Rij toevoegen
Element toevoegen
kropper
update
Noorder Kempen Zakelijk
update
Element toevoegen
  • Thuis
  • ...
    • Medisch & Zorg
    • Agrarisch & Landbouw
    • Bouw & Renovatie
    • Detailhandel & Retail
    • Horeca & Toerisme
    • Industrie & Techniek
    • Logistiek & Transport
    • Zakelijke dienstverlening
    • Onderwijs & Vorming
    • ICT & Innovatie
    • Vastgoed
    • Vrije beroepen & Creatieve sector
    • bevolkingsgegevens
August 09.2025
3 Minutes Read

Court Forces State Secretary to Reconsider VAT System Code Transparency

Professional individual in conference discussing VAT System Code Transparency

The Court Rules for Transparency: A Turning Point for Code Disclosure

In a significant move towards greater transparency, the Gelderland Court has compelled State Secretary Tjebbe van Oostenbruggen of Finance to reassess which portions of the VAT system source code can be made public. The ruling comes after the court found the prior refusal to release the code lacked adequate justification, signaling a growing demand for accountability in government operations.

Why Open Source Matters in Public Administration

Open source in government is not just a matter of policy; it reflects a commitment to transparency, citizen engagement, and innovation. By sharing source codes, governments can invite public scrutiny, encouraging collaboration and helping uncover potential inefficiencies within their systems. In this instance, the call to publicly assess sections of the VAT system's code might illuminate areas for improvement and bolster public trust in the effectiveness of tax collection processes.

A Closer Look at the Court's Findings

The court ruled that the initial decision to withhold the code, dated January 15, 2024, was insufficiently substantiated. The State Secretary cited concerns about national security and the financial implications for the Tax Authority, emphasizing that revealing sensitive information could jeopardize state safety. However, the court emphasized the need for a clearer delineation of which parts of the source code should remain confidential, essentially the reasons behind one of the State Secretary's arguments was retracted during the hearing itself. This inconsistency raised eyebrows and underscored the necessity for detailed reasoning behind each point of contention.

Risk vs. Reward: Addressing Security Concerns

While security risks regarding exposing source code are valid, the court encourages a balanced approach. The source code of the VAT system, particularly due to its reliance on older programming languages, contains hardcoded elements that could indeed present vulnerability. The State Secretary voiced concerns that revealing this code could lead to hostile parties developing targeted malware attacks, not only on the VAT system but potentially affecting interconnected systems. Still, transparency advocates argue that proper engagement with experts can mitigate these risks, opening the door for innovative security solutions while ensuring accountability in public governance.

The Implications of Non-Transparency on Public Trust

The reluctance to openly share the VAT source code can potentially erode trust between the government and the citizens it serves. Transparency in government affairs leads to enhanced public trust, which is crucial for effective governance. By taking a stand for greater openness, the Gelderland Court reinforces the notion that governmental operations should be held to the same scrutiny as any accountability-driven institution. This ruling serves as a beacon for advocacy groups pushing for transparency across various sectors.

What Happens Next?

Following the court’s decree, Secretary van Oostenbruggen has 12 weeks to provide a new decision regarding the public disclosure of the VAT system's source code. This period presents an opportunity for dialogue between governmental bodies and civil society. Engaging with stakeholders can refine the process, ensuring that the government responds to security concerns without compromising its conduct of operations.

Conclusion: Moving Towards a More Transparent Future

The Gelderland Court's ruling may well mark a pivotal moment in the relationship between citizens and their government, underscoring the need for transparency in public administration. By navigating the balance between security and openness, there remains hope for a system that is accountable to the very people it represents. As we await further developments on the VAT source code, let us advocate for continued dialogue and progress toward a more transparent approach in all facets of government.

