<?xml version="1.0" encoding="UTF-8"?>
<codeBook version="1.2.2" ID="WLD_2020_GDRD_v01_M" xml-lang="en" xmlns="http://www.icpsr.umich.edu/DDI" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.icpsr.umich.edu/DDI http://www.icpsr.umich.edu/DDI/Version1-2-2.xsd">
<docDscr>
  <citation>
    <titlStmt>
      <IDNo>DDI_WLD_2020_GDRD_v01_M_M_WB</IDNo>
    </titlStmt>
    <prodStmt>
      <producer abbr="DECDG" affiliation="World Bank" role="Documentation of the Study">Development Data Group</producer>
      <prodDate date="2021-03-16">2021-03-16</prodDate>
      <software version="v5">NADA</software>
    </prodStmt>
    <verStmt>
      <version>V01</version>
    </verStmt>
  </citation>
</docDscr>
<stdyDscr>
  <citation>
    <titlStmt>
      <titl>Global Data Regulation Diagnostic Survey Dataset 2021</titl>
      <subTitl/>
      <altTitl>GDRD 2021</altTitl>
      <parTitl/>
      <IDNo>WLD_2020_GDRD_v01_M</IDNo>
    </titlStmt>
    <rspStmt>
      <AuthEnty affiliation="">World Bank</AuthEnty>
    </rspStmt>
    <prodStmt>
      <producer abbr="" affiliation="World Bank Group " role="Primary Investigator">Cheng Rong</producer>
      <producer abbr="" affiliation="World Bank Group " role="Questionnaire Designer ">David Satola</producer>
      <producer abbr="" affiliation="World Bank Group " role="Questionnaire Designer ">Adele  Barzelay</producer>
      <copyright>(c) 2021, World Bank</copyright>
      <software version="5.0" date="2022-06-18">NADA</software>
      <fundAg abbr="USAID " role="">United States Agency for International Development</fundAg>
      <fundAg abbr="WDR 2021" role="">World Development Report 2021</fundAg>
      <grantNo/>
    </prodStmt>
    <distStmt>
      <contact affiliation="World Bank Group " URI="" email="rchen5@worldbank.org">Rong Chen</contact>
      <depositr abbr="WDR21" affiliation="World Bank">WDR 2021 Team</depositr>
      <depDate date=""/>
      <distDate date=""/>
    </distStmt>
    <serStmt>
      <serName>Administrative Records, Other (ad/oth]</serName>
      <serInfo/>
    </serStmt>
    <verStmt>
      <version date="2021-03-21">- v2.1:  Edited, anonymous dataset for public distribution.</version>
      <verResp/>
      <notes/>
    </verStmt>
    <biblCit format=""/>
    <notes/>
  </citation>
  <stdyInfo>
    <studyBudget/>
    <subject>
                  
                  
    </subject>
    <abstract>The Global Data Regulation Diagnostic provides a comprehensive assessment of the quality of the data governance environment. Diagnostic results show that countries have put in greater effort in adopting enabler regulatory practices than in safeguard regulatory practices. However, for public intent data, enablers for private intent data, safeguards for personal and nonpersonal data, cybersecurity and cybercrime, as well as cross-border data flows. Across all these dimensions, no income group demonstrates advanced regulatory frameworks across all dimensions, indicating significant room for the regulatory development of both enablers and safeguards remains at an intermediate stage: 47 percent of enabler good practices and 41 percent of good safeguard practices are adopted across countries. Under the enabler and safeguard pillars, the diagnostic covers dimensions of e-commerce/e-transactions, enablers further improvement on data governance environment.

The Global Data Regulation Diagnostic is the first comprehensive assessment of laws and regulations on data governance. It covers enabler and safeguard regulatory practices in 80 countries providing indicators to assess and compare their performance. This Global Data Regulation Diagnostic develops objective and standardized indicators to measure the regulatory environment for the data economy across countries. The indicators aim to serve as a diagnostic tool so countries can assess and compare their performance vis-á-vis other countries. Understanding the gap with global regulatory good practices is a necessary first step for governments when identifying and prioritizing reforms.</abstract>
    <sumDscr>
      <collDate date="2020/03/1" event="start" cycle=""/>
      <collDate date="2020/06/1" event="end" cycle=""/>
      <nation abbr="AFG">Afghanistan</nation>
      <nation abbr="AGO">Angola</nation>
      <nation abbr="ARG">Argentina</nation>
      <nation abbr="ARM">Armenia</nation>
      <nation abbr="AUS">Australia</nation>
      <nation abbr="BGD">Bangladesh</nation>
      <nation abbr="BEN">Benin</nation>
      <nation abbr="BOL">Bolivia</nation>
      <nation abbr="BRA">Brazil</nation>
      <nation abbr="BFA">Burkina Faso</nation>
      <nation abbr="KHM">Cambodia</nation>
      <nation abbr="CMR">Cameroon</nation>
      <nation abbr="CAN">Canada</nation>
      <nation abbr="CHL">Chile</nation>
      <nation abbr="CHN">China</nation>
      <nation abbr="COL">Colombia</nation>
      <nation abbr="COD">Congo, Dem. Rep.</nation>
      <nation abbr="CIV">Côte d'Ivoire</nation>
      <nation abbr="DOM">Dominican Republic</nation>
      <nation abbr="EGY">Egypt, Arab Rep.</nation>
      <nation abbr="EST">Estonia</nation>
      <nation abbr="ETH">Ethiopia</nation>
      <nation abbr="GAB">Gabon</nation>
      <nation abbr="GMB">Gambia</nation>
      <nation abbr="GEO">Georgia</nation>
      <nation abbr="GHA">Ghana</nation>
      <nation abbr="HTI">Haiti</nation>
      <nation abbr="HND">Honduras</nation>
      <nation abbr="IND">India</nation>
      <nation abbr="IDN">Indonesia</nation>
      <nation abbr="IRN">Iran, Islamic Rep.</nation>
      <nation abbr="IRQ">Iraq</nation>
      <nation abbr="ISR">Israel</nation>
      <nation abbr="JOR">Jordan</nation>
      <nation abbr="KAZ">Kazakhstan</nation>
      <nation abbr="KEN">Kenya</nation>
      <nation abbr="KOR">Korea, Rep.</nation>
      <nation abbr="KGZ">Kyrgyz Republic</nation>
      <nation abbr="LAO">Lao PDR</nation>
      <nation abbr="LBN">Lebanon</nation>
      <nation abbr="LBR">Liberia</nation>
      <nation abbr="MDG">Madagascar</nation>
      <nation abbr="MWI">Malawi</nation>
      <nation abbr="MYS">Malaysia</nation>
      <nation abbr="MLI">Mali</nation>
      <nation abbr="MUS">Mauritius</nation>
      <nation abbr="MEX">Mexico</nation>
      <nation abbr="MDV">Moldova</nation>
      <nation abbr="MAR">Morocco</nation>
      <nation abbr="MMR">Myanmar</nation>
      <nation abbr="NPL">Nepal</nation>
      <nation abbr="NIC">Nicaragua</nation>
      <nation abbr="NGA">Nigeria</nation>
      <nation abbr="OMN">Oman</nation>
      <nation abbr="PAK">Pakistan</nation>
      <nation abbr="PNG">Papua New Guinea</nation>
      <nation abbr="PER">Peru</nation>
      <nation abbr="PHL">Philippines</nation>
      <nation abbr="QAT">Qatar</nation>
      <nation abbr="RUS">Russian Federation</nation>
      <nation abbr="RWA">Rwanda</nation>
      <nation abbr="SAU">Saudi Arabia</nation>
      <nation abbr="SEN">Senegal</nation>
      <nation abbr="SLE">Sierra Leone</nation>
      <nation abbr="SGP">Singapore</nation>
      <nation abbr="ZAF">South Africa</nation>
      <nation abbr="LKA">Sri Lanka</nation>
      <nation abbr="TJK">Tajikistan</nation>
      <nation abbr="TZA">Tanzania</nation>
      <nation abbr="THA">Thailand</nation>
      <nation abbr="TGO">Togo</nation>
      <nation abbr="TUN">Tunisia</nation>
      <nation abbr="TUR">Turkiye</nation>
      <nation abbr="UGA">Uganda</nation>
      <nation abbr="UKR">Ukraine</nation>
      <nation abbr="ARE">United Arab Emirates</nation>
      <nation abbr="GBR">United Kingdom</nation>
      <nation abbr="URY">Uruguay</nation>
      <nation abbr="UZB">Uzbekistan</nation>
      <nation abbr="VNM">Vietnam</nation>
      <geogCover>80 countries</geogCover>
      <geogUnit/>
      <anlyUnit>Country</anlyUnit>
      <universe/>
      <dataKind>Observation data/ratings [obs]</dataKind>
    </sumDscr>
    <!-- qualityStatement - ddi2.5 - complex type
     
     This structure consists of two parts, standardsCompliance and otherQualityStatements. 
     In standardsCompliance list all specific standards complied with during the execution of this 
     study. Note the standard name and producer and how the study complied with the standard. 
     Enter any additional quality statements in otherQualityStatements.
     
