{"type":"survey","doc_desc":{"idno":"DDI_WLD_2020_GDRD_v01_M_M_WB","producers":[{"name":"Development Data Group","abbreviation":"DECDG","affiliation":"World Bank","role":"Documentation of the Study"}],"prod_date":"2021-03-16","version_statement":{"version":"V01"}},"study_desc":{"title_statement":{"idno":"WLD_2020_GDRD_v01_M","title":"Global Data Regulation Diagnostic Survey Dataset 2021","alt_title":"GDRD 2021"},"authoring_entity":[{"name":"World Bank","affiliation":""}],"production_statement":{"producers":[{"name":"Cheng Rong","affiliation":"World Bank Group ","role":"Primary Investigator"},{"name":"David Satola","affiliation":"World Bank Group ","role":"Questionnaire Designer "},{"name":"Adele  Barzelay","affiliation":"World Bank Group ","role":"Questionnaire Designer "}],"copyright":"(c) 2021, World Bank","funding_agencies":[{"name":"United States Agency for International Development","abbreviation":"USAID ","role":""},{"name":"World Development Report 2021","abbreviation":"WDR 2021","role":""}]},"distribution_statement":{"contact":[{"name":"Rong Chen","affiliation":"World Bank Group ","email":"rchen5@worldbank.org","uri":""}],"depositor":[{"name":"WDR 2021 Team","abbreviation":"WDR21","affiliation":"World Bank"}]},"series_statement":{"series_name":"Administrative Records, Other (ad\/oth]"},"version_statement":{"version":"- v2.1:  Edited, anonymous dataset for public distribution.","version_date":"2021-03-21"},"study_info":{"abstract":"The Global Data Regulation Diagnostic provides a comprehensive assessment of the quality of the data governance environment. Diagnostic results show that countries have put in greater effort in adopting enabler regulatory practices than in safeguard regulatory practices. However, for public intent data, enablers for private intent data, safeguards for personal and nonpersonal data, cybersecurity and cybercrime, as well as cross-border data flows. Across all these dimensions, no income group demonstrates advanced regulatory frameworks across all dimensions, indicating significant room for the regulatory development of both enablers and safeguards remains at an intermediate stage: 47 percent of enabler good practices and 41 percent of good safeguard practices are adopted across countries. Under the enabler and safeguard pillars, the diagnostic covers dimensions of e-commerce\/e-transactions, enablers further improvement on data governance environment.\n\nThe Global Data Regulation Diagnostic is the first comprehensive assessment of laws and regulations on data governance. It covers enabler and safeguard regulatory practices in 80 countries providing indicators to assess and compare their performance. This Global Data Regulation Diagnostic develops objective and standardized indicators to measure the regulatory environment for the data economy across countries. The indicators aim to serve as a diagnostic tool so countries can assess and compare their performance vis-\u00e1-vis other countries. Understanding the gap with global regulatory good practices is a necessary first step for governments when identifying and prioritizing reforms.","coll_dates":[{"start":"2020\/03\/1","end":"2020\/06\/1","cycle":""}],"nation":[{"name":"Afghanistan","abbreviation":"AFG"},{"name":"Angola","abbreviation":"AGO"},{"name":"Argentina","abbreviation":"ARG"},{"name":"Armenia","abbreviation":"ARM"},{"name":"Australia","abbreviation":"AUS"},{"name":"Bangladesh","abbreviation":"BGD"},{"name":"Benin","abbreviation":"BEN"},{"name":"Bolivia","abbreviation":"BOL"},{"name":"Brazil","abbreviation":"BRA"},{"name":"Burkina Faso","abbreviation":"BFA"},{"name":"Cambodia","abbreviation":"KHM"},{"name":"Cameroon","abbreviation":"CMR"},{"name":"Canada","abbreviation":"CAN"},{"name":"Chile","abbreviation":"CHL"},{"name":"China","abbreviation":"CHN"},{"name":"Colombia","abbreviation":"COL"},{"name":"Congo, Dem. Rep.","abbreviation":"COD"},{"name":"C\u00f4te d'Ivoire","abbreviation":"CIV"},{"name":"Dominican Republic","abbreviation":"DOM"},{"name":"Egypt, Arab Rep.","abbreviation":"EGY"},{"name":"Estonia","abbreviation":"EST"},{"name":"Ethiopia","abbreviation":"ETH"},{"name":"Gabon","abbreviation":"GAB"},{"name":"Gambia","abbreviation":"GMB"},{"name":"Georgia","abbreviation":"GEO"},{"name":"Ghana","abbreviation":"GHA"},{"name":"Haiti","abbreviation":"HTI"},{"name":"Honduras","abbreviation":"HND"},{"name":"India","abbreviation":"IND"},{"name":"Indonesia","abbreviation":"IDN"},{"name":"Iran, Islamic Rep.","abbreviation":"IRN"},{"name":"Iraq","abbreviation":"IRQ"},{"name":"Israel","abbreviation":"ISR"},{"name":"Jordan","abbreviation":"JOR"},{"name":"Kazakhstan","abbreviation":"KAZ"},{"name":"Kenya","abbreviation":"KEN"},{"name":"Korea, Rep.","abbreviation":"KOR"},{"name":"Kyrgyz Republic","abbreviation":"KGZ"},{"name":"Lao PDR","abbreviation":"LAO"},{"name":"Lebanon","abbreviation":"LBN"},{"name":"Liberia","abbreviation":"LBR"},{"name":"Madagascar","abbreviation":"MDG"},{"name":"Malawi","abbreviation":"MWI"},{"name":"Malaysia","abbreviation":"MYS"},{"name":"Mali","abbreviation":"MLI"},{"name":"Mauritius","abbreviation":"MUS"},{"name":"Mexico","abbreviation":"MEX"},{"name":"Moldova","abbreviation":"MDV"},{"name":"Morocco","abbreviation":"MAR"},{"name":"Myanmar","abbreviation":"MMR"},{"name":"Nepal","abbreviation":"NPL"},{"name":"Nicaragua","abbreviation":"NIC"},{"name":"Nigeria","abbreviation":"NGA"},{"name":"Oman","abbreviation":"OMN"},{"name":"Pakistan","abbreviation":"PAK"},{"name":"Papua New Guinea","abbreviation":"PNG"},{"name":"Peru","abbreviation":"PER"},{"name":"Philippines","abbreviation":"PHL"},{"name":"Qatar","abbreviation":"QAT"},{"name":"Russian Federation","abbreviation":"RUS"},{"name":"Rwanda","abbreviation":"RWA"},{"name":"Saudi Arabia","abbreviation":"SAU"},{"name":"Senegal","abbreviation":"SEN"},{"name":"Sierra Leone","abbreviation":"SLE"},{"name":"Singapore","abbreviation":"SGP"},{"name":"South Africa","abbreviation":"ZAF"},{"name":"Sri Lanka","abbreviation":"LKA"},{"name":"Tajikistan","abbreviation":"TJK"},{"name":"Tanzania","abbreviation":"TZA"},{"name":"Thailand","abbreviation":"THA"},{"name":"Togo","abbreviation":"TGO"},{"name":"Tunisia","abbreviation":"TUN"},{"name":"Turkiye","abbreviation":"TUR"},{"name":"Uganda","abbreviation":"UGA"},{"name":"Ukraine","abbreviation":"UKR"},{"name":"United Arab Emirates","abbreviation":"ARE"},{"name":"United Kingdom","abbreviation":"GBR"},{"name":"Uruguay","abbreviation":"URY"},{"name":"Uzbekistan","abbreviation":"UZB"},{"name":"Vietnam","abbreviation":"VNM"}],"geog_coverage":"80 countries","analysis_unit":"Country","data_kind":"Observation data\/ratings [obs]","notes":"The scope of the study includes:\n\nA. Safeguard rights in data flows and the (re)use of data\n\n1. Legal basis for data protection\n\nPersonal data protection\/privacy\n2. Lawfulness\n3. Exceptions to limitations on data collection, processing and transfer\n4. Consent\n5. Purpose limitation, proportionality, data minimization\n6. Data quality\n7. Accountability\n8. Sensitive personal data\n9. Storage limitations\n10. Privacy by design\n11. Limitations on data sharing\n\nIntermediary liability\n12. Definition of liability\n13. Scope of liability\n14. Due process\n\nIndividual rights\n15. Right to be notified of a data breach\n16. Right to access and review use of personal data\n17. Right to challenge accuracy and to rectification of personal data\n18. Right to withdraw consent to data processing\n19. Right to deletion of personal data (\u201cright to be forgotten\u201d)\n20. Automated decisions\n21. Redress\n22. Institutional arrangements to enforce personal data protection\n\nSafeguards specific to non-personal data\n23. Intellectual Property Rights\n24. Net Neutrality\n\nCybersecurity and cybercrime\n25. Data security\n26. Internal adoption of cybersecurity standards\n27. Cybercrime: criminalized activities\n28. Cybersecurity infrastructure and enforcement agency (CERT)\n\nCross-border data flows\n29. Data localization\/local processing\n30. Adequacy and mutual recognition arrangements\n31. Regional integration and harmonization\n\nB. Enable data transactions\/flows and the (re)use of data\n\n32. Legal basis for e-commerce\/transactions\n33. Legal (functional) equivalence\n34. E-Signature\n35. Exceptions to e-signature\n36. Certification authority (CA) for digital signatures\n37. Technological neutrality\n38. Data portability\n39. Use, reuse, and sharing of public sector data\n40. Primary ID system\n41. ID credential\n42. ID data verification\n43. Digital ID system for online service access\n44. Interoperability of data\n45. Access to Information\n46. Open data\n47. Data classification\n\nRestrictions on use\/reuse of public sector data\n48. Intellectual Property Rights (IPRs) and licensing of public sector data\n49. Sharing-friendly license\n50. Data archiving and Digital preservation\n\nUse, reuse and sharing of private sector data\n51. Data sharing regimes for private sector data\n52. Role\/mandate of antitrust authorities\n53. Voluntary licensing of Intellectual Property Rights (IPRs) for private sector\n54. Data-related codes of conduct"},"method":{"data_collection":{"data_collectors":[{"name":"Aliaksandra Tyhrytskaya","abbreviation":"","affiliation":"World Bank Group "},{"name":"Federico Cardenas Chacon","abbreviation":"","affiliation":"World Bank Group"},{"name":"Lillyana Sophia Daza