Comparison Overview

Gemeente Huizen

VS

PL+US: Paid Leave for the United States

Gemeente Huizen

Graaf Wichman 10, 1276 KB, Huizen, NL, 1270-1277
Last Update: 2025-11-28
Between 700 and 749

In Huizen wonen ongeveer 42.000 mensen. Het dorp ligt in één van de mooiste gedeelten van het Gooi. Huizen ligt aan de rand van het Gooimeer en is omgeven door bos en heide. Dit betekent rust, ruimte, groen, water en volop recreatiemogelijkheden. Ook heeft Huizen goede voorzieningen, zoals een theater, een bioscoop en een openluchtbad. Onze organisatie is daadkrachtig en dienstverlenend. Wij werken met 300 medewerkers binnen zes afdelingen: afdeling Bestuur, burgerzaken en ondersteuning, afdeling Maatschappelijke ondersteuning, afdeling Maatschappelijk beleid, afdeling Omgeving, afdeling Openbare werken en afdeling Financiën en het stafteam Personeel en organisatie. Medewerkers die willen en kunnen, krijgen de kans om zich te ontwikkelen en om te groeien. Realisatiekracht, betrokkenheid en durf zijn eigenschappen waar wij trots op zijn. De gemeente Huizen is in beweging. Dit vraagt om daadkracht, een proactieve houding en uitstekende dienstverlening. Bij alles wat we doen, staat de inwoner centraal. Resultaatgerichtheid, externe oriëntatie, innovatie en samenwerking zijn belangrijke speerpunten in ons werk. We willen onze inwoners op een vriendelijke manier helpen. Aan de balie, aan telefoon en op internet. Daarnaast betrekken we onze inwoners zoveel mogelijk bij ontwikkelingen in onze gemeente. Ons streven is dat zij méér dan tevreden zijn over onze dienstverlening. De organisatie heeft een informeel karakter. Er is een goede, open werksfeer, met korte communicatielijnen. Samenwerking is daarbij heel belangrijk. Benieuwd hoe het is om te werken bij de gemeente Huizen? Bekijk onze film! https://www.youtube.com/watch?v=pFKSY-MOvrI Kijk ook op huizen.nl of volg ons op Facebook (gemeenteHuizen) en Twitter (@gemeente_huizen).

NAICS: 921
NAICS Definition: Executive, Legislative, and Other General Government Support
Employees: 283
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

PL+US: Paid Leave for the United States

PO Box 411075, San Francisco, California, 94141, US
Last Update: 2025-11-24
Between 700 and 749

In 2016, Paid Leave for the U.S. (PL+US) was founded as a time-bound campaign to win paid family and medical leave for every working person in the U.S. In five years, PL+US won paid leave for 8.5 million working people at some of the country’s largest employers and helped advance federal policy through the House of Representatives, a historic achievement. PL+US closed our doors in the summer of 2022, but we invite you to check out paidleave.us to find resources on workplace policies, stats and messaging on paid leave, tips for navigating your own paid leave and some of our organizational lessons learned. For any other inquiries, message [email protected]

NAICS: 921
NAICS Definition: Executive, Legislative, and Other General Government Support
Employees: 2
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/gemeente-huizen.jpeg
Gemeente Huizen
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Gemeente Huizen
100%
Compliance Rate
0/4 Standards Verified
PL+US: Paid Leave for the United States
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Public Policy Offices Industry Average (This Year)

No incidents recorded for Gemeente Huizen in 2025.

Incidents vs Public Policy Offices Industry Average (This Year)

No incidents recorded for PL+US: Paid Leave for the United States in 2025.

Incident History — Gemeente Huizen (X = Date, Y = Severity)

Gemeente Huizen cyber incidents detection timeline including parent company and subsidiaries

Incident History — PL+US: Paid Leave for the United States (X = Date, Y = Severity)

PL+US: Paid Leave for the United States cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/gemeente-huizen.jpeg
Gemeente Huizen
Incidents

No Incident

https://images.rankiteo.com/companyimages/pl-us.jpeg
PL+US: Paid Leave for the United States
Incidents

No Incident

FAQ

Gemeente Huizen company demonstrates a stronger AI Cybersecurity Score compared to PL+US: Paid Leave for the United States company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, PL+US: Paid Leave for the United States company has disclosed a higher number of cyber incidents compared to Gemeente Huizen company.

In the current year, PL+US: Paid Leave for the United States company and Gemeente Huizen company have not reported any cyber incidents.

Neither PL+US: Paid Leave for the United States company nor Gemeente Huizen company has reported experiencing a ransomware attack publicly.

Neither PL+US: Paid Leave for the United States company nor Gemeente Huizen company has reported experiencing a data breach publicly.

Neither PL+US: Paid Leave for the United States company nor Gemeente Huizen company has reported experiencing targeted cyberattacks publicly.

Neither Gemeente Huizen company nor PL+US: Paid Leave for the United States company has reported experiencing or disclosing vulnerabilities publicly.

Neither Gemeente Huizen nor PL+US: Paid Leave for the United States holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Gemeente Huizen company nor PL+US: Paid Leave for the United States company has publicly disclosed detailed information about the number of their subsidiaries.

Gemeente Huizen company employs more people globally than PL+US: Paid Leave for the United States company, reflecting its scale as a Public Policy Offices.

Neither Gemeente Huizen nor PL+US: Paid Leave for the United States holds SOC 2 Type 1 certification.

Neither Gemeente Huizen nor PL+US: Paid Leave for the United States holds SOC 2 Type 2 certification.

Neither Gemeente Huizen nor PL+US: Paid Leave for the United States holds ISO 27001 certification.

Neither Gemeente Huizen nor PL+US: Paid Leave for the United States holds PCI DSS certification.

Neither Gemeente Huizen nor PL+US: Paid Leave for the United States holds HIPAA certification.

Neither Gemeente Huizen nor PL+US: Paid Leave for the United States holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.