     -->
    <qualityStatement>
      <standardsCompliance>
        <standard>
          <standardName/>
          <producer/>
        </standard>
        <complianceDescription/>
      </standardsCompliance>
      <otherQualityStatement/>
    </qualityStatement>
    <notes>The scope of the study includes:

A. Safeguard rights in data flows and the (re)use of data

1. Legal basis for data protection

Personal data protection/privacy
2. Lawfulness
3. Exceptions to limitations on data collection, processing and transfer
4. Consent
5. Purpose limitation, proportionality, data minimization
6. Data quality
7. Accountability
8. Sensitive personal data
9. Storage limitations
10. Privacy by design
11. Limitations on data sharing

Intermediary liability
12. Definition of liability
13. Scope of liability
14. Due process

Individual rights
15. Right to be notified of a data breach
16. Right to access and review use of personal data
17. Right to challenge accuracy and to rectification of personal data
18. Right to withdraw consent to data processing
19. Right to deletion of personal data (“right to be forgotten”)
20. Automated decisions
21. Redress
22. Institutional arrangements to enforce personal data protection

Safeguards specific to non-personal data
23. Intellectual Property Rights
24. Net Neutrality

Cybersecurity and cybercrime
25. Data security
26. Internal adoption of cybersecurity standards
27. Cybercrime: criminalized activities
28. Cybersecurity infrastructure and enforcement agency (CERT)

Cross-border data flows
29. Data localization/local processing
30. Adequacy and mutual recognition arrangements
31. Regional integration and harmonization

B. Enable data transactions/flows and the (re)use of data

32. Legal basis for e-commerce/transactions
33. Legal (functional) equivalence
34. E-Signature
35. Exceptions to e-signature
36. Certification authority (CA) for digital signatures
37. Technological neutrality
38. Data portability
39. Use, reuse, and sharing of public sector data
40. Primary ID system
41. ID credential
42. ID data verification
43. Digital ID system for online service access
44. Interoperability of data
45. Access to Information
46. Open data
47. Data classification

Restrictions on use/reuse of public sector data
48. Intellectual Property Rights (IPRs) and licensing of public sector data
49. Sharing-friendly license
50. Data archiving and Digital preservation

Use, reuse and sharing of private sector data
51. Data sharing regimes for private sector data
52. Role/mandate of antitrust authorities
53. Voluntary licensing of Intellectual Property Rights (IPRs) for private sector
54. Data-related codes of conduct</notes>
    <!-- exPostEvaluation ddi2.5
      Use this section to describe evaluation procedures not address in data evaluation processes. 
      These may include issues such as timing of the study, sequencing issues, cost/budget issues, 
      relevance, instituional or legal arrangments etc. of the study. 
      
      The completionDate attribute holds the date the evaluation was completed. 
      The type attribute is an optional type to identify the type of evaluation with or without 
      the use of a controlled vocabulary.
    -->
    <exPostEvaluation completionDate="" type="">
      <evaluationProcess/>
      <outcomes/>
    </exPostEvaluation>
  </stdyInfo>
  <method>
    <dataColl>
      <timeMeth/>
      <dataCollector abbr="" affiliation="World Bank Group ">Aliaksandra Tyhrytskaya</dataCollector>
      <dataCollector abbr="" affiliation="World Bank Group">Federico Cardenas Chacon</dataCollector>
      <dataCollector abbr="" affiliation="World Bank Group">Lillyana Sophia Daza Jaller</dataCollector>
      <dataCollector abbr="" affiliation="World Bank Group">New Doe Kaledzi</dataCollector>
      <dataCollector abbr="" affiliation="World Bank Group">Nicolas Conserva</dataCollector>
      <dataCollector abbr="" affiliation="World Bank Group">Paris Gkartzonikasm</dataCollector>
      <!-- collectorTraining - DDI2.5
        
        Collector Training

        Describes the training provided to data collectors including internviewer training, process testing, 
        compliance with standards etc. This is repeatable for language and to capture different aspects of the 
        training process. The type attribute allows specification of the type of training being described.
        
        -->
      <collectorTraining type=""/>
      <frequenc/>
      <sampProc>The diagnostic is based on a detailed assessment of domestic laws, regulations, and administrative requirements in 80 countries selected to ensure a balanced coverage across income groups, regions, and different levels of digital technology development. Data are further verified through a detailed desk research of legal texts, reflecting the regulatory status of each country as of June 1, 2020.</sampProc>
      <sampleFrame>
        <sampleFrameName/>
        <custodian/>
        <universe/>
        <frameUnit isPrimary="">
          <unitType numberOfUnits=""/>
        </frameUnit>
        <updateProcedure/>
      </sampleFrame>
      <deviat/>
      <collMode>Mail Questionnaire [mail]</collMode>
      <resInstru>The questionnaire comprises 37 questions designed to determine if a country has adopted good regulatory practice on data governance. The responses are then scored and assigned a normative interpretation. Related questions fall into seven clusters so that when the scores are averaged, each cluster provides an overall sense of how it performs in its corresponding regulatory and legal dimensions. These seven dimensions are: (1) E-commerce/e-transaction; (2) Enablers for public intent data; (3) Enablers for private intent data; (4) Safeguards for personal data; (5) Safeguards for nonpersonal data;  (6) Cybersecurity and cybercrime; (7) Cross-border data transfers.</resInstru>
      <!-- instrumentDevelopment - DDI2.5             
        Describe any development work on the data collection instrument. Type attribute allows for the optional use of a defined development type with or without use of a controlled vocabulary.
        -->
      <instrumentDevelopment type=""/>
      <collSitu>Standard questionnaires are used to collect the data and are completed mainly by lawyers specializing in data governance and information and communication technology (ICT) providing a detailed desk review of legal texts as of June 1, 2020.</collSitu>
      <actMin/>
      <ConOps/>
      <weight>Unweighted</weight>
      <cleanOps/>
    </dataColl>
    <notes/>
    <anlyInfo>
      <respRate>100%</respRate>
      <EstSmpErr/>
      <dataAppr/>
    </anlyInfo>
    <stdyClas/>
    <dataProcessing type=""/>
    <codingInstructions relatedProcesses="" type="">
      <txt/>
      <command formalLanguage=""/>
    </codingInstructions>
  </method>
  <dataAccs>
    <setAvail>
      <accsPlac URI=""/>
      <origArch/>
      <avlStatus/>
      <collSize/>
      <complete/>
      <fileQnty/>
      <notes/>
    </setAvail>
    <useStmt>
      <confDec required="yes" formNo="" URI=""/>
      <restrctn/>
      <contact affiliation="World Bank" URI="" email="rchen5@worldbank.org">Cheng Rong</contact>
      <contact affiliation="World Bank" URI="microdata.worldbank.org" email="">Microdata Library</contact>
      <citReq>Use of the dataset must be acknowledged using a citation which would include:
- the Identification of the Primary Investigator
- the title of the survey (including country, acronym and year of implementation)
- the survey reference number
- the source and date of download

Example:

World Bank. World-Global Data Regulation Diagnostic (GDRD) Survey Dataset 2021. Ref: WLD_2020_GDRD_v01_M. Downloaded from [url] on [date]</citReq>
      <deposReq/>
      <conditions/>
      <disclaimer>The user of the data acknowledges that the original collector of the data, the authorized distributor of the data, and the relevant funding agency bear no responsibility for use of the data or for interpretations or inferences based upon such uses.</disclaimer>
    </useStmt>
    <notes/>
  </dataAccs>
  <notes/>
</stdyDscr>
<fileDscr ID="F1">
  <fileTxt>
    <fileName>enablers.dta</fileName>
    <fileCont>This file contains data from Questionnaire Section B: Enable data transactions/flows and the (re)use of data 
The section focuses on legal requirements related to e-signature, data portability, interoperability, digital ID system, open data and other mechanisms to enable and promote the use, reuse and sharing of public and private sector data.</fileCont>
    <dimensns>
      <caseQnty>81</caseQnty>
      <varQnty>40</varQnty>
    </dimensns>
    <dataChck></dataChck>
    <dataMsng></dataMsng>
    <verStmt>
      <version></version>
    </verStmt>
  </fileTxt>
  <notes></notes>
</fileDscr>
<fileDscr ID="F2">
  <fileTxt>
    <fileName>safeguards.dta</fileName>
    <fileCont>This file contains data from Questionnaire Section A: Safeguard rights in data flows and the (re)use of data The following section focuses on legal requirements that protect fundamental rights in personal/mixed/sensitive data and commercial rights in non-personal data. Issues covered include data protection, cybersecurity/cybercrime, cross-border data flows and intermediary liability.</fileCont>
    <dimensns>
      <caseQnty>80</caseQnty>
      <varQnty>60</varQnty>
    </dimensns>
    <dataChck></dataChck>
    <dataMsng></dataMsng>
    <verStmt>
      <version></version>
    </verStmt>
  </fileTxt>
  <notes></notes>
</fileDscr>
<dataDscr>
<var ID="V141" name="ccode" files="F1" intrvl="discrete">
  <labl>Country code</labl>
  <imputation>Country code</imputation>
  <security>Country code</security>
  <embargo>Country code</embargo>
  <respUnit>Country code</respUnit>
  <sumStat type="vald"/>
  <sumStat type="invd">81</sumStat>
  <sumStat type="max">*</sumStat>
  <catgry>
    <catValu>Sysmiss</catValu>
    <catStat type="vald"/>
  </catgry>
  <varFormat type="numeric"/>
</var>
<var ID="V142" name="cname" files="F1" intrvl="contin">
  <labl>Country name</labl>
  <imputation>Country name</imputation>
  <security>Country name</security>
  <embargo>Country name</embargo>
  <respUnit>Country name</respUnit>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <varFormat type="character"/>
</var>
<var ID="V143" name="region" files="F1" intrvl="discrete">
  <labl>Region name</labl>
  <imputation>Region name</imputation>
  <security>Region name</security>
  <embargo>Region name</embargo>
  <respUnit>Region name</respUnit>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>East Asia &amp; Pacific</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Europe &amp; Central Asia</catValu>
  </catgry>
  <catgry>
    <catValu>Latin America &amp; Caribbean</catValu>
  </catgry>
  <catgry>
    <catValu>Middle East &amp; North Africa</catValu>
  </catgry>
  <catgry>
    <catValu>North America</catValu>
  </catgry>
  <catgry>
    <catValu>South Asia</catValu>
  </catgry>
  <catgry>
    <catValu>Sub-Saharan Africa</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V144" name="wb_incgrp" files="F1" intrvl="discrete">
  <labl>WB Income group</labl>
  <imputation>WB Income group</imputation>
  <security>WB Income group</security>
  <embargo>WB Income group</embargo>
  <respUnit>WB Income group</respUnit>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>High income</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Low income</catValu>
  </catgry>
  <catgry>
    <catValu>Lower middle income</catValu>
  </catgry>
  <catgry>
    <catValu>Upper middle income</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V145" name="sbq32" files="F1" intrvl="discrete">
  <labl>1. E-Commerce:Legal basis for e-commerce/transactions</labl>
  <imputation>1. E-Commerce:Legal basis for e-commerce/transactions</imputation>
  <security>1. E-Commerce:Legal basis for e-commerce/transactions</security>
  <embargo>1. E-Commerce:Legal basis for e-commerce/transactions</embargo>
  <respUnit>1. E-Commerce:Legal basis for e-commerce/transactions</respUnit>
  <qstn>
    <qstnLit>32. Legal basis for e-commerce/transactions Is there a law or regulation that explicitly governs e-commerce/e-transactions?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V146" name="sbq33" files="F1" intrvl="discrete">
  <labl>2. E-Commerce:Legal(functional)equivalence</labl>
  <imputation>2. E-Commerce:Legal(functional)equivalence</imputation>
  <security>2. E-Commerce:Legal(functional)equivalence</security>
  <embargo>2. E-Commerce:Legal(functional)equivalence</embargo>
  <respUnit>2. E-Commerce:Legal(functional)equivalence</respUnit>
  <qstn>
    <qstnLit>33. Legal (functional) equivalence Does any law include provisions that grant legal (functional) equivalence between paper-based and electronic communications, contracts, signatures and records?</qstnLit>
    <postQTxt>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.):</postQTxt>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V147" name="sbq33a" files="F1" intrvl="discrete">
  <labl>E-Commerce:Electronic communications/ messages</labl>
  <imputation>E-Commerce:Electronic communications/ messages</imputation>
  <security>E-Commerce:Electronic communications/ messages</security>
  <embargo>E-Commerce:Electronic communications/ messages</embargo>
  <respUnit>E-Commerce:Electronic communications/ messages</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.):
- Electronic communications/ messages</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V148" name="sbq33b" files="F1" intrvl="discrete">
  <labl>E-Commerce:Electronic contracts</labl>
  <imputation>E-Commerce:Electronic contracts</imputation>
  <security>E-Commerce:Electronic contracts</security>
  <embargo>E-Commerce:Electronic contracts</embargo>
  <respUnit>E-Commerce:Electronic contracts</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.):
- Electronic contracts</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V149" name="sbq33c" files="F1" intrvl="discrete">
  <labl>E-Commerce:Electronic signatures</labl>
  <imputation>E-Commerce:Electronic signatures</imputation>
  <security>E-Commerce:Electronic signatures</security>
  <embargo>E-Commerce:Electronic signatures</embargo>
  <respUnit>E-Commerce:Electronic signatures</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.):
- Electronic signatures</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V150" name="sbq33d" files="F1" intrvl="discrete">
  <labl>E-Commerce:E-evidence</labl>
  <imputation>E-Commerce:E-evidence</imputation>
  <security>E-Commerce:E-evidence</security>
  <embargo>E-Commerce:E-evidence</embargo>
  <respUnit>E-Commerce:E-evidence</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.):
- E-evidence</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V151" name="sbq34_1" files="F1" intrvl="discrete">
  <labl>3.1.E-Commerce:E-signatures legally recognized in your country - All leg sign.</labl>
  <imputation>3.1.E-Commerce:E-signatures legally recognized in your country - All leg sign.</imputation>
  <security>3.1.E-Commerce:E-signatures legally recognized in your country - All leg sign.</security>
  <embargo>3.1.E-Commerce:E-signatures legally recognized in your country - All leg sign.</embargo>
  <respUnit>3.1.E-Commerce:E-signatures legally recognized in your country - All leg sign.</respUnit>
  <qstn>
    <qstnLit>34. E-Signature 
What types of electronic signatures are legally recognized in your country?
- All legal signatures</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V152" name="sbq34_2" files="F1" intrvl="discrete">
  <labl>3.2.E-Commerce:E-signatures legally recognized in your country - Only dig. sign.</labl>
  <imputation>3.2.E-Commerce:E-signatures legally recognized in your country - Only dig. sign.</imputation>
  <security>3.2.E-Commerce:E-signatures legally recognized in your country - Only dig. sign.</security>
  <embargo>3.2.E-Commerce:E-signatures legally recognized in your country - Only dig. sign.</embargo>
  <respUnit>3.2.E-Commerce:E-signatures legally recognized in your country - Only dig. sign.</respUnit>
  <qstn>
    <qstnLit>34. E-Signature 
What types of electronic signatures are legally recognized in your country?
- Only digital signatures (e.g. PKI)</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V153" name="sbq37" files="F1" intrvl="discrete">
  <labl>4.E-Commerce:Technological neutrality</labl>
  <imputation>4.E-Commerce:Technological neutrality</imputation>
  <security>4.E-Commerce:Technological neutrality</security>
  <embargo>4.E-Commerce:Technological neutrality</embargo>
  <respUnit>4.E-Commerce:Technological neutrality</respUnit>
  <qstn>
    <qstnLit>37. Technological neutrality 
Does the law or regulations prescribe a specific form or condition for any of the following:
-</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V154" name="sbq37a" files="F1" intrvl="discrete">
  <labl>E-Commerce:Electronic communications/ messages</labl>
  <imputation>E-Commerce:Electronic communications/ messages</imputation>
  <security>E-Commerce:Electronic communications/ messages</security>
  <embargo>E-Commerce:Electronic communications/ messages</embargo>
  <respUnit>E-Commerce:Electronic communications/ messages</respUnit>
  <qstn>
    <qstnLit>37. Technological neutrality 
Does the law or regulations prescribe a specific form or condition for any of the following:
- Electronic communications/ messages</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V155" name="sbq37b" files="F1" intrvl="discrete">
  <labl>E-Commerce:Electronic contracts</labl>
  <imputation>E-Commerce:Electronic contracts</imputation>
  <security>E-Commerce:Electronic contracts</security>
  <embargo>E-Commerce:Electronic contracts</embargo>
  <respUnit>E-Commerce:Electronic contracts</respUnit>
  <qstn>
    <qstnLit>37. Technological neutrality 
Does the law or regulations prescribe a specific form or condition for any of the following:
- Electronic contracts</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V156" name="sbq37c" files="F1" intrvl="discrete">
  <labl>E-Commerce:Electronic signatures</labl>
  <imputation>E-Commerce:Electronic signatures</imputation>
  <security>E-Commerce:Electronic signatures</security>
  <embargo>E-Commerce:Electronic signatures</embargo>
  <respUnit>E-Commerce:Electronic signatures</respUnit>
  <qstn>
    <qstnLit>37. Technological neutrality 
Does the law or regulations prescribe a specific form or condition for any of the following:
- Electronic signatures</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V157" name="sbq43" files="F1" intrvl="discrete">
  <labl>5.E-Commerce:Digital ID system for online service access</labl>
  <imputation>5.E-Commerce:Digital ID system for online service access</imputation>
  <security>5.E-Commerce:Digital ID system for online service access</security>
  <embargo>5.E-Commerce:Digital ID system for online service access</embargo>
  <respUnit>5.E-Commerce:Digital ID system for online service access</respUnit>
  <qstn>
    <qstnLit>43. Digital ID system for online service access 
Is there a digital ID system that enables individuals to authenticate themselves online to access governmental services? (E.g., e-tax filing, online benefits application)</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V158" name="sbq39c" files="F1" intrvl="discrete">
  <labl>6.Public Intent Data:Governmental/official entities mandated to use common tech.</labl>
  <imputation>6.Public Intent Data:Governmental/official entities mandated to use common tech.</imputation>
  <security>6.Public Intent Data:Governmental/official entities mandated to use common tech.</security>
  <embargo>6.Public Intent Data:Governmental/official entities mandated to use common tech.</embargo>