Jaller","abbreviation":"","affiliation":"World Bank Group"},{"name":"New Doe Kaledzi","abbreviation":"","affiliation":"World Bank Group"},{"name":"Nicolas Conserva","abbreviation":"","affiliation":"World Bank Group"},{"name":"Paris Gkartzonikasm","abbreviation":"","affiliation":"World Bank Group"}],"sampling_procedure":"The diagnostic is based on a detailed assessment of domestic laws, regulations, and administrative requirements in 80 countries selected to ensure a balanced coverage across income groups, regions, and different levels of digital technology development. Data are further verified through a detailed desk research of legal texts, reflecting the regulatory status of each country as of June 1, 2020.","coll_mode":"Mail Questionnaire [mail]","research_instrument":"The questionnaire comprises 37 questions designed to determine if a country has adopted good regulatory practice on data governance. The responses are then scored and assigned a normative interpretation. Related questions fall into seven clusters so that when the scores are averaged, each cluster provides an overall sense of how it performs in its corresponding regulatory and legal dimensions. These seven dimensions are: (1) E-commerce\/e-transaction; (2) Enablers for public intent data; (3) Enablers for private intent data; (4) Safeguards for personal data; (5) Safeguards for nonpersonal data;  (6) Cybersecurity and cybercrime; (7) Cross-border data transfers.","coll_situation":"Standard questionnaires are used to collect the data and are completed mainly by lawyers specializing in data governance and information and communication technology (ICT) providing a detailed desk review of legal texts as of June 1, 2020.","weight":"Unweighted"},"analysis_info":{"response_rate":"100%"}},"data_access":{"dataset_use":{"conf_dec":[{"txt":"","required":"yes","form_no":"","uri":""}],"contact":[{"name":"Cheng Rong","affiliation":"World Bank","email":"rchen5@worldbank.org","uri":""},{"name":"Microdata Library","affiliation":"World Bank","email":"","uri":"microdata.worldbank.org"}],"cit_req":"Use of the dataset must be acknowledged using a citation which would include:\n- the Identification of the Primary Investigator\n- the title of the survey (including country, acronym and year of implementation)\n- the survey reference number\n- the source and date of download\n\nExample:\n\nWorld Bank. World-Global Data Regulation Diagnostic (GDRD) Survey Dataset 2021. Ref: WLD_2020_GDRD_v01_M. Downloaded from [url] on [date]","disclaimer":"The user of the data acknowledges that the original collector of the data, the authorized distributor of the data, and the relevant funding agency bear no responsibility for use of the data or for interpretations or inferences based upon such uses."}}},"schematype":"survey","data_files":[{"file_id":"F1","file_name":"enablers.dta","description":"This file contains data from Questionnaire Section B: Enable data transactions\/flows and the (re)use of data \nThe section focuses on legal requirements related to e-signature, data portability, interoperability, digital ID system, open data and other mechanisms to enable and promote the use, reuse and sharing of public and private sector data.","case_count":"81","var_count":"40","producer":null,"data_checks":null,"missing_data":null,"version":null,"notes":null,"metadata":null},{"file_id":"F2","file_name":"safeguards.dta","description":"This file contains data from Questionnaire Section A: Safeguard rights in data flows and the (re)use of data The following section focuses on legal requirements that protect fundamental rights in personal\/mixed\/sensitive data and commercial rights in non-personal data. Issues covered include data protection, cybersecurity\/cybercrime, cross-border data flows and intermediary liability.","case_count":"80","var_count":"60","producer":null,"data_checks":null,"missing_data":null,"version":null,"notes":null,"metadata":null}],"variables":[{"file_id":"F1","vid":"V141","name":"ccode","var_intrvl":"discrete","var_dcml":"0","var_wgt":null,"var_is_wgt":null,"loc_start_pos":"1","loc_end_pos":"1","loc_width":"1","loc_rec_seg_no":null,"labl":"Country code","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":null,"type":"vald","wgtd":null},{"value":"81","type":"invd","wgtd":null},{"value":"*","type":"max","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"Sysmiss","labl":null,"is_missing":"Y","stats":[{"value":"81","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"numeric","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":"*"},"fid":"F1"},{"file_id":"F1","vid":"V142","name":"cname","var_intrvl":"contin","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"2","loc_end_pos":"21","loc_width":"20","loc_rec_seg_no":null,"labl":"Country name","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V143","name":"region","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"22","loc_end_pos":"47","loc_width":"26","loc_rec_seg_no":null,"labl":"Region name","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"0","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"East Asia & Pacific","labl":null,"is_missing":null,"stats":[{"value":"13","type":"freq","wgtd":null}]},{"value":"Europe & Central Asia","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"Latin America & Caribbean","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"Middle East & North Africa","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"North America","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"South Asia","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]},{"value":"Sub-Saharan Africa","labl":null,"is_missing":null,"stats":[{"value":"24","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V144","name":"wb_incgrp","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"48","loc_end_pos":"66","loc_width":"19","loc_rec_seg_no":null,"labl":"WB Income group","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"High income","labl":null,"is_missing":null,"stats":[{"value":"14","type":"freq","wgtd":null}]},{"value":"Low income","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]},{"value":"Lower middle income","labl":null,"is_missing":null,"stats":[{"value":"30","type":"freq","wgtd":null}]},{"value":"Upper middle income","labl":null,"is_missing":null,"stats":[{"value":"21","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V145","name":"sbq32","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"67","loc_end_pos":"69","loc_width":"3","loc_rec_seg_no":null,"labl":"1. E-Commerce:Legal basis for e-commerce\/transactions","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"32. Legal basis for e-commerce\/transactions Is there a law or regulation that explicitly governs e-commerce\/e-transactions?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"21","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"59","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V146","name":"sbq33","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"70","loc_end_pos":"72","loc_width":"3","loc_rec_seg_no":null,"labl":"2. E-Commerce:Legal(functional)equivalence","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"33. Legal (functional) equivalence Does any law include provisions that grant legal (functional) equivalence between paper-based and electronic communications, contracts, signatures and records?","var_qstn_postqtxt":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"79","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V147","name":"sbq33a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"73","loc_end_pos":"75","loc_width":"3","loc_rec_seg_no":null,"labl":"E-Commerce:Electronic communications\/ messages","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.):\n- Electronic communications\/ messages","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"72","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V148","name":"sbq33b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"76","loc_end_pos":"78","loc_width":"3","loc_rec_seg_no":null,"labl":"E-Commerce:Electronic contracts","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.):\n- Electronic contracts","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"73","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V149","name":"sbq33c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"79","loc_end_pos":"81","loc_width":"3","loc_rec_seg_no":null,"labl":"E-Commerce:Electronic signatures","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.):\n- Electronic signatures","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"79","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V150","name":"sbq33d","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"82","loc_end_pos":"84","loc_width":"3","loc_rec_seg_no":null,"labl":"E-Commerce:E-evidence","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.):\n- E-evidence","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"20","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"59","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V151","name":"sbq34_1","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"85","loc_end_pos":"87","loc_width":"3","loc_rec_seg_no":null,"labl":"3.1.E-Commerce:E-signatures legally recognized in your country - All leg sign.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"34. E-Signature \nWhat types of electronic signatures are legally recognized in your country?