Handling Medical Data in the Netherlands: A Practical Guide for Developers
Working on an app or system that touches medical data in the Netherlands? Then you're not just building features, you're operating in one of the most tightly regulated data domains out there. This post breaks down what you actually need to know (and care about) as a developer: what the law expects, where the real constraints are, and how standards like NEN 7510 fit into your system design.
Info
For a more in-depth explanation, read the repository
ISO 27001 compliance
NEN 7510 is pretty much an expanded version of ISO 27001. If you comply with NEN 7510, you're most likely also ISO 27001 compliant.
Why this matters
If your application processes medical data under Dutch jurisdiction, you're dealing with:
- Strict privacy laws (AVG / GDPR)
- Additional rules for medical data
- Mandatory security standards (like NEN 7510)
And importantly: these rules apply even if you're "just building the backend."
Step 1: Everything starts with the AVG (GDPR)
Before you even touch medical data, you need to understand the baseline: the AVG (the Dutch implementation of GDPR).
The short version developers care about
- If you store or process data from people on EU territory, you must comply
- Collect as little data as possible.
-
Be explicit about:
- what you store
- why you store it
- how long you store it
-
Make sure there is a lawful ground for storing or processing data (explained in step 2)
-
People can:
- request access to their data
- request to correct data
- request deletion of their data
-
Data breaches must be reported within 72 hours to the https://www.autoriteitpersoonsgegevens.nl/datalek-melden
What counts as "personal data"?
Anything traceable to a person. That includes:
- Names, emails, etc.
- Pseudonymized data (if reversible)
- Device-related data (if it can identify someone)
- Location related data (IP-addresses, geo-location, etc)
"Sensitive" data (aka: don't touch unless you really have to)
This includes:
- Health data (obviously)
- Biometric/genetic data
- Religion, politics, sexuality
- Ethnicity
- Union membership
Rule of thumb: if you don't absolutely need it → don't store or process it.
Step 2: Legal basis for processing data
You can't just collect data because your app needs it. You need a legal basis. The common ones in practice:
- Contract → required to deliver your service
- Legal obligation
- Vital interest → life-or-death scenarios
- Public task
- Legitimate interest → tricky, requires balancing
- Consent → user explicitly agrees
If you can't clearly explain your legal basis, you shouldn't be storing or processing the data.
Step 3: Core data protection principles (design implications)
These aren't just legal theory, they directly affect your architecture:
- Data minimization → don't over-engineer schemas
- Purpose limitation → no "we'll use it later"
- Storage limitation → build deletion/retention logic
- Accuracy → allow updates
- Security → encryption, access control
- Accountability → logging + documentation
If you're designing systems, these should show up in your requirements—not as an afterthought.
Step 4: Medical data = extra restrictions
Warning
Handling medical data is forbidden by default.
When is it allowed?
Only when:
- It's part of a treatment context, AND
- You have a valid legal basis, AND
- The patient gave explicit consent
Also:
- All medical data tied to a patient = patient dossier
- You must clearly define why you store it (your "grondslag")
Step 5: Sharing medical data
Inside your organization
- Allowed (but only with personnel related to the treatment of the patient)
- No extra consent required
Outside your organization (other providers, research, third parties)
- Requires explicit patient consent
- You must clearly communicate:
- what data is shared
- with whom
- why
There are legal exceptions, but don't rely on those unless you know exactly what you're doing.
Step 6: Compliance isn't optional — enter NEN 7510
Unlike many guidelines, NEN 7510 is mandatory in the Netherlands for healthcare systems. Think of it as your security and design baseline.
What it means in practice
You're expected to implement:
- RBAC (Role-Based Access Control) with Zero-trust mindset: no one gets access by default.
- 2FA: Required for systems handling patient data.
- Encryption: Data must be encrypted both in transit and at rest. For web-applications this means that HTTPS is mandatory.
- Monitoring & logging: You need visibility into system behavior.
- Backups: Backups must be encrypted at rest and tested regularly to ensure that they can be restored.
- Session management: Auto-logout on inactivity.
- Brute-force protection: Rate limiting, CAPTCHA, etc.
- Secure coding practices: OWASP-level hygiene is expected.
- No anonymous access: Everything must be authenticated.
- Data cleanup: Don't keep data longer than needed, in compliance with the data retention policy.
- Deduplication: Patients must have only one dossier. If multiple occur, they should be merged together.
- Unique identifier: Screens and prints must contain clear identification of the patient, such as name, birthdate, etc.
Also: you're expected to perform a risk assessment. There's no prescribed method, just that you must do it.
Step 7: Logging (NEN 7513)
Logging is absolutely not optional, it is required. NEN 7513 defines how to log medical system activity.
Key requirements
You must log:
- Who did something
- What they did
- When they did it
- Which patient data was involved
- Why (if applicable)
Examples of events to log
- Logins (success + failure)
- Authorization attempts
- Data access (including reads!)
- Data changes (CRUD)
- Role/permission changes
- System config changes
- External data exchanges
Important constraints
- Logs must be immutable
- Actions from admins are logged
- Patients have the right to see:
- their data
- who accessed it
Also: logs themselves are sensitive data → protect them just like medical data.
Step 8: Messaging (NTA 7516)
If your system sends medical data via email or chat, this standard applies.
Key requirements
- TLS encryption (TLS 1.2+)
- Message integrity (verify sender + content)
- Clear sender identity
- Authorization checks
- Logging (again)
- Minimal metadata
- EU data boundaries
UX constraint (often overlooked)
Users must be able to:
- Read messages without creating an account
- Save them easily
Yes, this has real architectural implications.
So what does this mean for your architecture?
If you boil it down:
- Treat medical data as data that must be protected as best as possible
- Design for:
- minimal data collection
- strict access control
- full traceability (logging)
- Assume:
- audits will happen
- breaches must be reported
- Build:
- consent flows
- deletion workflows
- monitoring systems
Final takeaway
If you want a mental model:
AVG defines whether you can process data NEN 7510/7513/7516 define how you must secure and handle it
And the biggest practical rule:
Do I need the data? If no, don't touch it.
Used sources
- Autoriteit Persoonsgegevens — Gezondheidsgegevens beveiligen (Jan. 3, 2025)
- Autoriteit Persoonsgegevens — Gezondheidsgegevens verwerken (Jan. 3, 2025)
- Autoriteit Persoonsgegevens — Gezondheidsgegevens delen binnen de zorg (Oct. 1, 2025)
- Autoriteit Persoonsgegevens — Grondslagen AVG uitgelegd (May 28, 2025)
- Autoriteit Persoonsgegevens — Gezondheidsgegevens delen met derden
- AVG (Algemene Verordening Gegevensbescherming) https://avgb.nl
- NEN 7510 — Informatiebeveiliging in de zorg (Official standard, 2019)
- NEN 7513 — Logging van acties op elektronische patiëntendossiers (Official standard, 2019)
- NTA 7516 — Veilige communicatie in de zorg (Official standard, 2019)