u0443\u0454 \u043f\u0440\u043e\u043f\u043e\u0437\u0438\u0446\u0456\u0457 \u0449\u043e\u0434\u043e \u0432\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043d\u044f \u043d\u043e\u0440\u043c\u0430\u0442\u0438\u0432\u043d\u043e-\u043f\u0440\u0430\u0432\u043e\u0432\u043e\u0457 \u0431\u0430\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f;\n\n6) prepares proposals for improving the regulatory framework in the field of healthcare cybersecurity;\n\n7) \u0456\u043d\u0444\u043e\u0440\u043c\u0443\u0454 \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u043f\u0440\u043e \u043a\u0456\u0431\u0435\u0440\u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0442\u0430 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0442\u0430 \u0432\u0436\u0438\u0442\u0456 \u0437\u0430\u0445\u043e\u0434\u0438 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f;\n\n7) informs the Ministry of Health of Ukraine about cyber incidents, cyberattacks, and cyber threats in the healthcare sector and the response measures taken;\n\n8) \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454 \u0456\u043d\u0448\u0456 \u0444\u0443\u043d\u043a\u0446\u0456\u0457, \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456 \u0434\u043b\u044f \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043f\u043e\u043a\u043b\u0430\u0434\u0435\u043d\u0438\u0445 \u043d\u0430 \u043d\u0435\u0457 \u0437\u0430\u0432\u0434\u0430\u043d\u044c.\n\n8) performs other functions necessary to fulfill the tasks assigned to it.\n\n6. \u041a\u043e\u043c\u0430\u043d\u0434\u0430 \u043c\u0430\u0454 \u043f\u0440\u0430\u0432\u043e:\n\n6. The Team has the right to:\n\n1) \u0437\u0430\u043f\u0438\u0442\u0443\u0432\u0430\u0442\u0438 \u0442\u0430 \u043e\u0442\u0440\u0438\u043c\u0443\u0432\u0430\u0442\u0438 \u0432\u0456\u0434 \u0441\u0443\u0431\u2019\u0454\u043a\u0442\u0456\u0432 \u0441\u0444\u0435\u0440\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044e, \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0443 \u0434\u043b\u044f \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043f\u043e\u043a\u043b\u0430\u0434\u0435\u043d\u0438\u0445 \u043d\u0430 \u043d\u0435\u0457 \u0437\u0430\u0432\u0434\u0430\u043d\u044c;\n\n1) request and receive from healthcare sector entities information necessary to fulfill the tasks assigned to it;\n\n2) \u0437\u0430\u043b\u0443\u0447\u0430\u0442\u0438 \u0434\u043e \u0441\u0432\u043e\u0454\u0457 \u0440\u043e\u0431\u043e\u0442\u0438 \u0444\u0430\u0445\u0456\u0432\u0446\u0456\u0432 \u0437 \u043f\u0438\u0442\u0430\u043d\u044c \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043d\u0438\u043a\u0456\u0432 \u0456\u043d\u0448\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0456\u0432 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u043e\u0457 \u0432\u043b\u0430\u0434\u0438, \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432, \u0443\u0441\u0442\u0430\u043d\u043e\u0432 \u0442\u0430 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0439 (\u0437\u0430 \u043f\u043e\u0433\u043e\u0434\u0436\u0435\u043d\u043d\u044f\u043c \u0437 \u0457\u0445 \u043a\u0435\u0440\u0456\u0432\u043d\u0438\u043a\u0430\u043c\u0438);\n\n2) involve cybersecurity specialists, representatives of other state authorities, enterprises, institutions, and organizations (with the consent of their managers) in its work;\n\n3) \u0456\u043d\u0456\u0446\u0456\u044e\u0432\u0430\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u043f\u0435\u0440\u0435\u0432\u0456\u0440\u043e\u043a \u0441\u0442\u0430\u043d\u0443 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0441\u0443\u0431\u2019\u0454\u043a\u0442\u0456\u0432 \u0441\u0444\u0435\u0440\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f;\n\n3) initiate inspections of the cybersecurity status of healthcare sector entities;\n\n4) \u0432\u043d\u043e\u0441\u0438\u0442\u0438 \u043f\u0440\u043e\u043f\u043e\u0437\u0438\u0446\u0456\u0457 \u0449\u043e\u0434\u043e \u043f\u0440\u0438\u0442\u044f\u0433\u043d\u0435\u043d\u043d\u044f \u0434\u043e \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u043e\u0441\u0456\u0431, \u0432\u0438\u043d\u043d\u0438\u0445 \u0443 \u043f\u043e\u0440\u0443\u0448\u0435\u043d\u043d\u0456 \u0432\u0438\u043c\u043e\u0433 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438.\n\n4) submit proposals for holding accountable persons guilty of violating cybersecurity requirements.\n\n7. \u0414\u043e \u0441\u043a\u043b\u0430\u0434\u0443 \u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u0432\u0445\u043e\u0434\u044f\u0442\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043d\u0438\u043a\u0438 \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u0430 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0423\u043a\u0440\u0430\u0457\u043d\u0438, \u0456\u043d\u0448\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0456\u0432 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u043e\u0457 \u0432\u043b\u0430\u0434\u0438, \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432, \u0443\u0441\u0442\u0430\u043d\u043e\u0432 \u0442\u0430 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0439, \u0449\u043e \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u044e\u0442\u044c \u0434\u0456\u044f\u043b\u044c\u043d\u0456\u0441\u0442\u044c \u0443 \u0441\u0444\u0435\u0440\u0456 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f.