\n- All legal signatures","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"21","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"59","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V152","name":"sbq34_2","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"88","loc_end_pos":"90","loc_width":"3","loc_rec_seg_no":null,"labl":"3.2.E-Commerce:E-signatures legally recognized in your country - Only dig. sign.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"34. E-Signature \nWhat types of electronic signatures are legally recognized in your country?\n- Only digital signatures (e.g. PKI)","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"60","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"20","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V153","name":"sbq37","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"91","loc_end_pos":"93","loc_width":"3","loc_rec_seg_no":null,"labl":"4.E-Commerce:Technological neutrality","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"37. Technological neutrality \nDoes the law or regulations prescribe a specific form or condition for any of the following:\n-","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"55","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"25","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V154","name":"sbq37a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"94","loc_end_pos":"96","loc_width":"3","loc_rec_seg_no":null,"labl":"E-Commerce:Electronic communications\/ messages","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"37. Technological neutrality \nDoes the law or regulations prescribe a specific form or condition for any of the following:\n- Electronic communications\/ messages","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"8","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"66","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V155","name":"sbq37b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"97","loc_end_pos":"99","loc_width":"3","loc_rec_seg_no":null,"labl":"E-Commerce:Electronic contracts","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"37. Technological neutrality \nDoes the law or regulations prescribe a specific form or condition for any of the following:\n- Electronic contracts","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"9","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"65","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V156","name":"sbq37c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"100","loc_end_pos":"102","loc_width":"3","loc_rec_seg_no":null,"labl":"E-Commerce:Electronic signatures","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"37. Technological neutrality \nDoes the law or regulations prescribe a specific form or condition for any of the following:\n- Electronic signatures","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"9","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"46","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"25","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V157","name":"sbq43","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"103","loc_end_pos":"105","loc_width":"3","loc_rec_seg_no":null,"labl":"5.E-Commerce:Digital ID system for online service access","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"43. Digital ID system for online service access \nIs there a digital ID system that enables individuals to authenticate themselves online to access governmental services? (E.g., e-tax filing, online benefits application)","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"42","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"38","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V158","name":"sbq39c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"106","loc_end_pos":"108","loc_width":"3","loc_rec_seg_no":null,"labl":"6.Public Intent Data:Governmental\/official entities mandated to use common tech.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"39. Use, reuse, and sharing of public sector data\nAre governmental\/official entities mandated to use common technical standards (e.g. \u201cFAIR\u201d)4 that enable interoperability of systems, registries, data bases?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"48","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"31","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V159","name":"sbq39c1","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"109","loc_end_pos":"111","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Established standards for open APIs for G2G\/G2B\/G2C services","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.): \n- Established standards for open APIs for G2G\/G2B\/G2C services","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"50","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"23","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V160","name":"sbq39c2","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"112","loc_end_pos":"114","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Mandated 'ask once' principle","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.): \n- Mandated \u201cask once\u201d principle","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"49","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"17","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"14","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V161","name":"sbq39c3","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"115","loc_end_pos":"117","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Standardized communications protocol for accessing metadata","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.): \n- Standardized communications protocol for accessing metadata","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"49","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"5","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"26","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V162","name":"sbq39c4","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"118","loc_end_pos":"120","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Semantic catalogues for data and metadata","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"If yes, please mark below as appropriate and specify the relevant legal basis (law\/regulation, article etc.): \n- Semantic catalogues for data and metadata","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"2","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"48","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"25","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V163","name":"sbq46a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"121","loc_end_pos":"123","loc_width":"3","loc_rec_seg_no":null,"labl":"7.1.Public Intent Data:Open Data Act applicable across the entire public sector","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"46. Open data \nIs there an Open Data Act or open data policy applicable across the entire public sector?\n- Yes, an Open Data Act","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"53","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"27","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V164","name":"sbq46b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"124","loc_end_pos":"126","loc_width":"3","loc_rec_seg_no":null,"labl":"7.2.Public Intent Data:Open data policy applicable across the entire public sect","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"46. Open data \nIs there an Open Data Act or open data policy applicable across the entire public sector?\n- Yes, an Open Data policy","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"37","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"43","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V165","name":"sbq46c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"127","loc_end_pos":"129","loc_width":"3","loc_rec_seg_no":null,"labl":"7.3.Public Intent Data:No applicable Open Data Act or Policy","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"46. Open data \nIs there an Open Data Act or open data policy applicable across the entire public sector?\n- No","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"57","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"23","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V166","name":"sbq47a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"130","loc_end_pos":"132","loc_width":"3","loc_rec_seg_no":null,"labl":"8.Public Intent Data:Is there a government data classification policy\/directive?","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"47. Data classification \nIs there a government data classification policy\/directive?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"37","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"43","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V167","name":"sbq47d","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"133","loc_end_pos":"135","loc_width":"3","loc_rec_seg_no":null,"labl":"9.Public Intent Data:Mandatory to use the common data classification categories.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"47. Data classification \nIs it mandatory to use the common data classification categories across all government database applications or document management systems?