Digitalisation and ICT in the public sector

To the Top
The 3 steps are Choose table, Choose variable and Show result. You are currently at Choose variables

10852: Efforts/routines for administrating the ICT security, by employment group (Central government) 2013 - 2024

Ekaterina Denisova, Statistics Norway
+47 40 90 24 12
2024-05-03 08:00
Have a written information security policy which is rooted in the management:
per cent
A formal appointed person is responsible for the information security:
per cent
An emergency plan is updated within the last two years:
per cent
Emergency exercise is implemented not less than once a year:
per cent
Have routines for handling security incidents:
per cent
Have documented methodology and template for risk evaluations:
per cent
Acceptable risk is made clear by the management, and is communicated to the staff:
per cent
Risk evaluations are implemented systematical and periodical:
per cent
Required security efforts are implemented at new risk evaluations:
per cent
Have annually internal auditing of the information security control system:
per cent
The management has review of the information security control system annually:
per cent
Activities for training and awareness for employees and leaders are carried out at least once per year:
per cent
Have a written information security policy which is rooted in the management:
1. quarter
A formal appointed person is responsible for the information security:
1. quarter
An emergency plan is updated within the last two years:
1. quarter
Emergency exercise is implemented not less than once a year:
1. quarter
Have routines for handling security incidents:
1. quarter
Have documented methodology and template for risk evaluations:
1. quarter
Acceptable risk is made clear by the management, and is communicated to the staff:
1. quarter
Risk evaluations are implemented systematical and periodical:
1. quarter
Required security efforts are implemented at new risk evaluations:
1. quarter
Have annually internal auditing of the information security control system:
1. quarter
The management has review of the information security control system annually:
1. quarter
Activities for training and awareness for employees and leaders are carried out at least once per year:
1. quarter
Have a written information security policy which is rooted in the management:
per cent
A formal appointed person is responsible for the information security:
per cent
An emergency plan is updated within the last two years:
per cent
Emergency exercise is implemented not less than once a year:
per cent
Have routines for handling security incidents:
per cent
Have documented methodology and template for risk evaluations:
per cent
Acceptable risk is made clear by the management, and is communicated to the staff:
per cent
Risk evaluations are implemented systematical and periodical:
per cent
Required security efforts are implemented at new risk evaluations:
per cent
Have annually internal auditing of the information security control system:
per cent
The management has review of the information security control system annually:
per cent
Activities for training and awareness for employees and leaders are carried out at least once per year:
per cent
Statistics Norway
External PROD
Now you have come to the page, Choose variable. This page give you the oportunity to select which variables and values you want to display in your result of the table. A variable is a property of a statistical unit. The page is divided into several boxes, one for each variable, where you can select values by click to highlight one or more values. It always starts with the statistics variable which is the main value counted in the table.
Navigating with keyboard and screenreader. Select multiple object in row: SHIFT+arrow down/up. To select a single value in the listbox: Windows:Hold Ctrl + arrow down. Then release Ctrl and press space. Repeat. Mac:CMD+arrow down/up. Then release CMD and press spacebar. Repeat. (Works only in Chrome, not in Safari). To exit listbox with values selected, press TAB-key.
Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.Have a written information security policy which is rooted in the management , A formal appointed person is responsible for the information security , An emergency plan is updated within the last two years ,

Selected 1 of total 12

Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.2013 , 2014 , 2015 ,

Selected 1 of total 11

Selected 0 of total 5

Optional variable
Number of selected data cells are:
(maximum number allowed is 300 000)
Number of selected cells exceeds the maximum allowed 300 000

contents

Required security efforts are implemented at new risk evaluations

Indepented of new or changed ICT systems