\n\n7. The Team consists of representatives of the Ministry of Health of Ukraine, other state authorities, enterprises, institutions, and organizations operating in the healthcare sector.\n\n8. \u0421\u043a\u043b\u0430\u0434 \u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u0437\u0430\u0442\u0432\u0435\u0440\u0434\u0436\u0443\u0454\u0442\u044c\u0441\u044f \u043d\u0430\u043a\u0430\u0437\u043e\u043c \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u0430 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0423\u043a\u0440\u0430\u0457\u043d\u0438.\n\n8. The composition of the Team is approved by order of the Ministry of Health of Ukraine.\n\n9. \u041a\u0435\u0440\u0456\u0432\u043d\u0438\u0446\u0442\u0432\u043e \u041a\u043e\u043c\u0430\u043d\u0434\u043e\u044e \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454 \u043a\u0435\u0440\u0456\u0432\u043d\u0438\u043a, \u044f\u043a\u0438\u0439 \u043f\u0440\u0438\u0437\u043d\u0430\u0447\u0430\u0454\u0442\u044c\u0441\u044f \u0437 \u0447\u0438\u0441\u043b\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043d\u0438\u043a\u0456\u0432 \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u0430 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0423\u043a\u0440\u0430\u0457\u043d\u0438.\n\n9. The Team is managed by the head, who is appointed from among the representatives of the Ministry of Health of Ukraine.\n\n10. \u041a\u0435\u0440\u0456\u0432\u043d\u0438\u043a \u041a\u043e\u043c\u0430\u043d\u0434\u0438:\n\n10. The head of the Team:\n\n1) \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u043e\u0432\u0443\u0454 \u0442\u0430 \u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0443\u0454 \u0440\u043e\u0431\u043e\u0442\u0443 \u041a\u043e\u043c\u0430\u043d\u0434\u0438;\n\n1) organizes and coordinates the work of the Team;\n\n2) \u0433\u043e\u043b\u043e\u0432\u0443\u0454 \u043d\u0430 \u0437\u0430\u0441\u0456\u0434\u0430\u043d\u043d\u044f\u0445 \u041a\u043e\u043c\u0430\u043d\u0434\u0438;\n\n2) chairs the meetings of the Team;\n\n3) \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0454 \u041a\u043e\u043c\u0430\u043d\u0434\u0443 \u0443 \u0432\u0456\u0434\u043d\u043e\u0441\u0438\u043d\u0430\u0445 \u0437 \u0456\u043d\u0448\u0438\u043c\u0438 \u043e\u0440\u0433\u0430\u043d\u0430\u043c\u0438 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u043e\u0457 \u0432\u043b\u0430\u0434\u0438, \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430\u043c\u0438, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0430\u043c\u0438 \u0442\u0430 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u044f\u043c\u0438;\n\n3) represents the Team in relations with other state authorities, enterprises, institutions, and organizations;\n\n4) \u043d\u0435\u0441\u0435 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0443 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u0430\u043b\u044c\u043d\u0456\u0441\u0442\u044c \u0437\u0430 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043f\u043e\u043a\u043b\u0430\u0434\u0435\u043d\u0438\u0445 \u043d\u0430 \u041a\u043e\u043c\u0430\u043d\u0434\u0443 \u0437\u0430\u0432\u0434\u0430\u043d\u044c.\n\n4) bears personal responsibility for the fulfillment of the tasks assigned to the Team.\n\n11. \u0424\u043e\u0440\u043c\u043e\u044e \u0440\u043e\u0431\u043e\u0442\u0438 \u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u0454 \u0437\u0430\u0441\u0456\u0434\u0430\u043d\u043d\u044f, \u044f\u043a\u0456 \u043f\u0440\u043e\u0432\u043e\u0434\u044f\u0442\u044c\u0441\u044f \u0437\u0430 \u043f\u043e\u0442\u0440\u0435\u0431\u0438, \u0430\u043b\u0435 \u043d\u0435 \u0440\u0456\u0434\u0448\u0435 \u043e\u0434\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u0443 \u043d\u0430 \u043a\u0432\u0430\u0440\u0442\u0430\u043b.\n\n11. The form of work of the Team is meetings, which are held as needed, but at least once a quarter.\n\n12. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u043f\u0440\u0438\u0439\u043c\u0430\u044e\u0442\u044c\u0441\u044f \u0431\u0456\u043b\u044c\u0448\u0456\u0441\u0442\u044e \u0433\u043e\u043b\u043e\u0441\u0456\u0432 \u043f\u0440\u0438\u0441\u0443\u0442\u043d\u0456\u0445 \u043d\u0430 \u0437\u0430\u0441\u0456\u0434\u0430\u043d\u043d\u0456 \u0447\u043b\u0435\u043d\u0456\u0432 \u041a\u043e\u043c\u0430\u043d\u0434\u0438. \u0423 \u0440\u0430\u0437\u0456 \u0440\u0456\u0432\u043d\u043e\u0433\u043e \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0443 \u0433\u043e\u043b\u043e\u0441\u0456\u0432 \u0432\u0438\u0440\u0456\u0448\u0430\u043b\u044c\u043d\u0438\u043c \u0454 \u0433\u043e\u043b\u043e\u0441 \u0433\u043e\u043b\u043e\u0432\u0443\u044e\u0447\u043e\u0433\u043e \u043d\u0430 \u0437\u0430\u0441\u0456\u0434\u0430\u043d\u043d\u0456.