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"26","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"29","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"25","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V168","name":"sbq45a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"136","loc_end_pos":"138","loc_width":"3","loc_rec_seg_no":null,"labl":"10.Public Intent Data:Right to Information\/Access to Information (ATI) legisl..","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"45. Access to Information \nHas Right to Information\/Access to Information (ATI) legislation been passed that grants individuals the right to request access to government records or data?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"22","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"58","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V169","name":"sbq45b0","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"139","loc_end_pos":"141","loc_width":"3","loc_rec_seg_no":null,"labl":"11.Does the law provide for limitations or exceptions...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"5","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"22","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"54","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V170","name":"sbq45b1","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"142","loc_end_pos":"144","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Sensitive information on national security, defense, or forei","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply\n- Sensitive information on national security, defense, or foreign policy grounds","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"18","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"5","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"57","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V171","name":"sbq45b2","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"145","loc_end_pos":"147","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Trade secrets or other commercial interests","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply\n- Trade secrets or other commercial interests","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"18","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"55","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V172","name":"sbq45b3","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"148","loc_end_pos":"150","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Personal data","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply\n- Personal data","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"19","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"54","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V173","name":"sbq45b4","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"151","loc_end_pos":"153","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Law enforcement","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply\n- Law enforcement","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"19","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"54","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V174","name":"sbq45b5","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"154","loc_end_pos":"156","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Privileged information","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply\n- Privileged information","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"19","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"55","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V175","name":"sbq45b6","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"157","loc_end_pos":"159","loc_width":"3","loc_rec_seg_no":null,"labl":"Public Intent Data:Public investigations and audits","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Does the law provide for limitations or exceptions to this right of requesting access to government records or data? Please check all that apply\n- Public investigations and audits","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"19","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"14","type":"freq","wgtd":null}]},{"value":"yes","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"46","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V176","name":"sbq49","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"160","loc_end_pos":"162","loc_width":"3","loc_rec_seg_no":null,"labl":"12.Public Intent Data:Government adopted an open licensing regime","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"49. Sharing-friendly license \nHas the government adopted an open licensing regime (such as a Creative Common license by Attribution)?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"42","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"38","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V177","name":"sbq38a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"163","loc_end_pos":"165","loc_width":"3","loc_rec_seg_no":null,"labl":"13.Private Intent Data:Individual right to request their personal data transfer.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"38. Data portability \nDo individuals have the right to request that a controller transfer their personal data to another service or product provider?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"71","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"9","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V178","name":"sbq38b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"166","loc_end_pos":"168","loc_width":"3","loc_rec_seg_no":null,"labl":"14.Private Intent Data:Individual right to obtain data in structured machine-rea","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"38. Data portability\nDo individuals have the right to obtain their data processed by a controller in a structured, commonly used and machine-readable format?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"57","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"23","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V179","name":"sbq42b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"169","loc_end_pos":"171","loc_width":"3","loc_rec_seg_no":null,"labl":"15.Private Intent Data:Private sector service providers digitally verify or auth","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"42. ID data verification\nCan private sector service providers digitally verify or authenticate the identity of a person against data stored in the ID system?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"5","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"43","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"32","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F1","vid":"V180","name":"sbq53","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"172","loc_end_pos":"174","loc_width":"3","loc_rec_seg_no":null,"labl":"16.Private Intent Data:Can Standard-setting organizations mandate patent\/IPR...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"53. Voluntary licensing of Intellectual Property Rights (IPRs) for private sector \nCan standard-setting organizations mandate patent\/IPR holders to provide voluntary licensing access to \u201cstandard essential\u201d data or applications on FRAND (fair, reasonable and non-discriminatory) terms?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"81","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"76","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"4","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F1"},{"file_id":"F2","vid":"V181","name":"ccode","var_intrvl":"discrete","var_dcml":"0","var_wgt":null,"var_is_wgt":null,"loc_start_pos":"1","loc_end_pos":"1","loc_width":"1","loc_rec_seg_no":null,"labl":"Country code","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":null,"type":"vald","wgtd":null},{"value":"80","type":"invd","wgtd":null},{"value":"*","type":"max","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"Sysmiss","labl":null,"is_missing":"Y","stats":[{"value":"80","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"numeric","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":"*"},"fid":"F2"},{"file_id":"F2","vid":"V182","name":"cname","var_intrvl":"contin","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"2","loc_end_pos":"21","loc_width":"20","loc_rec_seg_no":null,"labl":"Country name","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V183","name":"region","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"22","loc_end_pos":"47","loc_width":"26","loc_rec_seg_no":null,"labl":"Region name","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"East Asia & Pacific","labl":null,"is_missing":null,"stats":[{"value":"13","type":"freq","wgtd":null}]},{"value":"Europe & Central Asia","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"Latin America & Caribbean","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"Middle East & North Africa","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"North America","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"South Asia","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]},{"value":"Sub-Saharan Africa","labl":null,"is_missing":null,"stats":[{"value":"24","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V184","name":"wb_incgrp","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"48","loc_end_pos":"66","loc_width":"19","loc_rec_seg_no":null,"labl":"WB Income group","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":null,"var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"High income","labl":null,"is_missing":null,"stats":[{"value":"14","type":"freq","wgtd":null}]},{"value":"Low income","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]},{"value":"Lower middle income","labl":null,"is_missing":null,"stats":[{"value":"30","type":"freq","wgtd":null}]},{"value":"Upper middle income","labl":null,"is_missing":null,"stats":[{"value":"21","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V185","name":"saq1a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"67","loc_end_pos":"69","loc_width":"3","loc_rec_seg_no":null,"labl":"1.1.Personal Data:Legal basis for data protection","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"1. Legal basis for data protection \nIs there a data protection\/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (\u201cpersonal data\u201d)?