IHSN Survey Catalog
  • Home
  • Microdata Catalog
  • Citations
  • Login
    Login
    Home / Central Data Catalog / WLD_2020_GDRD_V01_M
central

Global Data Regulation Diagnostic Survey Dataset 2021

Afghanistan, Angola, Argentina...and 77 more, 2020
Get Microdata
Reference ID
WLD_2020_GDRD_v01_M
Producer(s)
World Bank
Metadata
DDI/XML JSON
Created on
Oct 14, 2021
Last modified
Jun 14, 2022
Page views
4405
Downloads
79
  • Study Description
  • Data Dictionary
  • Downloads
  • Get Microdata
  • Data files
  • enablers.dta
  • safeguards.dta

Data file: safeguards.dta

This file contains data from Questionnaire Section A: Safeguard rights in data flows and the (re)use of data The following section focuses on legal requirements that protect fundamental rights in personal/mixed/sensitive data and commercial rights in non-personal data. Issues covered include data protection, cybersecurity/cybercrime, cross-border data flows and intermediary liability.

Cases: 80
Variables: 60

Variables

ccode
Country code
cname
Country name
region
Region name
wb_incgrp
WB Income group
saq1a
1.1.Personal Data:Legal basis for data protection
saq1b
1.2.Personal Data:Only sector-specific personal data protection and/or priv.laws
saq1c
1.3.Personal Data:Privacy and/or data prot. rights protected in constitution..
saq1d
1.4.Personal Data:No laws exist but significant court or admin. decisions...
saq3a
2.Personal Data:Exceptions to limitations on the coll. or processing of data
saq3b
3.Personal Data:Exceptions subject to a 'necessary and proportionate' test
saq5a
4.Personal Data:Law/regulation require that coll. and use of pers. data be made.
saq5b
5.Personal Data:Law/regulation require that coll. and use of pers. data be pro..
saq9
6.Personal Data:Storage limitation
saq10a
7.Personal Data:Privacy by design
saq11a
8.Personal Data:Limitations on data sharing
saq17
9.Personal Data:Right to challenge the accuracy and to rectification of personal
saq20
10.Personal Data:Automated decisions
saq21a
11.Personal Data:Redress
saq22a
12.Personal Data:Institutional arrangements to enforce personal data protection
saq23
13.Non-Personal Data:Intellectual property rights prevent data sharing?
sbq48d
14.Non-Personal Data:Does the law include a provision regulating confidentiality
saq25
15.Cybersecurity and Cybercrime:Data security - compliance with:
saq25a
Cybersecurity and Cybercrime:Encryption of personal data
saq25b
Cybersecurity and Cybercrime:Anonymization/ pseudonymization of personal data
saq25c
Cybersecurity and Cybercrime:Integrity of data and systems that use or generate
saq25d
Cybersecurity and Cybercrime:Ability to restore data and sys. that use or genera
saq25e
Cybersecurity and Cybercrime:Ongoing tests, assessments and eval. of security...
saq26
16.Cybersecurity and Cybercrime:Internal adoption of cybersecurity standards
saq26a
Cybersecurity and Cybercrime:Adoption of internal policy establishing procedures
saq26b
Cybersecurity and Cybercrime:Confidentiality of data and systems that use or ...
saq26c
Cybersecurity and Cybercrime:Appointment of a personal data processing office...
saq26d
Cybersecurity and Cybercrime:Performance of internal controls
saq26e
Cybersecurity and Cybercrime:Assessment of harm that might be caused by data br.
saq26f
Cybersecurity and Cybercrime:Awareness program among employees
saq27
17.Cybersecurity and Cybercrime:criminalized activities:
saq27a
Cybersecurity and Cybercrime:Unauthorized access to systems or other databases..
saq27b
Cybersecurity and Cybercrime:Unauthorized interception of data from systems/data
saq27c
Cybersecurity and Cybercrime:Unauthorized damaging deletion, deterioration, alt.
saq27d
Cybersecurity and Cybercrime:Unauthorized interference with databases holding...
saq27e
Cybersecurity and Cybercrime:Misuse of devices or data for purpose of comm...
saq27f
Cybersecurity and Cybercrime:Unauthorized input,alteration,deletion/interference
saq27g
Cybersecurity and Cybercrime:Fraudulent use/alteration of data/interference...
saq28
Cybersecurity and Cybercrime:Cybersecurity infrastructure and enforcement agency
saq28a
Cybersecurity and Cybercrime:A cyber-security plan to protect key national infr.
saq28b
Cybersecurity and Cybercrime:A national CERT
saq30a1
19.1.Cross-Border Data Flow: Adequacy approach
saq30a2
19.2.Cross-Border Data Flow: Accountability approach
saq30b
20.Cross-Border Data Flow:Arrangements with foreign countries or multinational..
saq30b1
Cross-Border Data Flow:Adequacy decisions/ whitelists
saq30b2
Cross-Border Data Flow:Binding corporate rules
saq30b3
Cross-Border Data Flow:Mutual recognition arrangements
saq30b4
Cross-Border Data Flow:Treaties
saq30c
21.Cross-Border Data Flow:Circumstances constituting 'adequate level of protect.
saq30c1
Cross-Border Data Flow:The nature of the personal data
saq30c4
Cross-Border Data Flow:The purposes and period data are intended to be proc...
saq30c5
Cross-Border Data Flow:The domestic law in force in the host country...
saq30c6
Cross-Border Data Flow:The existence and effective functioning...
saq30c7
Cross-Border Data Flow:Presence of effective rule of law and judicial redress...
saq30c8
Cross-Border Data Flow:The international treaties the host country is a party to
saq30c9
Cross-Border Data Flow:Relevant codes of conduct/rules enforceable in host ctry.
Total: 60
Back to Catalog
IHSN Survey Catalog

© IHSN Survey Catalog, All Rights Reserved.