Medisch & Zorg

3 Views

0 Comments

Write A Comment

*
*
Related Posts All Posts
08.12.2025

Data Sovereignty: A Strategic Necessity for Modern Organizations

Update The Rise of Data Sovereignty: Why It Matters Now More Than Ever Organizations today are at a turning point. With the surge of generative AI and tightening regulations, they are re-evaluating how they manage their data. A recent Global Data Insights Survey indicates that 67% of organizations now have data strategies that significantly influence IT investments. However, many still grapple with implementation, given the increasing governmental pressure surrounding data sovereignty. Understanding Data Sovereignty At its core, data sovereignty is about control. It empowers organizations to determine where their data is stored, who has access, and which laws apply. This concept necessitates a clear understanding of not only the physical locations of data storage but also compliance with both domestic and international regulations. Striking a balance between technical decisions and legal obligations makes data sovereignty a complex, ever-evolving challenge. Strategic Importance: Gaining Control, Speed, and Trust While legislation drives data sovereignty initiatives, organizations benefit from greater speed and control. By storing and processing data locally, they can react more swiftly to incidents, simplify compliance, and reduce reliance on external parties. Moreover, when data is closer to users, the efficiency and availability of data traffic improve. This is crucial as organizations face an average of 52% citing a shortage of budget for infrastructure as a barrier to implementation. Challenges: Knowledge, Costs, and Choices With increased control comes increased responsibility. Organizations must invest in knowledge, processes, and technology to effectively manage data sovereignty. They must consider how much autonomy is desired and what it will cost. A practical solution is leveraging colocation data centers and external expertise. This strategy centralizes infrastructure while allowing specialized partners to support technical and legal data management aspects. It alleviates internal pressure without sacrificing oversight. Protecting Data: A Necessary Measure Data protection has become critical. Organizations must safeguard sensitive information from unauthorized access. Key decisions involve identifying which data requires protection, determining where to store it for minimal external access, and ensuring that security remains scalable and affordable. Addressing these questions requires not just technical know-how, but also strategic insight into risks and dependencies. Building a Data Sovereignty Strategy: Three Key Steps Data sovereignty is not a one-off decision but an ongoing process. Organizations can establish a foundation for scalable and secure infrastructure through these three steps: Map Your Data: Understand what data your organization holds, where it is stored, and who has access. Ensure compliance with local laws by selecting data centers within your operational markets or employing hybrid solutions. Implement Security Measures: Apply adequate security measures that align with regional standards for data protection. Educate Your Team: Ensure that your team understands the importance of data sovereignty and the protocols in place to manage it effectively. Understanding the intricacies of data sovereignty arms organizations with the knowledge to make informed decisions about their data management practices. As the landscape evolves, those who prioritize data sovereignty not only comply with regulatory demands but gain a competitive edge in the marketplace. In today's digital age, organizations must embrace data sovereignty not just as a regulatory requirement but as a strategic necessity. Prioritizing strategic data management can empower them to better respond to challenges while ensuring they remain resilient in a rapidly changing environment. If you're looking to understand better how data sovereignty can apply to your organization and what steps you can take to improve your data management practices, consider seeking expert guidance or innovative solutions in your locality. The future of your data landscape starts with these proactive choices.

08.09.2025

De Toekomst van Robotisering in 2025: Hype of Realiteit?

Update Robotisering in 2025: De Kloof Tussen Hype en Realiteit De afgelopen jaren hebben we getuige geweest van een onstuitbare opmars van robotica de verscheidene sectoren binnen ons dagelijks leven. Van fabrieken tot ziekenhuizen en zelfs in onze eigen huishoudens, robots zijn overal. Met de explosieve groei van kunstmatige intelligentie worden we overspoeld door futuristische beelden van dansende humanoïde robots, drones die pakketjes afgeleverd worden, en zelfrijdende auto’s die naar verluidt beter kunnen rijden dan mensen. Maar hoe geavanceerd zijn deze technologieën werkelijk? Laten we enkele belangrijke vragen onderzoeken. Het Verhaal Achter Tesla’s Humanoïde Robot Neem bijvoorbeeld Tesla’s humanoïde robot, Optimus. Tijdens het 'We Robot'-evenement in 2024 leek het alsof deze robot zelfstandig bewoog. Echter, dit bleek niet waar te zijn; de robot werd op afstand bestuurd door menselijke operators. Dit roept een belangrijke vraag op: hoe betrouwbaar zijn de demonstraties van robots die ons uiteindelijk een toekomstbeeld van volledige autonomie beloven? Dit is vergelijkbaar met Nikola's elektrische vrachtwagen, die enkel voorwaarts bewoog omdat hij van een helling afrollde, of de zelfrijdende auto’s van Tesla die hun autonomie veel minder konden waarmaken in de werkelijkheid. De Context van Robotisatie: Gecontroleerde en Ongcontroleerde Omgevingen Wat cruciaal is om te begrijpen, is de omgeving waarin robots opereren. Er bestaan kwalificaties van omgevingen: gecontroleerd, semi-gecontroleerd en ongecontroleerd. In een strikt gecontroleerde omgeving, zoals hoogtechnologische productie bij bedrijven zoals ASML, behalen robots verbluffende prestaties. Ze functioneren met hoge snelheid en precisie dankzij een omgeving die vrij is van variabelen. Maar naarmate we deze gecontroleerde instellingen verlaten, zien we dat de complexiteit toeneemt. De Uitdaging van Semi-Gecontroleerde Omgevingen In semi-gecontroleerde omgevingen zoals magazijnen moeten robots zich aanpassen aan onvoorspelbaarheid. Een voorbeeld hiervan is het systeem van autonome mobiele robots (AMR's) bij Amazon, waar robots moeten navigeren in ruimten die niet statisch zijn. Hier is het essentieel dat robots veilig kunnen samenwerken met mensen en zich kunnen aanpassen aan onvoorziene obstakels, zoals verkeerd geplaatste dozen. Hoewel de opkomst van soft robotics veelbelovend is, blijft deze technologie in een experimentele fase. De Echte Wereld: Ongeregeld en Onvoorspelbaar Als we naar volledig ongecontroleerde omgevingen kijken, zoals stadsstraten of agrarische gebieden, wordt de kloof tussen belofte en realiteit nog duidelijker. Zelfrijdende auto's presteren vaak goed onder droge omstandigheden in bekende omgevingen, maar zodra er regen of andere onregelmatigheden aan te pas komen, kan hun besluitvormingscapaciteit tekortschieten. Bezorgdrones werken alleen in streng afgebakende gebieden en hebben toezicht nodig, ondanks dat ze in gecontroleerde situaties goed presteren. Feiten en Misverstanden rondom Robotica Er zijn een aantal misverstanden over robotica die dieper onderzocht moeten worden. Veel mensen geloven dat robots snel en gemakkelijk kunnen worden geïntegreerd in ons dagelijks leven, maar de werkelijkheid is dat de technologie nog veel ruimte voor ontwikkeling nodig heeft. Autonome systemen kunnen effectief blijven reageren op het onverwachte, maar ze zijn lang niet perfect. Dit betekent dat er constant een risico verbonden is aan hun inzet in publieke ruimtes. Waarom Het Belangrijk Is om Waakzaam Te Zijn De opkomst van robots in onze samenlevingen heeft potentieel invloed op werkgevers, consumenten en de algehele arbeidsmarkt. Het begrijpen van de technische mogelijkheden en achterliggende uitdagingen, zoals de ethiek van autonoom handelen en de impact op werkgelegenheid, is cruciaal. Laten we niet vergeten dat technologische vooruitgang vaak langzamer dan verwacht verloopt, en het is belangrijk dat beleidsmakers en het publiek realistische verwachtingen hebben. Zet Je In Voor Innovatie en Realiteit Het is van vitaal belang dat we onszelf blijven informeren over de staat van robotica en automation. Nu is het niet alleen een kwestie van nieuwsgierigheid—het gaat om onze toekomst. Blijf op de hoogte van de laatste ontwikkelingen en onderwijs jezelf en anderen over deze technologieën. Hoe meer we begrijpen van wat er werkelijk speelt, hoe beter voorbereid we zijn op wat komen gaat. Neem deel aan discussies, abonneer je op nieuwsbrieven en volg interessante bronnen. Hoe meer we ons verbinden met technologieën die ons leven verbeteren, hoe beter we in staat zijn om ze te benutten voor de vooruitgang van de samenleving.