\n- Yes, there is a data protection law of general application governing personal data, PII and sensitive data; please specify","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"34","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"46","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V186","name":"saq1b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"70","loc_end_pos":"72","loc_width":"3","loc_rec_seg_no":null,"labl":"1.2.Personal Data:Only sector-specific personal data protection and\/or priv.laws","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"1. Legal basis for data protection \nIs there a data protection\/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (\u201cpersonal data\u201d)?\n- No, there are only sector-specific personal data protection and\/or privacy laws; please specify","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"51","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"29","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V187","name":"saq1c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"73","loc_end_pos":"75","loc_width":"3","loc_rec_seg_no":null,"labl":"1.3.Personal Data:Privacy and\/or data prot. rights protected in constitution..","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"1. Legal basis for data protection \nIs there a data protection\/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (\u201cpersonal data\u201d)?\n- No, there are privacy and\/or data protection rights protected in the country's constitution","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"61","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"19","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V188","name":"saq1d","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"76","loc_end_pos":"78","loc_width":"3","loc_rec_seg_no":null,"labl":"1.4.Personal Data:No laws exist but significant court or admin. decisions...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"1. Legal basis for data protection \nIs there a data protection\/privacy law of general application explicitly governing the use, collection, and processing of governing personal data (including sensitive data) and PII (\u201cpersonal data\u201d)?\n- No, no laws exist but there have been significant court or administrative decisions that form the basis of or clarify privacy or data protection rights","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"77","type":"freq","wgtd":null}]},{"value":"NO","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"2","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V189","name":"saq3a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"79","loc_end_pos":"81","loc_width":"3","loc_rec_seg_no":null,"labl":"2.Personal Data:Exceptions to limitations on the coll. or processing of data","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"3. Exceptions to limitations on data collection, processing and transfer \nDoes the relevant law\/regulation provide exceptions to limitations on the collection or processing of data by government?","var_qstn_postqtxt":"(If No, please skip to question 4)","var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"27","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"53","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V190","name":"saq3b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"82","loc_end_pos":"84","loc_width":"3","loc_rec_seg_no":null,"labl":"3.Personal Data:Exceptions subject to a 'necessary and proportionate' test","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"3. Exceptions to limitations on data collection, processing and transfer \nAre these exceptions subject to a \u201cnecessary and proportionate\u201d test to determine whether the exception is legitimately applied?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"66","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"14","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V191","name":"saq5a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"85","loc_end_pos":"87","loc_width":"3","loc_rec_seg_no":null,"labl":"4.Personal Data:Law\/regulation require that coll. and use of pers. data be made.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"5. Purpose limitation, proportionality, data minimization \nDoes any law or regulation require that the collection and use of personal data be made for a stated purpose (or similar standard)?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"16","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"64","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V192","name":"saq5b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"88","loc_end_pos":"90","loc_width":"3","loc_rec_seg_no":null,"labl":"5.Personal Data:Law\/regulation require that coll. and use of pers. data be pro..","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"5. Purpose limitation, proportionality, data minimization \nDoes any law or regulation require that the collection and use of personal data be proportionate, relevant, adequate and limited to what is necessary in relation to the purpose for which it is processed (or similar standard)?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"28","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"52","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V193","name":"saq9","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"91","loc_end_pos":"93","loc_width":"3","loc_rec_seg_no":null,"labl":"6.Personal Data:Storage limitation","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"9. Storage limitations \nDoes any law or regulation require that personal data not be kept longer than is necessary for the purposes for which it is processed (or similar standard)?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"28","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"52","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V194","name":"saq10a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"94","loc_end_pos":"96","loc_width":"3","loc_rec_seg_no":null,"labl":"7.Personal Data:Privacy by design","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"10. Privacy by design \nDoes any policy, law or regulation require data processors to incorporate technical and organizational privacy-by-design or privacy-by-default principles or use privacy-enhancing technologies (PETs) in the design and implementation of processing systems?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"65","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V195","name":"saq11a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"97","loc_end_pos":"99","loc_width":"3","loc_rec_seg_no":null,"labl":"8.Personal Data:Limitations on data sharing","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"11. Limitations on data sharing \nDo any laws, regulations or policies authorize, restrict or otherwise address sharing of personal data with third parties?","var_qstn_postqtxt":"If yes, does such law, regulation or policy require that the individual be notified of or give consent to such transfer?\nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"65","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V196","name":"saq17","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"100","loc_end_pos":"102","loc_width":"3","loc_rec_seg_no":null,"labl":"9.Personal Data:Right to challenge the accuracy and to rectification of personal","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"17. Right to challenge accuracy and to rectification of personal data \nDo individuals have the right to challenge the accuracy of information and have it rectified, completed, amended and\/or deleted?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"21","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"59","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V197","name":"saq20","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"103","loc_end_pos":"105","loc_width":"3","loc_rec_seg_no":null,"labl":"10.Personal Data:Automated decisions","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"20. Automated decisions \nAre there rights to limit the making of decisions about individuals solely as a result of automated processing of personal data (i.e. without any human intervention)?