Palestinian Central Bureau of Statistics
Data Catalog
Home
Microdata Catalog
Citations
Dissemination Policy
المسوح بالعربية
Login
Login
Home
/
Central Data Catalog
/
BUSINESS-ICT
/
PSE-PCBS-BICT-2021-V1.0
ICT Business Survey, 2021
West Bank and Gaza
,
2017
Get Microdata
Reference ID
PSE-PCBS-BICT-2021-V1.0
Producer(s)
Palestinian Central Bureau of Statistics
Collections
Business ICT
Metadata
DDI/XML
JSON
Created on
Jul 19, 2023
Last modified
Jul 24, 2023
Page views
47709
Downloads
257
Study Description
Data Description
Downloads
Data files
complet
data_bict2022_E
Variable Groups
General Data
Use of ICT Tools
Access and Use to the Internet
Security and privacy of information and communication technology
Use of Website For enterprises with access to Internet
Use of Social Media or Professional Networks. (For enterprises with access to Internet)
E-commerce
E- Commerce Web Sale
EDI-type sales
Web purchases
Use of Cloud Computing Services
ICT specialist
Resources and expenditure on ICT tools
Advanced technologies
Variable Groups
Variable group: Security and privacy of information and communication technology
Variables
16
SEC01
Does the enterprise have a formal policy to manage ICT privacy risks [at the end of December 2021]?
SEC02
During 2021, did the enterprise experience any ICT related incident, (e.g. violations, attacks or security breaches, including loss of data, disclosure, waste of time, destruction of programs, or loss of service)
SEC03_A
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Identification and authentication (strong password, Hardware tokens (e.g. smart cards), biometric methods)?
SEC03_B
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Intrusion detection systems (e.g. anti-virus, antispyware, firewall, etc.)?
SEC03_C
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Spam filter / Web filter?
SEC03_D
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Offsite data backup?
SEC03_E
During 2021, were the following security procedures used by the enterprise for device protection from hacking: SSL?
SEC03_F
During 2021, were the following security procedures used by the enterprise for device protection from hacking: VPN Network?
SEC03_G
During 2021, were the following security procedures used by the enterprise for device protection from hacking:Staff awareness on their obligations in security related issues (by training, information, contractual obligation) ?
SEC03_H
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Other aspects related to security policy management (Security manager, specific resources, regular review and audit plans) ?
SEC03_I
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Protection against DDoS hacks ?
SEC03_J
During 2021, were the following security procedures used by the enterprise for device protection from hacking:Content Filtering ?
SEC03_K
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Flash and CDs use policy?
SEC03_L
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Port Security?
SEC03_M
During 2021, were the following security procedures used by the enterprise for device protection from hacking: Other ?
SEC04
At the end of December 2021, did the enterprise have a formal policy for using social media networks?
Back to Catalog