08.07.2025

ShinyHunters Attack: Understanding the Threat to Major Businesses

Update Understanding ShinyHunters: Who Are They?ShinyHunters is a notorious hacker collective that has gained attention for their high-profile data breaches. Formed in 2020, their primary focus is the lucrative trade of sensitive information, particularly targeting organizations that manage valuable customer data. With past attacks involving major corporations like Microsoft and AT&T, the collective's method involves breaching systems, stealing data, and selling it on the dark web. Recent attacks on Salesforce environments have only added to their infamous reputation, affecting companies like Google and Air France-KLM.The Anatomy of the Latest AttacksOver the past few weeks, numerous organizations have reported being victims of ShinyHunters, highlighting the group's rogue activities. For instance, Google recently acknowledged that some customer data had been compromised in a Salesforce instance, consisting mostly of publicly available details such as business contact numbers. This raises concerns about the effectiveness of data protection strategies employed by these corporations as they increasingly rely on cloud-based solutions.Air France-KLM also fell victim, revealing compromised user data, including names and airmiles information specific to customers who interacted with their service teams. This incident underscores the risks that come with handling sensitive customer information and the vital need for enhanced security measures, especially at a time when cyber threats are growing more sophisticated.Other Victims and the Broader ImpactThe impact of ShinyHunters extends beyond these two firms. The hacker group has reportedly breached various entities, including renowned brands like LVMH and Adidas. Additionally, they have targeted customer service databases of companies like Chanel and Pandora, leading to significant concerns about customer data safety. These breaches not only jeopardize private information but also undermine public trust in these organizations.What This Means for Your DataDespite these attacks, the data stolen has not yet appeared on public platforms, which raises critical questions about the potential future use of this information. Victims may consider paying ransom to avoid leaks, but experts warn against this tactic as it provides no guarantees that the hackers will not release the data afterward.Steps to Protect YourselfIn light of these ongoing security threats, individuals and businesses are urged to take proactive measures to safeguard their information. This includes regularly updating passwords, using two-factor authentication, and remaining vigilant about phishing attempts that could compromise account security. Understanding the risks from groups like ShinyHunters is essential for maintaining personal and organizational integrity.The Bigger Picture: Cybersecurity AwarenessUltimately, these incidents highlight a broader need for cybersecurity awareness among both individuals and organizations. As technology continues to evolve, so do the methods of cybercriminals. Engaging with security training, using up-to-date security software, and being cautious of unsolicited communications can go a long way in preventing data breaches.

Terms of Service

Privacy Policy

Core Modal Title

Sorry, no results found

You Might Find These Articles Interesting

T
Please Check Your Email
We Will Be Following Up Shortly
*
*
*