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"53","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"27","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V198","name":"saq21a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"106","loc_end_pos":"108","loc_width":"3","loc_rec_seg_no":null,"labl":"11.Personal Data:Redress","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"21. Redress \nDo individuals have a right to object to the use of personal data about them, file complaints and seek redress?","var_qstn_postqtxt":"No (If No, please skip to question 22)","var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"21","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"59","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V199","name":"saq22a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"109","loc_end_pos":"111","loc_width":"3","loc_rec_seg_no":null,"labl":"12.Personal Data:Institutional arrangements to enforce personal data protection","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"22. Institutional arrangements to enforce personal data protection \nDoes the law\/regulation provide for the creation of a data protection authority\/office (DPA\/DPO)?","var_qstn_postqtxt":"(If No, please skip to question 23)","var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"40","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"40","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V200","name":"saq23","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"112","loc_end_pos":"114","loc_width":"3","loc_rec_seg_no":null,"labl":"13.Non-Personal Data:Intellectual property rights prevent data sharing?","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Safeguards specific to non-personal data \n23. Intellectual Property Rights \nCan intellectual property rights be used to prevent the sharing of data?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"56","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"24","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V201","name":"sbq48d","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"115","loc_end_pos":"117","loc_width":"3","loc_rec_seg_no":null,"labl":"14.Non-Personal Data:Does the law include a provision regulating confidentiality","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Restrictions on use\/reuse of public sector data \n48. Intellectual Property Rights (IPRs) and licensing of public sector data\nDoes the law include a provision regulating confidentiality or third-party rights in non-personal government data (e.g. company registers, business data underlying official statistics)?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"28","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"47","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"5","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V202","name":"saq25","var_intrvl":"discrete","var_dcml":"0","var_wgt":null,"var_is_wgt":null,"loc_start_pos":"118","loc_end_pos":"118","loc_width":"1","loc_rec_seg_no":null,"labl":"15.Cybersecurity and Cybercrime:Data security - compliance with:","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Cybersecurity and cybercrime \n25. Data security\nDo data processors\/controllers have to comply with the following security requirements for the automated processing of personal data? Please check all that apply:","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":null,"type":"vald","wgtd":null},{"value":"80","type":"invd","wgtd":null},{"value":"*","type":"max","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"Sysmiss","labl":null,"is_missing":"Y","stats":[{"value":"80","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"numeric","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":"*"},"fid":"F2"},{"file_id":"F2","vid":"V203","name":"saq25a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"119","loc_end_pos":"121","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Encryption of personal data","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Cybersecurity and cybercrime \n25. Data security\nIf yes, please mark as appropriate below and provide the relevant legal basis (law\/regulation, article etc.): \n- Encryption of personal data","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"63","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"17","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V204","name":"saq25b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"122","loc_end_pos":"124","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Anonymization\/ pseudonymization of personal data","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Cybersecurity and cybercrime \n25. Data security\nIf yes, please mark as appropriate below and provide the relevant legal basis (law\/regulation, article etc.): \n- Anonymization\/ pseudonymization of personal data","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"73","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V205","name":"saq25c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"125","loc_end_pos":"127","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Integrity of data and systems that use or generate","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Cybersecurity and cybercrime \n25. Data security\nIf yes, please mark as appropriate below and provide the relevant legal basis (law\/regulation, article etc.): \n- Integrity of data and systems that use or generate personal data","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"33","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"47","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V206","name":"saq25d","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"128","loc_end_pos":"130","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Ability to restore data and sys. that use or genera","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Cybersecurity and cybercrime \n25. Data security\nIf yes, please mark as appropriate below and provide the relevant legal basis (law\/regulation, article etc.): \n- Ability to restore data and systems that use or generate personal data after a physical or technical incident","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"65","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V207","name":"saq25e","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"131","loc_end_pos":"133","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Ongoing tests, assessments and eval. of security...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"Cybersecurity and cybercrime \n25. Data security\nIf yes, please mark as appropriate below and provide the relevant legal basis (law\/regulation, article etc.): \n- Ongoing tests, assessments and evaluation of security of systems that use or generate personal data","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"65","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V208","name":"saq26","var_intrvl":"discrete","var_dcml":"0","var_wgt":null,"var_is_wgt":null,"loc_start_pos":"134","loc_end_pos":"134","loc_width":"1","loc_rec_seg_no":null,"labl":"16.Cybersecurity and Cybercrime:Internal adoption of cybersecurity standards","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"26. Internal adoption of cybersecurity standards\nDo data processors\/controllers have to comply with the following cybersecurity requirements? Please check all that apply:","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":null,"type":"vald","wgtd":null},{"value":"80","type":"invd","wgtd":null},{"value":"*","type":"max","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"Sysmiss","labl":null,"is_missing":"Y","stats":[{"value":"80","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"numeric","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":"*"},"fid":"F2"},{"file_id":"F2","vid":"V209","name":"saq26a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"135","loc_end_pos":"137","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Adoption of internal policy establishing procedures","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"26. Internal adoption of cybersecurity standards\nDo data processors\/controllers have to comply with the following cybersecurity requirements? Please check all that apply:\n- Adoption of an internal policy establishing procedures for preventing and detecting violations \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"49","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"31","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V210","name":"saq26b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"138","loc_end_pos":"140","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Confidentiality of data and systems that use or ...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"26. Internal adoption of cybersecurity standards\nDo data processors\/controllers have to comply with the following cybersecurity requirements? Please check all that apply:\n- Confidentiality of data and systems that use or generate personal data \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"32","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"48","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V211","name":"saq26c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"141","loc_end_pos":"143","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Appointment of a personal data processing office...