  <respUnit>6.Public Intent Data:Governmental/official entities mandated to use common tech.</respUnit>
  <qstn>
    <qstnLit>39. Use, reuse, and sharing of public sector data
Are governmental/official entities mandated to use common technical standards (e.g. “FAIR”)4 that enable interoperability of systems, registries, data bases?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V159" name="sbq39c1" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Established standards for open APIs for G2G/G2B/G2C services</labl>
  <imputation>Public Intent Data:Established standards for open APIs for G2G/G2B/G2C services</imputation>
  <security>Public Intent Data:Established standards for open APIs for G2G/G2B/G2C services</security>
  <embargo>Public Intent Data:Established standards for open APIs for G2G/G2B/G2C services</embargo>
  <respUnit>Public Intent Data:Established standards for open APIs for G2G/G2B/G2C services</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.): 
- Established standards for open APIs for G2G/G2B/G2C services</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V160" name="sbq39c2" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Mandated 'ask once' principle</labl>
  <imputation>Public Intent Data:Mandated 'ask once' principle</imputation>
  <security>Public Intent Data:Mandated 'ask once' principle</security>
  <embargo>Public Intent Data:Mandated 'ask once' principle</embargo>
  <respUnit>Public Intent Data:Mandated 'ask once' principle</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.): 
- Mandated “ask once” principle</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V161" name="sbq39c3" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Standardized communications protocol for accessing metadata</labl>
  <imputation>Public Intent Data:Standardized communications protocol for accessing metadata</imputation>
  <security>Public Intent Data:Standardized communications protocol for accessing metadata</security>
  <embargo>Public Intent Data:Standardized communications protocol for accessing metadata</embargo>
  <respUnit>Public Intent Data:Standardized communications protocol for accessing metadata</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.): 
- Standardized communications protocol for accessing metadata</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V162" name="sbq39c4" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Semantic catalogues for data and metadata</labl>
  <imputation>Public Intent Data:Semantic catalogues for data and metadata</imputation>
  <security>Public Intent Data:Semantic catalogues for data and metadata</security>
  <embargo>Public Intent Data:Semantic catalogues for data and metadata</embargo>
  <respUnit>Public Intent Data:Semantic catalogues for data and metadata</respUnit>
  <qstn>
    <qstnLit>If yes, please mark below as appropriate and specify the relevant legal basis (law/regulation, article etc.): 
- Semantic catalogues for data and metadata</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V163" name="sbq46a" files="F1" intrvl="discrete">
  <labl>7.1.Public Intent Data:Open Data Act applicable across the entire public sector</labl>
  <imputation>7.1.Public Intent Data:Open Data Act applicable across the entire public sector</imputation>
  <security>7.1.Public Intent Data:Open Data Act applicable across the entire public sector</security>
  <embargo>7.1.Public Intent Data:Open Data Act applicable across the entire public sector</embargo>
  <respUnit>7.1.Public Intent Data:Open Data Act applicable across the entire public sector</respUnit>
  <qstn>
    <qstnLit>46. Open data 
Is there an Open Data Act or open data policy applicable across the entire public sector?
- Yes, an Open Data Act</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V164" name="sbq46b" files="F1" intrvl="discrete">
  <labl>7.2.Public Intent Data:Open data policy applicable across the entire public sect</labl>
  <imputation>7.2.Public Intent Data:Open data policy applicable across the entire public sect</imputation>
  <security>7.2.Public Intent Data:Open data policy applicable across the entire public sect</security>
  <embargo>7.2.Public Intent Data:Open data policy applicable across the entire public sect</embargo>
  <respUnit>7.2.Public Intent Data:Open data policy applicable across the entire public sect</respUnit>
  <qstn>
    <qstnLit>46. Open data 
Is there an Open Data Act or open data policy applicable across the entire public sector?
- Yes, an Open Data policy</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V165" name="sbq46c" files="F1" intrvl="discrete">
  <labl>7.3.Public Intent Data:No applicable Open Data Act or Policy</labl>
  <imputation>7.3.Public Intent Data:No applicable Open Data Act or Policy</imputation>
  <security>7.3.Public Intent Data:No applicable Open Data Act or Policy</security>
  <embargo>7.3.Public Intent Data:No applicable Open Data Act or Policy</embargo>
  <respUnit>7.3.Public Intent Data:No applicable Open Data Act or Policy</respUnit>
  <qstn>
    <qstnLit>46. Open data 
Is there an Open Data Act or open data policy applicable across the entire public sector?
- No</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V166" name="sbq47a" files="F1" intrvl="discrete">
  <labl>8.Public Intent Data:Is there a government data classification policy/directive?</labl>
  <imputation>8.Public Intent Data:Is there a government data classification policy/directive?</imputation>
  <security>8.Public Intent Data:Is there a government data classification policy/directive?</security>
  <embargo>8.Public Intent Data:Is there a government data classification policy/directive?</embargo>
  <respUnit>8.Public Intent Data:Is there a government data classification policy/directive?</respUnit>
  <qstn>
    <qstnLit>47. Data classification 
Is there a government data classification policy/directive?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V167" name="sbq47d" files="F1" intrvl="discrete">
  <labl>9.Public Intent Data:Mandatory to use the common data classification categories.</labl>
  <imputation>9.Public Intent Data:Mandatory to use the common data classification categories.</imputation>
  <security>9.Public Intent Data:Mandatory to use the common data classification categories.</security>
  <embargo>9.Public Intent Data:Mandatory to use the common data classification categories.</embargo>
  <respUnit>9.Public Intent Data:Mandatory to use the common data classification categories.</respUnit>
  <qstn>
    <qstnLit>47. Data classification 
Is it mandatory to use the common data classification categories across all government database applications or document management systems?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V168" name="sbq45a" files="F1" intrvl="discrete">
  <labl>10.Public Intent Data:Right to Information/Access to Information (ATI) legisl..</labl>
  <imputation>10.Public Intent Data:Right to Information/Access to Information (ATI) legisl..</imputation>
  <security>10.Public Intent Data:Right to Information/Access to Information (ATI) legisl..</security>
  <embargo>10.Public Intent Data:Right to Information/Access to Information (ATI) legisl..</embargo>
  <respUnit>10.Public Intent Data:Right to Information/Access to Information (ATI) legisl..</respUnit>
  <qstn>
    <qstnLit>45. Access to Information 
Has Right to Information/Access to Information (ATI) legislation been passed that grants individuals the right to request access to government records or data?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V169" name="sbq45b0" files="F1" intrvl="discrete">
  <labl>11.Does the law provide for limitations or exceptions...</labl>
  <imputation>11.Does the law provide for limitations or exceptions...</imputation>
  <security>11.Does the law provide for limitations or exceptions...</security>
  <embargo>11.Does the law provide for limitations or exceptions...</embargo>
  <respUnit>11.Does the law provide for limitations or exceptions...</respUnit>
  <qstn>
    <qstnLit>Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V170" name="sbq45b1" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Sensitive information on national security, defense, or forei</labl>
  <imputation>Public Intent Data:Sensitive information on national security, defense, or forei</imputation>
  <security>Public Intent Data:Sensitive information on national security, defense, or forei</security>
  <embargo>Public Intent Data:Sensitive information on national security, defense, or forei</embargo>
  <respUnit>Public Intent Data:Sensitive information on national security, defense, or forei</respUnit>
  <qstn>
    <qstnLit>Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply
- Sensitive information on national security, defense, or foreign policy grounds</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V171" name="sbq45b2" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Trade secrets or other commercial interests</labl>
  <imputation>Public Intent Data:Trade secrets or other commercial interests</imputation>
  <security>Public Intent Data:Trade secrets or other commercial interests</security>
  <embargo>Public Intent Data:Trade secrets or other commercial interests</embargo>
  <respUnit>Public Intent Data:Trade secrets or other commercial interests</respUnit>
  <qstn>
    <qstnLit>Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply
- Trade secrets or other commercial interests</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V172" name="sbq45b3" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Personal data</labl>
  <imputation>Public Intent Data:Personal data</imputation>
  <security>Public Intent Data:Personal data</security>
  <embargo>Public Intent Data:Personal data</embargo>
  <respUnit>Public Intent Data:Personal data</respUnit>
  <qstn>
    <qstnLit>Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply
- Personal data</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V173" name="sbq45b4" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Law enforcement</labl>
  <imputation>Public Intent Data:Law enforcement</imputation>
  <security>Public Intent Data:Law enforcement</security>
  <embargo>Public Intent Data:Law enforcement</embargo>
  <respUnit>Public Intent Data:Law enforcement</respUnit>
  <qstn>
    <qstnLit>Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply
- Law enforcement</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V174" name="sbq45b5" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Privileged information</labl>
  <imputation>Public Intent Data:Privileged information</imputation>
  <security>Public Intent Data:Privileged information</security>
  <embargo>Public Intent Data:Privileged information</embargo>
  <respUnit>Public Intent Data:Privileged information</respUnit>
  <qstn>
    <qstnLit>Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply
- Privileged information</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V175" name="sbq45b6" files="F1" intrvl="discrete">
  <labl>Public Intent Data:Public investigations and audits</labl>
  <imputation>Public Intent Data:Public investigations and audits</imputation>
  <security>Public Intent Data:Public investigations and audits</security>
  <embargo>Public Intent Data:Public investigations and audits</embargo>
  <respUnit>Public Intent Data:Public investigations and audits</respUnit>
  <qstn>
    <qstnLit>Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply
- Public investigations and audits</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>yes</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V176" name="sbq49" files="F1" intrvl="discrete">
  <labl>12.Public Intent Data:Government adopted an open licensing regime</labl>
  <imputation>12.Public Intent Data:Government adopted an open licensing regime</imputation>
  <security>12.Public Intent Data:Government adopted an open licensing regime</security>
  <embargo>12.Public Intent Data:Government adopted an open licensing regime</embargo>
  <respUnit>12.Public Intent Data:Government adopted an open licensing regime</respUnit>
  <qstn>
    <qstnLit>49. Sharing-friendly license 
Has the government adopted an open licensing regime (such as a Creative Common license by Attribution)?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V177" name="sbq38a" files="F1" intrvl="discrete">
