26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:
Categories
Value
Category
Sysmiss
Warning: these figures indicate the number of cases found in the data file. They cannot be interpreted as summary statistics of the population of interest.