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"26. Internal adoption of cybersecurity standards\nDo data processors\/controllers have to comply with the following cybersecurity requirements? Please check all that apply:\n- Appointment of a personal data processing office\/manager \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"58","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"22","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V212","name":"saq26d","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"144","loc_end_pos":"146","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Performance of internal controls","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"26. Internal adoption of cybersecurity standards\nDo data processors\/controllers have to comply with the following cybersecurity requirements? Please check all that apply:\n- Performance of internal controls \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"51","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"29","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V213","name":"saq26e","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"147","loc_end_pos":"149","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Assessment of harm that might be caused by data br.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"26. Internal adoption of cybersecurity standards\nDo data processors\/controllers have to comply with the following cybersecurity requirements? Please check all that apply:\n- Assessment of the harm that might be caused by a data breach \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"58","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"22","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V214","name":"saq26f","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"150","loc_end_pos":"152","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Awareness program among employees","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"26. Internal adoption of cybersecurity standards\nDo data processors\/controllers have to comply with the following cybersecurity requirements? Please check all that apply:\n- Awareness program among employees\nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"65","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V215","name":"saq27","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"153","loc_end_pos":"155","loc_width":"3","loc_rec_seg_no":null,"labl":"17.Cybersecurity and Cybercrime:criminalized activities:","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"4","type":"freq","wgtd":null}]},{"value":"Yea","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"74","type":"freq","wgtd":null}]},{"value":"YEs","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V216","name":"saq27a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"156","loc_end_pos":"158","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Unauthorized access to systems or other databases..","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:\n- Unauthorized access to systems or other databases holding personal data \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"8","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"72","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V217","name":"saq27b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"159","loc_end_pos":"161","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Unauthorized interception of data from systems\/data","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:\n- Unauthorized interception of data from systems or other databases holding personal data \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"9","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"71","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V218","name":"saq27c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"162","loc_end_pos":"164","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Unauthorized damaging deletion, deterioration, alt.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:\n- Unauthorized damaging deletion, deterioration, alteration or suppression of data collected or stored as part of databases holding personal data \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"8","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"72","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V219","name":"saq27d","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"165","loc_end_pos":"167","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Unauthorized interference with databases holding...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:\n- Unauthorized interference with databases holding personal data \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"10","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"70","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V220","name":"saq27e","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"168","loc_end_pos":"170","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Misuse of devices or data for purpose of comm...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:\n- Misuse of devices or data for the purpose of committing any of the above criminal behavior \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"68","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V221","name":"saq27f","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"171","loc_end_pos":"173","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Unauthorized input,alteration,deletion\/interference","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:\n- Unauthorized input, alteration, deletion or interference with a computer system or platform to procure an economic benefit which would apply to databases holding personal data\nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"16","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"64","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V222","name":"saq27g","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"174","loc_end_pos":"176","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Fraudulent use\/alteration of data\/interference...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"27. Cybercrime: criminalized activities\nDoes any law criminalize the following activities? Please check all that are applicable:\n- Fraudulent use or alteration of data or interference with a computer system to procure an economic benefit which would apply to databases holding personal data\nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"16","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"64","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V223","name":"saq28","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"177","loc_end_pos":"179","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:Cybersecurity infrastructure and enforcement agency","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"28. Cybersecurity infrastructure and enforcement agency (CERT)\nDoes any law, regulation or policy provide for the creation of a cyber-security strategy, infrastructure and institutions to identify, investigate, and address cyber-security threats?","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"8","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"72","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V224","name":"saq28a","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"180","loc_end_pos":"182","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:A cyber-security plan to protect key national infr.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"28. Cybersecurity infrastructure and enforcement agency (CERT)\nDoes any law, regulation or policy provide for the creation of a cyber-security strategy, infrastructure and institutions to identify, investigate, and address cyber-security threats?\nIf yes, please mark as appropriate and specify the relevant legal basis (law\/regulation, article etc.): \n- A cyber-security plan to protect key national infrastructure","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"61","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V225","name":"saq28b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"183","loc_end_pos":"185","loc_width":"3","loc_rec_seg_no":null,"labl":"Cybersecurity and Cybercrime:A national CERT","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"28. Cybersecurity infrastructure and enforcement agency (CERT)\nDoes any law, regulation or policy provide for the creation of a cyber-security strategy, infrastructure and institutions to identify, investigate, and address cyber-security threats?\nIf yes, please mark as appropriate and specify the relevant legal basis (law\/regulation, article etc.): \n- A national CERT","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"7","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"11","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"62","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V226","name":"saq30a1","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"186","loc_end_pos":"188","loc_width":"3","loc_rec_seg_no":null,"labl":"19.1.Cross-Border Data Flow: Adequacy approach","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nUnder what conditions can local personal data be transferred to non-domestic third parties?