Table
Efforts/routines for administrating the ICT security. Per cent. | 2018 |
---|
Have a written information security policy which is rooted in the management | A formal appointed person is responsible for the information security | Emergency exercise is implemented not less than once a year | Risk evaluations are implemented systematical and periodical | Required security efforts are implemented at new risk evaluations | Activities for training and awareness |
---|
Central government | 82.7 | 90.9 | 41.3 | 76.4 | 89.4 | 67.8 |
---|
Municipalities | 63.9 | 63.4 | 12.7 | 41.9 | 67.6 | 43.0 |
---|
County municipalities | 87.5 | 87.5 | 25.0 | 68.8 | 87.5 | 68.8 |
---|