\n\n12. Decisions of the Team are made by a majority vote of the members of the Team present at the meeting. In the event of an equal distribution of votes, the vote of the presiding officer at the meeting is decisive.\n\n13. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u043e\u0444\u043e\u0440\u043c\u043b\u044e\u044e\u0442\u044c\u0441\u044f \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430\u043c\u0438, \u044f\u043a\u0456 \u043f\u0456\u0434\u043f\u0438\u0441\u0443\u044e\u0442\u044c\u0441\u044f \u0433\u043e\u043b\u043e\u0432\u0443\u044e\u0447\u0438\u043c \u043d\u0430 \u0437\u0430\u0441\u0456\u0434\u0430\u043d\u043d\u0456 \u0442\u0430 \u0441\u0435\u043a\u0440\u0435\u0442\u0430\u0440\u0435\u043c \u041a\u043e\u043c\u0430\u043d\u0434\u0438.\n\n13. Decisions of the Team are documented in minutes, which are signed by the presiding officer at the meeting and the secretary of the Team.\n\n14. \u041e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0439\u043d\u043e-\u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454 \u041c\u0456\u043d\u0456\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f \u0423\u043a\u0440\u0430\u0457\u043d\u0438.\n\n14. Organizational and technical support for the activities of the Team is provided by the Ministry of Health of Ukraine."},"content":{"rendered":"<p>Of course, here is the translation of the provided act:<\/p>\n<p>1.  **Essence of the law:** This order approves the Regulation on the sectoral team for responding to cyber incidents, cyberattacks, cyber threats in the field of healthcare (STR). It defines the tasks, functions, and powers of the STR, which is to ensure cybersecurity in the healthcare sector and respond to cyber threats. The STR is part of the national cyber incident response system and interacts with other cybersecurity entities.<\/p>\n<p>2.  **Structure of the law:**<br \/>\n    *   Order of the Ministry of Health of Ukraine on the approval of the Regulation.<br \/>\n    *   The Regulation on the sectoral response team itself, consisting of three sections:<br \/>\n        *   I. General Provisions: defines the basic principles of the STR&#8217;s activities, its subordination, and interaction with other entities.<br \/>\n        *   II. Purpose, Functions, and Tasks: describes the objectives of the STR&#8217;s creation, its main tasks for monitoring, analyzing, and responding to cyber incidents, as well as functions for organizing cybersecurity, detecting, and preventing incidents.<br \/>\n        *   III. Rights and Obligations: defines the rights of the STR to interact with other bodies and involve specialists, as well as obligations to comply with legislation, perform tasks, and exchange information.<\/p>\n<p>3.  **Main provisions:**<br \/>\n    *   The STR is created to ensure cybersecurity in the healthcare sector and respond to cyber incidents.<br \/>\n    *   The STR monitors, analyzes, and responds to cyber threats, and provides recommendations to stakeholders.<br \/>\n    *   The STR has the right to interact with other bodies and involve specialists to enhance cybersecurity.<br \/>\n    *   The STR is obliged to comply with legislation, perform tasks, and exchange information with other cybersecurity entities.<br \/>\n    *   This act is important for ensuring the cybersecurity of critical infrastructure in the healthcare sector, especially in the context of hostilities and increased cyber threat.<\/p>\n<p><a href=\"https:\/\/zakon.rada.gov.ua\/go\/z0194-26\"><strong>Full text by link<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of course, here is the translation of the provided act: 1. **Essence of the law:** This order approves the Regulation on the sectoral team for responding to cyber incidents, cyberattacks, cyber threats in the field of healthcare (STR). It defines the tasks, functions, and powers of the STR, which is to ensure cybersecurity in the&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"pmpro_default_level":"","footnotes":""},"categories":[15,45],"tags":[],"class_list":["post-15563","post","type-post","status-publish","format-standard","hentry","category-ukrainian-legislation-general-en","category-ukrainian-legislation-important","pmpro-has-access"],"acf":{"patreon-level":0},"_links":{"self":[{"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/posts\/15563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/comments?post=15563"}],"version-history":[{"count":0,"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/posts\/15563\/revisions"}],"wp:attachment":[{"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/media?parent=15563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/categories?post=15563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lexcovery.com\/en\/wp-json\/wp\/v2\/tags?post=15563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}