\n- Adequacy approach \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"11","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"30","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"39","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V227","name":"saq30a2","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"189","loc_end_pos":"191","loc_width":"3","loc_rec_seg_no":null,"labl":"19.2.Cross-Border Data Flow: Accountability approach","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nUnder what conditions can local personal data be transferred to non-domestic third parties?\n- Accountability approach\nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"14","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"50","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"16","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V228","name":"saq30b","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"192","loc_end_pos":"194","loc_width":"3","loc_rec_seg_no":null,"labl":"20.Cross-Border Data Flow:Arrangements with foreign countries or multinational..","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nDoes the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?\nPlease check all that apply:","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"3","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"48","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"29","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V229","name":"saq30b1","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"195","loc_end_pos":"197","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:Adequacy decisions\/ whitelists","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nDoes the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?\nPlease check all that apply:\n- adequacy decisions\/ whitelists \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"34","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"26","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"20","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V230","name":"saq30b2","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"198","loc_end_pos":"200","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:Binding corporate rules","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nDoes the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?\nPlease check all that apply:\n- binding corporate rules \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"37","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"34","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"9","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V231","name":"saq30b3","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"201","loc_end_pos":"203","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:Mutual recognition arrangements","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nDoes the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?\nPlease check all that apply:\n- mutual recognition arrangements required information sharing through the Advance Passenger Information \nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"37","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"20","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"23","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V232","name":"saq30b4","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"204","loc_end_pos":"206","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:Treaties","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nDoes the country have arrangements with foreign countries or multinational entities or schemes, including decisions of domestic and foreign bodies or agencies, to require, permit or limit transfers of personal data between countries?\nPlease check all that apply:\n- System treaties\nPlease specify the relevant legal basis (law\/regulation, article etc.):","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"36","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"29","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V233","name":"saq30c","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"207","loc_end_pos":"209","loc_width":"3","loc_rec_seg_no":null,"labl":"21.Cross-Border Data Flow:Circumstances constituting 'adequate level of protect.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":null,"labl":null,"is_missing":null,"stats":[{"value":"5","type":"freq","wgtd":null}]},{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"46","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"28","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V234","name":"saq30c1","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"210","loc_end_pos":"212","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:The nature of the personal data","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:\n- The nature of the personal data","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"61","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"18","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V235","name":"saq30c4","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"213","loc_end_pos":"215","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:The purposes and period data are intended to be proc...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:\n- The purposes for which and period during which the data are intended to be processed","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"64","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"15","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V236","name":"saq30c5","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"216","loc_end_pos":"218","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:The domestic law in force in the host country...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:\n- The domestic law in force in the host country (general and sectoral, including defense and access of public authorities to personal data)","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"61","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"18","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V237","name":"saq30c6","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"219","loc_end_pos":"221","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:The existence and effective functioning...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:\n- The existence and effective functioning of one or more independent supervisory authorities in the third country to enforce compliance","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"73","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"6","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V238","name":"saq30c7","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"222","loc_end_pos":"224","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:Presence of effective rule of law and judicial redress...","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:\n- Presence of effective rule of law and judicial redress for data subjects","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"67","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"12","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V239","name":"saq30c8","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"225","loc_end_pos":"227","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:The international treaties the host country is a party to","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:\n- The international treaties the host country is a party to","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"59","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"20","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"},{"file_id":"F2","vid":"V240","name":"saq30c9","var_intrvl":"discrete","var_dcml":null,"var_wgt":null,"var_is_wgt":null,"loc_start_pos":"228","loc_end_pos":"230","loc_width":"3","loc_rec_seg_no":null,"labl":"Cross-Border Data Flow:Relevant codes of conduct\/rules enforceable in host ctry.","var_imputation":null,"var_security":null,"var_resp_unit":null,"var_analysis_unit":null,"var_qstn_preqtxt":null,"var_qstn_qstnlit":"30. Adequacy and mutual recognition arrangements\nIf the regime requires an \u201cadequacy\u201d or similar mechanism, what circumstances constitute an \u201cadequate level of protection\u201d when transferring personal data internationally?\nPlease check all that apply:\n- Relevant codes of conduct or other rules enforceable in the host country (SCCs; BCRs)","var_qstn_postqtxt":null,"var_qstn_ivuinstr":null,"var_universe":null,"var_universe_clusion":null,"var_sumstat":[{"value":"80","type":"vald","wgtd":null},{"value":null,"type":"invd","wgtd":null}],"var_txt":null,"var_catgry":[{"value":"N\/A","labl":null,"is_missing":null,"stats":[{"value":"1","type":"freq","wgtd":null}]},{"value":"No","labl":null,"is_missing":null,"stats":[{"value":"69","type":"freq","wgtd":null}]},{"value":"Yes","labl":null,"is_missing":null,"stats":[{"value":"10","type":"freq","wgtd":null}]}],"var_codinstr":null,"var_concept":[],"var_format":{"type":"character","schema":"other","category":null,"name":null},"var_notes":null,"var_val_range":{"min":null,"max":null},"fid":"F2"}],"variable_groups":[]}