Table

Efforts/routines for administrating the ICT security. Per cent.
2018
Have a written information security policy which is rooted in the managementA formal appointed person is responsible for the information securityEmergency exercise is implemented not less than once a yearRisk evaluations are implemented systematical and periodicalRequired security efforts are implemented at new risk evaluationsActivities for training and awareness
Central government82.790.941.376.489.467.8
Municipalities63.963.412.741.967.643.0
County municipalities87.587.525.068.887.568.8