  <labl>13.Private Intent Data:Individual right to request their personal data transfer.</labl>
  <imputation>13.Private Intent Data:Individual right to request their personal data transfer.</imputation>
  <security>13.Private Intent Data:Individual right to request their personal data transfer.</security>
  <embargo>13.Private Intent Data:Individual right to request their personal data transfer.</embargo>
  <respUnit>13.Private Intent Data:Individual right to request their personal data transfer.</respUnit>
  <qstn>
    <qstnLit>38. Data portability 
Do individuals have the right to request that a controller transfer their personal data to another service or product provider?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V178" name="sbq38b" files="F1" intrvl="discrete">
  <labl>14.Private Intent Data:Individual right to obtain data in structured machine-rea</labl>
  <imputation>14.Private Intent Data:Individual right to obtain data in structured machine-rea</imputation>
  <security>14.Private Intent Data:Individual right to obtain data in structured machine-rea</security>
  <embargo>14.Private Intent Data:Individual right to obtain data in structured machine-rea</embargo>
  <respUnit>14.Private Intent Data:Individual right to obtain data in structured machine-rea</respUnit>
  <qstn>
    <qstnLit>38. Data portability
Do individuals have the right to obtain their data processed by a controller in a structured, commonly used and machine-readable format?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V179" name="sbq42b" files="F1" intrvl="discrete">
  <labl>15.Private Intent Data:Private sector service providers digitally verify or auth</labl>
  <imputation>15.Private Intent Data:Private sector service providers digitally verify or auth</imputation>
  <security>15.Private Intent Data:Private sector service providers digitally verify or auth</security>
  <embargo>15.Private Intent Data:Private sector service providers digitally verify or auth</embargo>
  <respUnit>15.Private Intent Data:Private sector service providers digitally verify or auth</respUnit>
  <qstn>
    <qstnLit>42. ID data verification
Can private sector service providers digitally verify or authenticate the identity of a person against data stored in the ID system?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V180" name="sbq53" files="F1" intrvl="discrete">
  <labl>16.Private Intent Data:Can Standard-setting organizations mandate patent/IPR...</labl>
  <imputation>16.Private Intent Data:Can Standard-setting organizations mandate patent/IPR...</imputation>
  <security>16.Private Intent Data:Can Standard-setting organizations mandate patent/IPR...</security>
  <embargo>16.Private Intent Data:Can Standard-setting organizations mandate patent/IPR...</embargo>
  <respUnit>16.Private Intent Data:Can Standard-setting organizations mandate patent/IPR...</respUnit>
  <qstn>
    <qstnLit>53. Voluntary licensing of Intellectual Property Rights (IPRs) for private sector 
Can standard-setting organizations mandate patent/IPR holders to provide voluntary licensing access to “standard essential” data or applications on FRAND (fair, reasonable and non-discriminatory) terms?</qstnLit>
  </qstn>
  <sumStat type="vald">81</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V181" name="ccode" files="F2" intrvl="discrete">
  <labl>Country code</labl>
  <imputation>Country code</imputation>
  <security>Country code</security>
  <embargo>Country code</embargo>
  <respUnit>Country code</respUnit>
  <sumStat type="vald"/>
  <sumStat type="invd">80</sumStat>
  <sumStat type="max">*</sumStat>
  <catgry>
    <catValu>Sysmiss</catValu>
    <catStat type="vald"/>
  </catgry>
  <varFormat type="numeric"/>
</var>
<var ID="V182" name="cname" files="F2" intrvl="contin">
  <labl>Country name</labl>
  <imputation>Country name</imputation>
  <security>Country name</security>
  <embargo>Country name</embargo>
  <respUnit>Country name</respUnit>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <varFormat type="character"/>
</var>
<var ID="V183" name="region" files="F2" intrvl="discrete">
  <labl>Region name</labl>
  <imputation>Region name</imputation>
  <security>Region name</security>
  <embargo>Region name</embargo>
  <respUnit>Region name</respUnit>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>East Asia &amp; Pacific</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Europe &amp; Central Asia</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Latin America &amp; Caribbean</catValu>
  </catgry>
  <catgry>
    <catValu>Middle East &amp; North Africa</catValu>
  </catgry>
  <catgry>
    <catValu>North America</catValu>
  </catgry>
  <catgry>
    <catValu>South Asia</catValu>
  </catgry>
  <catgry>
    <catValu>Sub-Saharan Africa</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V184" name="wb_incgrp" files="F2" intrvl="discrete">
  <labl>WB Income group</labl>
  <imputation>WB Income group</imputation>
  <security>WB Income group</security>
  <embargo>WB Income group</embargo>
  <respUnit>WB Income group</respUnit>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>High income</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Low income</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Lower middle income</catValu>
  </catgry>
  <catgry>
    <catValu>Upper middle income</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V185" name="saq1a" files="F2" intrvl="discrete">
  <labl>1.1.Personal Data:Legal basis for data protection</labl>
  <imputation>1.1.Personal Data:Legal basis for data protection</imputation>
  <security>1.1.Personal Data:Legal basis for data protection</security>
  <embargo>1.1.Personal Data:Legal basis for data protection</embargo>
  <respUnit>1.1.Personal Data:Legal basis for data protection</respUnit>
  <qstn>
    <qstnLit>1. Legal basis for data protection 
Is there a data protection/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (“personal data”)?
- Yes, there is a data protection law of general application governing personal data, PII and sensitive data; please specify</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V186" name="saq1b" files="F2" intrvl="discrete">
  <labl>1.2.Personal Data:Only sector-specific personal data protection and/or priv.laws</labl>
  <imputation>1.2.Personal Data:Only sector-specific personal data protection and/or priv.laws</imputation>
  <security>1.2.Personal Data:Only sector-specific personal data protection and/or priv.laws</security>
  <embargo>1.2.Personal Data:Only sector-specific personal data protection and/or priv.laws</embargo>
  <respUnit>1.2.Personal Data:Only sector-specific personal data protection and/or priv.laws</respUnit>
  <qstn>
    <qstnLit>1. Legal basis for data protection 
Is there a data protection/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (“personal data”)?
- No, there are only sector-specific personal data protection and/or privacy laws; please specify</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V187" name="saq1c" files="F2" intrvl="discrete">
  <labl>1.3.Personal Data:Privacy and/or data prot. rights protected in constitution..</labl>
  <imputation>1.3.Personal Data:Privacy and/or data prot. rights protected in constitution..</imputation>
  <security>1.3.Personal Data:Privacy and/or data prot. rights protected in constitution..</security>
  <embargo>1.3.Personal Data:Privacy and/or data prot. rights protected in constitution..</embargo>
  <respUnit>1.3.Personal Data:Privacy and/or data prot. rights protected in constitution..</respUnit>
  <qstn>
    <qstnLit>1. Legal basis for data protection 
Is there a data protection/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (“personal data”)?
- No, there are privacy and/or data protection rights protected in the country's constitution</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V188" name="saq1d" files="F2" intrvl="discrete">
  <labl>1.4.Personal Data:No laws exist but significant court or admin. decisions...</labl>
  <imputation>1.4.Personal Data:No laws exist but significant court or admin. decisions...</imputation>
  <security>1.4.Personal Data:No laws exist but significant court or admin. decisions...</security>
  <embargo>1.4.Personal Data:No laws exist but significant court or admin. decisions...</embargo>
  <respUnit>1.4.Personal Data:No laws exist but significant court or admin. decisions...</respUnit>
  <qstn>
    <qstnLit>1. Legal basis for data protection 
Is there a data protection/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (“personal data”)?
- No, no laws exist but there have been significant court or administrative decisions that form the basis of or clarify privacy or data protection rights</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>NO</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V189" name="saq3a" files="F2" intrvl="discrete">
  <labl>2.Personal Data:Exceptions to limitations on the coll. or processing of data</labl>
  <imputation>2.Personal Data:Exceptions to limitations on the coll. or processing of data</imputation>
  <security>2.Personal Data:Exceptions to limitations on the coll. or processing of data</security>
  <embargo>2.Personal Data:Exceptions to limitations on the coll. or processing of data</embargo>
  <respUnit>2.Personal Data:Exceptions to limitations on the coll. or processing of data</respUnit>
  <qstn>
    <qstnLit>3. Exceptions to limitations on data collection, processing and transfer 
Does the relevant law/regulation provide exceptions to limitations on the collection or processing of data by government?</qstnLit>
    <postQTxt>(If No, please skip to question 4)</postQTxt>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V190" name="saq3b" files="F2" intrvl="discrete">
  <labl>3.Personal Data:Exceptions subject to a 'necessary and proportionate' test</labl>
  <imputation>3.Personal Data:Exceptions subject to a 'necessary and proportionate' test</imputation>
  <security>3.Personal Data:Exceptions subject to a 'necessary and proportionate' test</security>
  <embargo>3.Personal Data:Exceptions subject to a 'necessary and proportionate' test</embargo>
  <respUnit>3.Personal Data:Exceptions subject to a 'necessary and proportionate' test</respUnit>
  <qstn>
    <qstnLit>3. Exceptions to limitations on data collection, processing and transfer 
Are these exceptions subject to a “necessary and proportionate” test to determine whether the exception is legitimately applied?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V191" name="saq5a" files="F2" intrvl="discrete">
  <labl>4.Personal Data:Law/regulation require that coll. and use of pers. data be made.</labl>
  <imputation>4.Personal Data:Law/regulation require that coll. and use of pers. data be made.</imputation>
  <security>4.Personal Data:Law/regulation require that coll. and use of pers. data be made.</security>
  <embargo>4.Personal Data:Law/regulation require that coll. and use of pers. data be made.</embargo>
  <respUnit>4.Personal Data:Law/regulation require that coll. and use of pers. data be made.</respUnit>
  <qstn>
    <qstnLit>5. Purpose limitation, proportionality, data minimization 
Does any law or regulation require that the collection and use of personal data be made for a stated purpose (or similar standard)?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V192" name="saq5b" files="F2" intrvl="discrete">
  <labl>5.Personal Data:Law/regulation require that coll. and use of pers. data be pro..</labl>
  <imputation>5.Personal Data:Law/regulation require that coll. and use of pers. data be pro..</imputation>
  <security>5.Personal Data:Law/regulation require that coll. and use of pers. data be pro..</security>
  <embargo>5.Personal Data:Law/regulation require that coll. and use of pers. data be pro..</embargo>
  <respUnit>5.Personal Data:Law/regulation require that coll. and use of pers. data be pro..</respUnit>
  <qstn>
    <qstnLit>5. Purpose limitation, proportionality, data minimization 
Does any law or regulation require that the collection and use of personal data be proportionate, relevant, adequate and limited to what is necessary in relation to the purpose for which it is processed (or similar standard)?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V193" name="saq9" files="F2" intrvl="discrete">
  <labl>6.Personal Data:Storage limitation</labl>
  <imputation>6.Personal Data:Storage limitation</imputation>
  <security>6.Personal Data:Storage limitation</security>
  <embargo>6.Personal Data:Storage limitation</embargo>
  <respUnit>6.Personal Data:Storage limitation</respUnit>
  <qstn>
    <qstnLit>9. Storage limitations 
Does any law or regulation require that personal data not be kept longer than is necessary for the purposes for which it is processed (or similar standard)?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V194" name="saq10a" files="F2" intrvl="discrete">
  <labl>7.Personal Data:Privacy by design</labl>
  <imputation>7.Personal Data:Privacy by design</imputation>
  <security>7.Personal Data:Privacy by design</security>
  <embargo>7.Personal Data:Privacy by design</embargo>
  <respUnit>7.Personal Data:Privacy by design</respUnit>
  <qstn>
    <qstnLit>10. Privacy by design 
Does any policy, law or regulation require data processors to incorporate technical and organizational privacy-by-design or privacy-by-default principles or use privacy-enhancing technologies (PETs) in the design and implementation of processing systems?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V195" name="saq11a" files="F2" intrvl="discrete">
  <labl>8.Personal Data:Limitations on data sharing</labl>
  <imputation>8.Personal Data:Limitations on data sharing</imputation>
  <security>8.Personal Data:Limitations on data sharing</security>
  <embargo>8.Personal Data:Limitations on data sharing</embargo>
  <respUnit>8.Personal Data:Limitations on data sharing</respUnit>
  <qstn>
    <qstnLit>11. Limitations on data sharing 
Do any laws, regulations or policies authorize, restrict or otherwise address sharing of personal data with third parties?</qstnLit>
    <postQTxt>If yes, does such law, regulation or policy require that the individual be notified of or give consent to such transfer?
Please specify the relevant legal basis (law/regulation, article etc.):</postQTxt>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V196" name="saq17" files="F2" intrvl="discrete">
  <labl>9.Personal Data:Right to challenge the accuracy and to rectification of personal</labl>
  <imputation>9.Personal Data:Right to challenge the accuracy and to rectification of personal</imputation>
  <security>9.Personal Data:Right to challenge the accuracy and to rectification of personal</security>
  <embargo>9.Personal Data:Right to challenge the accuracy and to rectification of personal</embargo>
  <respUnit>9.Personal Data:Right to challenge the accuracy and to rectification of personal</respUnit>
  <qstn>
    <qstnLit>17. Right to challenge accuracy and to rectification of personal data 
Do individuals have the right to challenge the accuracy of information and have it rectified, completed, amended and/or deleted?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V197" name="saq20" files="F2" intrvl="discrete">
  <labl>10.Personal Data:Automated decisions</labl>
  <imputation>10.Personal Data:Automated decisions</imputation>
  <security>10.Personal Data:Automated decisions</security>
  <embargo>10.Personal Data:Automated decisions</embargo>
  <respUnit>10.Personal Data:Automated decisions</respUnit>
  <qstn>
    <qstnLit>20. Automated decisions 
Are there rights to limit the making of decisions about individuals solely as a result of automated processing of personal data (i.e. without any human intervention)?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V198" name="saq21a" files="F2" intrvl="discrete">
  <labl>11.Personal Data:Redress</labl>
  <imputation>11.Personal Data:Redress</imputation>
  <security>11.Personal Data:Redress</security>
  <embargo>11.Personal Data:Redress</embargo>
  <respUnit>11.Personal Data:Redress</respUnit>
  <qstn>
    <qstnLit>21. Redress 
Do individuals have a right to object to the use of personal data about them, file complaints and seek redress?</qstnLit>
    <postQTxt>No (If No, please skip to question 22)</postQTxt>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V199" name="saq22a" files="F2" intrvl="discrete">
  <labl>12.Personal Data:Institutional arrangements to enforce personal data protection</labl>
  <imputation>12.Personal Data:Institutional arrangements to enforce personal data protection</imputation>
  <security>12.Personal Data:Institutional arrangements to enforce personal data protection</security>
  <embargo>12.Personal Data:Institutional arrangements to enforce personal data protection</embargo>
  <respUnit>12.Personal Data:Institutional arrangements to enforce personal data protection</respUnit>
  <qstn>
    <qstnLit>22. Institutional arrangements to enforce personal data protection 
Does the law/regulation provide for the creation of a data protection authority/office (DPA/DPO)?</qstnLit>
    <postQTxt>(If No, please skip to question 23)</postQTxt>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V200" name="saq23" files="F2" intrvl="discrete">
  <labl>13.Non-Personal Data:Intellectual property rights prevent data sharing?</labl>
  <imputation>13.Non-Personal Data:Intellectual property rights prevent data sharing?</imputation>
  <security>13.Non-Personal Data:Intellectual property rights prevent data sharing?</security>
  <embargo>13.Non-Personal Data:Intellectual property rights prevent data sharing?</embargo>
  <respUnit>13.Non-Personal Data:Intellectual property rights prevent data sharing?</respUnit>
  <qstn>
    <qstnLit>Safeguards specific to non-personal data 
23. Intellectual Property Rights 
Can intellectual property rights be used to prevent the sharing of data?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V201" name="sbq48d" files="F2" intrvl="discrete">
  <labl>14.Non-Personal Data:Does the law include a provision regulating confidentiality</labl>
  <imputation>14.Non-Personal Data:Does the law include a provision regulating confidentiality</imputation>
  <security>14.Non-Personal Data:Does the law include a provision regulating confidentiality</security>
  <embargo>14.Non-Personal Data:Does the law include a provision regulating confidentiality</embargo>
  <respUnit>14.Non-Personal Data:Does the law include a provision regulating confidentiality</respUnit>
  <qstn>
    <qstnLit>Restrictions on use/reuse of public sector data 
48. Intellectual Property Rights (IPRs) and licensing of public sector data
Does the law include a provision regulating confidentiality or third-party rights in non-personal government data (e.g. company registers, business data underlying official statistics)?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V202" name="saq25" files="F2" intrvl="discrete">
  <labl>15.Cybersecurity and Cybercrime:Data security - compliance with:</labl>
  <imputation>15.Cybersecurity and Cybercrime:Data security - compliance with:</imputation>
  <security>15.Cybersecurity and Cybercrime:Data security - compliance with:</security>
  <embargo>15.Cybersecurity and Cybercrime:Data security - compliance with:</embargo>
  <respUnit>15.Cybersecurity and Cybercrime:Data security - compliance with:</respUnit>
  <qstn>
    <qstnLit>Cybersecurity and cybercrime 
25. Data security
Do data processors/controllers have to comply with the following security requirements for the automated processing of personal data? Please check all that apply:</qstnLit>
  </qstn>
  <sumStat type="vald"/>
  <sumStat type="invd">80</sumStat>
  <sumStat type="max">*</sumStat>
  <catgry>
    <catValu>Sysmiss</catValu>
    <catStat type="vald"/>
  </catgry>
  <varFormat type="numeric"/>
</var>
<var ID="V203" name="saq25a" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Encryption of personal data</labl>
  <imputation>Cybersecurity and Cybercrime:Encryption of personal data</imputation>
  <security>Cybersecurity and Cybercrime:Encryption of personal data</security>
  <embargo>Cybersecurity and Cybercrime:Encryption of personal data</embargo>
  <respUnit>Cybersecurity and Cybercrime:Encryption of personal data</respUnit>
  <qstn>
    <qstnLit>Cybersecurity and cybercrime 
25. Data security
If yes, please mark as appropriate below and provide the relevant legal basis (law/regulation, article etc.): 
- Encryption of personal data</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V204" name="saq25b" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Anonymization/ pseudonymization of personal data</labl>
  <imputation>Cybersecurity and Cybercrime:Anonymization/ pseudonymization of personal data</imputation>
  <security>Cybersecurity and Cybercrime:Anonymization/ pseudonymization of personal data</security>
  <embargo>Cybersecurity and Cybercrime:Anonymization/ pseudonymization of personal data</embargo>
  <respUnit>Cybersecurity and Cybercrime:Anonymization/ pseudonymization of personal data</respUnit>
  <qstn>
    <qstnLit>Cybersecurity and cybercrime 
25. Data security
If yes, please mark as appropriate below and provide the relevant legal basis (law/regulation, article etc.): 
- Anonymization/ pseudonymization of personal data</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V205" name="saq25c" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Integrity of data and systems that use or generate</labl>
  <imputation>Cybersecurity and Cybercrime:Integrity of data and systems that use or generate</imputation>
  <security>Cybersecurity and Cybercrime:Integrity of data and systems that use or generate</security>
  <embargo>Cybersecurity and Cybercrime:Integrity of data and systems that use or generate</embargo>
  <respUnit>Cybersecurity and Cybercrime:Integrity of data and systems that use or generate</respUnit>
  <qstn>
    <qstnLit>Cybersecurity and cybercrime 
25. Data security
If yes, please mark as appropriate below and provide the relevant legal basis (law/regulation, article etc.): 
- Integrity of data and systems that use or generate personal data</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V206" name="saq25d" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Ability to restore data and sys. that use or genera</labl>
  <imputation>Cybersecurity and Cybercrime:Ability to restore data and sys. that use or genera</imputation>
  <security>Cybersecurity and Cybercrime:Ability to restore data and sys. that use or genera</security>
  <embargo>Cybersecurity and Cybercrime:Ability to restore data and sys. that use or genera</embargo>
  <respUnit>Cybersecurity and Cybercrime:Ability to restore data and sys. that use or genera</respUnit>
  <qstn>
    <qstnLit>Cybersecurity and cybercrime 
25. Data security
If yes, please mark as appropriate below and provide the relevant legal basis (law/regulation, article etc.): 
- Ability to restore data and systems that use or generate personal data after a physical or technical incident</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V207" name="saq25e" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Ongoing tests, assessments and eval. of security...</labl>
  <imputation>Cybersecurity and Cybercrime:Ongoing tests, assessments and eval. of security...</imputation>
  <security>Cybersecurity and Cybercrime:Ongoing tests, assessments and eval. of security...</security>
  <embargo>Cybersecurity and Cybercrime:Ongoing tests, assessments and eval. of security...</embargo>
  <respUnit>Cybersecurity and Cybercrime:Ongoing tests, assessments and eval. of security...</respUnit>
  <qstn>
    <qstnLit>Cybersecurity and cybercrime 
25. Data security
If yes, please mark as appropriate below and provide the relevant legal basis (law/regulation, article etc.): 
- Ongoing tests, assessments and evaluation of security of systems that use or generate personal data</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V208" name="saq26" files="F2" intrvl="discrete">
  <labl>16.Cybersecurity and Cybercrime:Internal adoption of cybersecurity standards</labl>
  <imputation>16.Cybersecurity and Cybercrime:Internal adoption of cybersecurity standards</imputation>
  <security>16.Cybersecurity and Cybercrime:Internal adoption of cybersecurity standards</security>
  <embargo>16.Cybersecurity and Cybercrime:Internal adoption of cybersecurity standards</embargo>
  <respUnit>16.Cybersecurity and Cybercrime:Internal adoption of cybersecurity standards</respUnit>
  <qstn>
    <qstnLit>26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:</qstnLit>
  </qstn>
  <sumStat type="vald"/>
  <sumStat type="invd">80</sumStat>
  <sumStat type="max">*</sumStat>
  <catgry>
    <catValu>Sysmiss</catValu>
    <catStat type="vald"/>
  </catgry>
  <varFormat type="numeric"/>
</var>
<var ID="V209" name="saq26a" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Adoption of internal policy establishing procedures</labl>
  <imputation>Cybersecurity and Cybercrime:Adoption of internal policy establishing procedures</imputation>
  <security>Cybersecurity and Cybercrime:Adoption of internal policy establishing procedures</security>
  <embargo>Cybersecurity and Cybercrime:Adoption of internal policy establishing procedures</embargo>
  <respUnit>Cybersecurity and Cybercrime:Adoption of internal policy establishing procedures</respUnit>
  <qstn>
    <qstnLit>26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:
- Adoption of an internal policy establishing procedures for preventing and detecting violations 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V210" name="saq26b" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Confidentiality of data and systems that use or ...</labl>
  <imputation>Cybersecurity and Cybercrime:Confidentiality of data and systems that use or ...</imputation>
  <security>Cybersecurity and Cybercrime:Confidentiality of data and systems that use or ...</security>
  <embargo>Cybersecurity and Cybercrime:Confidentiality of data and systems that use or ...</embargo>
  <respUnit>Cybersecurity and Cybercrime:Confidentiality of data and systems that use or ...</respUnit>
  <qstn>
    <qstnLit>26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:
- Confidentiality of data and systems that use or generate personal data 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V211" name="saq26c" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Appointment of a personal data processing office...</labl>
  <imputation>Cybersecurity and Cybercrime:Appointment of a personal data processing office...</imputation>
  <security>Cybersecurity and Cybercrime:Appointment of a personal data processing office...</security>
  <embargo>Cybersecurity and Cybercrime:Appointment of a personal data processing office...</embargo>
  <respUnit>Cybersecurity and Cybercrime:Appointment of a personal data processing office...</respUnit>
  <qstn>
    <qstnLit>26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:
- Appointment of a personal data processing office/manager 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V212" name="saq26d" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Performance of internal controls</labl>
  <imputation>Cybersecurity and Cybercrime:Performance of internal controls</imputation>
  <security>Cybersecurity and Cybercrime:Performance of internal controls</security>
  <embargo>Cybersecurity and Cybercrime:Performance of internal controls</embargo>
  <respUnit>Cybersecurity and Cybercrime:Performance of internal controls</respUnit>
  <qstn>
    <qstnLit>26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:
- Performance of internal controls 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V213" name="saq26e" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Assessment of harm that might be caused by data br.</labl>
  <imputation>Cybersecurity and Cybercrime:Assessment of harm that might be caused by data br.</imputation>
  <security>Cybersecurity and Cybercrime:Assessment of harm that might be caused by data br.</security>
  <embargo>Cybersecurity and Cybercrime:Assessment of harm that might be caused by data br.</embargo>
  <respUnit>Cybersecurity and Cybercrime:Assessment of harm that might be caused by data br.</respUnit>
  <qstn>
    <qstnLit>26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:
- Assessment of the harm that might be caused by a data breach 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V214" name="saq26f" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Awareness program among employees</labl>
  <imputation>Cybersecurity and Cybercrime:Awareness program among employees</imputation>
  <security>Cybersecurity and Cybercrime:Awareness program among employees</security>
  <embargo>Cybersecurity and Cybercrime:Awareness program among employees</embargo>
  <respUnit>Cybersecurity and Cybercrime:Awareness program among employees</respUnit>
  <qstn>
    <qstnLit>26. Internal adoption of cybersecurity standards
Do data processors/controllers have to comply with the following cybersecurity requirements? Please check all that apply:
- Awareness program among employees
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V215" name="saq27" files="F2" intrvl="discrete">
  <labl>17.Cybersecurity and Cybercrime:criminalized activities:</labl>
  <imputation>17.Cybersecurity and Cybercrime:criminalized activities:</imputation>
  <security>17.Cybersecurity and Cybercrime:criminalized activities:</security>
  <embargo>17.Cybersecurity and Cybercrime:criminalized activities:</embargo>
  <respUnit>17.Cybersecurity and Cybercrime:criminalized activities:</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yea</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <catgry>
    <catValu>YEs</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V216" name="saq27a" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Unauthorized access to systems or other databases..</labl>
  <imputation>Cybersecurity and Cybercrime:Unauthorized access to systems or other databases..</imputation>
  <security>Cybersecurity and Cybercrime:Unauthorized access to systems or other databases..</security>
  <embargo>Cybersecurity and Cybercrime:Unauthorized access to systems or other databases..</embargo>
  <respUnit>Cybersecurity and Cybercrime:Unauthorized access to systems or other databases..</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:
- Unauthorized access to systems or other databases holding personal data 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V217" name="saq27b" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Unauthorized interception of data from systems/data</labl>
  <imputation>Cybersecurity and Cybercrime:Unauthorized interception of data from systems/data</imputation>
  <security>Cybersecurity and Cybercrime:Unauthorized interception of data from systems/data</security>
  <embargo>Cybersecurity and Cybercrime:Unauthorized interception of data from systems/data</embargo>
  <respUnit>Cybersecurity and Cybercrime:Unauthorized interception of data from systems/data</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:
- Unauthorized interception of data from systems or other databases holding personal data 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V218" name="saq27c" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Unauthorized damaging deletion, deterioration, alt.</labl>
  <imputation>Cybersecurity and Cybercrime:Unauthorized damaging deletion, deterioration, alt.</imputation>
  <security>Cybersecurity and Cybercrime:Unauthorized damaging deletion, deterioration, alt.</security>
  <embargo>Cybersecurity and Cybercrime:Unauthorized damaging deletion, deterioration, alt.</embargo>
  <respUnit>Cybersecurity and Cybercrime:Unauthorized damaging deletion, deterioration, alt.</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:
- Unauthorized damaging deletion, deterioration, alteration or suppression of data collected or stored as part of databases holding personal data 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V219" name="saq27d" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Unauthorized interference with databases holding...</labl>
  <imputation>Cybersecurity and Cybercrime:Unauthorized interference with databases holding...</imputation>
  <security>Cybersecurity and Cybercrime:Unauthorized interference with databases holding...</security>
  <embargo>Cybersecurity and Cybercrime:Unauthorized interference with databases holding...</embargo>
  <respUnit>Cybersecurity and Cybercrime:Unauthorized interference with databases holding...</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:
- Unauthorized interference with databases holding personal data 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V220" name="saq27e" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Misuse of devices or data for purpose of comm...</labl>
  <imputation>Cybersecurity and Cybercrime:Misuse of devices or data for purpose of comm...</imputation>
  <security>Cybersecurity and Cybercrime:Misuse of devices or data for purpose of comm...</security>
  <embargo>Cybersecurity and Cybercrime:Misuse of devices or data for purpose of comm...</embargo>
  <respUnit>Cybersecurity and Cybercrime:Misuse of devices or data for purpose of comm...</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:
- Misuse of devices or data for the purpose of committing any of the above criminal behavior 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V221" name="saq27f" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Unauthorized input,alteration,deletion/interference</labl>
  <imputation>Cybersecurity and Cybercrime:Unauthorized input,alteration,deletion/interference</imputation>
  <security>Cybersecurity and Cybercrime:Unauthorized input,alteration,deletion/interference</security>
  <embargo>Cybersecurity and Cybercrime:Unauthorized input,alteration,deletion/interference</embargo>
  <respUnit>Cybersecurity and Cybercrime:Unauthorized input,alteration,deletion/interference</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:
- Unauthorized input, alteration, deletion or interference with a computer system or platform to procure an economic benefit which would apply to databases holding personal data
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V222" name="saq27g" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Fraudulent use/alteration of data/interference...</labl>
  <imputation>Cybersecurity and Cybercrime:Fraudulent use/alteration of data/interference...</imputation>
  <security>Cybersecurity and Cybercrime:Fraudulent use/alteration of data/interference...</security>
  <embargo>Cybersecurity and Cybercrime:Fraudulent use/alteration of data/interference...</embargo>
  <respUnit>Cybersecurity and Cybercrime:Fraudulent use/alteration of data/interference...</respUnit>
  <qstn>
    <qstnLit>27. Cybercrime: criminalized activities
Does any law criminalize the following activities? Please check all that are applicable:
- Fraudulent use or alteration of data or interference with a computer system to procure an economic benefit which would apply to databases holding personal data
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V223" name="saq28" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:Cybersecurity infrastructure and enforcement agency</labl>
  <imputation>Cybersecurity and Cybercrime:Cybersecurity infrastructure and enforcement agency</imputation>
  <security>Cybersecurity and Cybercrime:Cybersecurity infrastructure and enforcement agency</security>
  <embargo>Cybersecurity and Cybercrime:Cybersecurity infrastructure and enforcement agency</embargo>
  <respUnit>Cybersecurity and Cybercrime:Cybersecurity infrastructure and enforcement agency</respUnit>
  <qstn>
    <qstnLit>28. Cybersecurity infrastructure and enforcement agency (CERT)
Does any law, regulation or policy provide for the creation of a cyber-security strategy, infrastructure and institutions to identify, investigate, and address cyber-security threats?</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>No</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
    <catStat type="invd"/>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V224" name="saq28a" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:A cyber-security plan to protect key national infr.</labl>
  <imputation>Cybersecurity and Cybercrime:A cyber-security plan to protect key national infr.</imputation>
  <security>Cybersecurity and Cybercrime:A cyber-security plan to protect key national infr.</security>
  <embargo>Cybersecurity and Cybercrime:A cyber-security plan to protect key national infr.</embargo>
  <respUnit>Cybersecurity and Cybercrime:A cyber-security plan to protect key national infr.</respUnit>
  <qstn>
    <qstnLit>28. Cybersecurity infrastructure and enforcement agency (CERT)
Does any law, regulation or policy provide for the creation of a cyber-security strategy, infrastructure and institutions to identify, investigate, and address cyber-security threats?
If yes, please mark as appropriate and specify the relevant legal basis (law/regulation, article etc.): 
- A cyber-security plan to protect key national infrastructure</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V225" name="saq28b" files="F2" intrvl="discrete">
  <labl>Cybersecurity and Cybercrime:A national CERT</labl>
  <imputation>Cybersecurity and Cybercrime:A national CERT</imputation>
  <security>Cybersecurity and Cybercrime:A national CERT</security>
  <embargo>Cybersecurity and Cybercrime:A national CERT</embargo>
  <respUnit>Cybersecurity and Cybercrime:A national CERT</respUnit>
  <qstn>
    <qstnLit>28. Cybersecurity infrastructure and enforcement agency (CERT)
Does any law, regulation or policy provide for the creation of a cyber-security strategy, infrastructure and institutions to identify, investigate, and address cyber-security threats?
If yes, please mark as appropriate and specify the relevant legal basis (law/regulation, article etc.): 
- A national CERT</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V226" name="saq30a1" files="F2" intrvl="discrete">
  <labl>19.1.Cross-Border Data Flow: Adequacy approach</labl>
  <imputation>19.1.Cross-Border Data Flow: Adequacy approach</imputation>
  <security>19.1.Cross-Border Data Flow: Adequacy approach</security>
  <embargo>19.1.Cross-Border Data Flow: Adequacy approach</embargo>
  <respUnit>19.1.Cross-Border Data Flow: Adequacy approach</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
Under what conditions can local personal data be transferred to non-domestic third parties?
- Adequacy approach 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V227" name="saq30a2" files="F2" intrvl="discrete">
  <labl>19.2.Cross-Border Data Flow: Accountability approach</labl>
  <imputation>19.2.Cross-Border Data Flow: Accountability approach</imputation>
  <security>19.2.Cross-Border Data Flow: Accountability approach</security>
  <embargo>19.2.Cross-Border Data Flow: Accountability approach</embargo>
  <respUnit>19.2.Cross-Border Data Flow: Accountability approach</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
Under what conditions can local personal data be transferred to non-domestic third parties?
- Accountability approach
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V228" name="saq30b" files="F2" intrvl="discrete">
  <labl>20.Cross-Border Data Flow:Arrangements with foreign countries or multinational..</labl>
  <imputation>20.Cross-Border Data Flow:Arrangements with foreign countries or multinational..</imputation>
  <security>20.Cross-Border Data Flow:Arrangements with foreign countries or multinational..</security>
  <embargo>20.Cross-Border Data Flow:Arrangements with foreign countries or multinational..</embargo>
  <respUnit>20.Cross-Border Data Flow:Arrangements with foreign countries or multinational..</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
Does the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?
Please check all that apply:</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V229" name="saq30b1" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:Adequacy decisions/ whitelists</labl>
  <imputation>Cross-Border Data Flow:Adequacy decisions/ whitelists</imputation>
  <security>Cross-Border Data Flow:Adequacy decisions/ whitelists</security>
  <embargo>Cross-Border Data Flow:Adequacy decisions/ whitelists</embargo>
  <respUnit>Cross-Border Data Flow:Adequacy decisions/ whitelists</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
Does the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?
Please check all that apply:
- adequacy decisions/ whitelists 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V230" name="saq30b2" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:Binding corporate rules</labl>
  <imputation>Cross-Border Data Flow:Binding corporate rules</imputation>
  <security>Cross-Border Data Flow:Binding corporate rules</security>
  <embargo>Cross-Border Data Flow:Binding corporate rules</embargo>
  <respUnit>Cross-Border Data Flow:Binding corporate rules</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
Does the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?
Please check all that apply:
- binding corporate rules 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V231" name="saq30b3" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:Mutual recognition arrangements</labl>
  <imputation>Cross-Border Data Flow:Mutual recognition arrangements</imputation>
  <security>Cross-Border Data Flow:Mutual recognition arrangements</security>
  <embargo>Cross-Border Data Flow:Mutual recognition arrangements</embargo>
  <respUnit>Cross-Border Data Flow:Mutual recognition arrangements</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
Does the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?
Please check all that apply:
- mutual recognition arrangements required information sharing through the Advance Passenger Information 
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V232" name="saq30b4" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:Treaties</labl>
  <imputation>Cross-Border Data Flow:Treaties</imputation>
  <security>Cross-Border Data Flow:Treaties</security>
  <embargo>Cross-Border Data Flow:Treaties</embargo>
  <respUnit>Cross-Border Data Flow:Treaties</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
Does the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?
Please check all that apply:
- System treaties
Please specify the relevant legal basis (law/regulation, article etc.):</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V233" name="saq30c" files="F2" intrvl="discrete">
  <labl>21.Cross-Border Data Flow:Circumstances constituting 'adequate level of protect.</labl>
  <imputation>21.Cross-Border Data Flow:Circumstances constituting 'adequate level of protect.</imputation>
  <security>21.Cross-Border Data Flow:Circumstances constituting 'adequate level of protect.</security>
  <embargo>21.Cross-Border Data Flow:Circumstances constituting 'adequate level of protect.</embargo>
  <respUnit>21.Cross-Border Data Flow:Circumstances constituting 'adequate level of protect.</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V234" name="saq30c1" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:The nature of the personal data</labl>
  <imputation>Cross-Border Data Flow:The nature of the personal data</imputation>
  <security>Cross-Border Data Flow:The nature of the personal data</security>
  <embargo>Cross-Border Data Flow:The nature of the personal data</embargo>
  <respUnit>Cross-Border Data Flow:The nature of the personal data</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:
- The nature of the personal data</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V235" name="saq30c4" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:The purposes and period data are intended to be proc...</labl>
  <imputation>Cross-Border Data Flow:The purposes and period data are intended to be proc...</imputation>
  <security>Cross-Border Data Flow:The purposes and period data are intended to be proc...</security>
  <embargo>Cross-Border Data Flow:The purposes and period data are intended to be proc...</embargo>
  <respUnit>Cross-Border Data Flow:The purposes and period data are intended to be proc...</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:
- The purposes for which and period during which the data are intended to be processed</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V236" name="saq30c5" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:The domestic law in force in the host country...</labl>
  <imputation>Cross-Border Data Flow:The domestic law in force in the host country...</imputation>
  <security>Cross-Border Data Flow:The domestic law in force in the host country...</security>
  <embargo>Cross-Border Data Flow:The domestic law in force in the host country...</embargo>
  <respUnit>Cross-Border Data Flow:The domestic law in force in the host country...</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:
- The domestic law in force in the host country (general and sectoral, including defense and access of public authorities to personal data)</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V237" name="saq30c6" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:The existence and effective functioning...</labl>
  <imputation>Cross-Border Data Flow:The existence and effective functioning...</imputation>
  <security>Cross-Border Data Flow:The existence and effective functioning...</security>
  <embargo>Cross-Border Data Flow:The existence and effective functioning...</embargo>
  <respUnit>Cross-Border Data Flow:The existence and effective functioning...</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:
- The existence and effective functioning of one or more independent supervisory authorities in the third country to enforce compliance</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V238" name="saq30c7" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:Presence of effective rule of law and judicial redress...</labl>
  <imputation>Cross-Border Data Flow:Presence of effective rule of law and judicial redress...</imputation>
  <security>Cross-Border Data Flow:Presence of effective rule of law and judicial redress...</security>
  <embargo>Cross-Border Data Flow:Presence of effective rule of law and judicial redress...</embargo>
  <respUnit>Cross-Border Data Flow:Presence of effective rule of law and judicial redress...</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:
- Presence of effective rule of law and judicial redress for data subjects</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V239" name="saq30c8" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:The international treaties the host country is a party to</labl>
  <imputation>Cross-Border Data Flow:The international treaties the host country is a party to</imputation>
  <security>Cross-Border Data Flow:The international treaties the host country is a party to</security>
  <embargo>Cross-Border Data Flow:The international treaties the host country is a party to</embargo>
  <respUnit>Cross-Border Data Flow:The international treaties the host country is a party to</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:
- The international treaties the host country is a party to</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
<var ID="V240" name="saq30c9" files="F2" intrvl="discrete">
  <labl>Cross-Border Data Flow:Relevant codes of conduct/rules enforceable in host ctry.</labl>
  <imputation>Cross-Border Data Flow:Relevant codes of conduct/rules enforceable in host ctry.</imputation>
  <security>Cross-Border Data Flow:Relevant codes of conduct/rules enforceable in host ctry.</security>
  <embargo>Cross-Border Data Flow:Relevant codes of conduct/rules enforceable in host ctry.</embargo>
  <respUnit>Cross-Border Data Flow:Relevant codes of conduct/rules enforceable in host ctry.</respUnit>
  <qstn>
    <qstnLit>30. Adequacy and mutual recognition arrangements
If the regime requires an “adequacy” or similar mechanism, what circumstances constitute an “adequate level of protection” when transferring personal data internationally?
Please check all that apply:
- Relevant codes of conduct or other rules enforceable in the host country (SCCs; BCRs)</qstnLit>
  </qstn>
  <sumStat type="vald">80</sumStat>
  <sumStat type="invd"/>
  <catgry>
    <catValu>N/A</catValu>
    <catStat type="vald"/>
  </catgry>
  <catgry>
    <catValu>No</catValu>
    <catStat type="invd"/>
  </catgry>
  <catgry>
    <catValu>Yes</catValu>
  </catgry>
  <varFormat type="character"/>
</var>
</dataDscr></codeBook>
