102. Chad 18.18

102nd National Cyber Security Index
147th Global Cybersecurity Index
174th ICT Development Index
139th Networked Readiness Index
Population 14.5million
Area (km2) 1.3million
GDP per capita ($) 2.4thousand
NCSI FULFILMENT PERCENTAGE
NCSI Update Data source
26 Nov 2018 Public data collection
NCSI DEVELOPMENT TIMELINE 3 years All data

Version 26 Nov 2018

GENERAL CYBER SECURITY INDICATORS
BASELINE CYBER SECURITY INDICATORS
  • 5. Protection of digital services 0/5 0%
    0
    5 0%
    • 5.1. Cyber security responsibility for digital service providers 0
      0
      1
      Requirements
      Criteria

      According to legislation, digital service providers (except micro and small enterprises): (1) must manage cyber/ICT risks or (2) must implement established cyber/information security requirements.

      Accepted references

      Legal act

      Evidence
    • 5.2. Cyber security standard for the public sector 0
      0
      1
      Requirements
      Criteria

      Public sector digital service providers must implement (1) cyber/ICT security requirements (defined by legislation) or (2) a widely recognised security standard.

      Accepted references

      Legal act

      Evidence
    • 5.3. Competent supervisory authority 0
      0
      3
      Requirements
      Criteria

      The government has a competent authority in the field of cyber/information security that has the power to supervise public and private digital service providers regarding the implementation of cyber/information security requirements.

      Accepted references

      Official website or legal act

      Evidence
  • 6. Protection of essential services 0/6 0%
    0
    6 0%
    • 6.1. Operators of essential services are identified 0
      0
      1
      Requirements
      Criteria

      There is a legal act that allows to identify operators of essential services.

      Accepted references

      Legal act

      Evidence
    • 6.2. Cyber security requirements for operators of essential services 0
      0
      1
      Requirements
      Criteria

      According to the legislation, operators of essential services must manage cyber/ICT risks.

      Accepted references

      Legal act

      Evidence
    • 6.3. Competent supervisory authority 0
      0
      3
      Requirements
      Criteria

      The government has a competent authority in the field of cyber/information security that has the power to supervise operators of essential services, regarding cyber/information security requirements.

      Accepted references

      Official website or legal act

      Evidence
    • 6.4. Regular monitoring of security measures 0
      0
      1
      Requirements
      Criteria

      Operators of essential services must regularly (at least once every 3 years) provide evidence of the effective implementation of cyber/information security policies (e.g. audit result, documentation, specific report).

      Accepted references

      Legal act

      Evidence
  • 7. E-identification and trust services 5/9 56%
    5
    9 56%
    • 7.1. Unique persistent identifier 0
      0
      1
      Requirements
      Criteria

      The government provides a unique persistent identifier to all citizens, residents, and legal entities. For example, the identifier remains the same after document expiration and name change.

      Accepted references

      Legal act

      Evidence
    • 7.2. Requirements for cryptosystems 0
      0
      1
      Requirements
      Criteria

      Requirements for cryptosystems in the field of trust services are regulated.

      Accepted references

      Legal act

      Evidence
    • 7.3. Electronic identification 0
      0
      1
      Requirements
      Criteria

      Electronic identification is regulated.

      Accepted references

      Legal act

      Evidence
    • 7.4. Electronic signature 1
      1
      1
      Requirements
      Criteria

      E-signature is regulated

      Accepted references

      Legal act

      Evidence

      Law N. 008/PR/2015, On Electronic Transactions

      Title I, Chapter II, Section II, Articles 20 – 24; About the electronic Signature

    • 7.5. Timestamping 0
      0
      1
      Requirements
      Criteria

      Timestamping is regulated.

      Accepted references

      Legal act

      Evidence
    • 7.6. Electronic registered delivery service 1
      1
      1
      Requirements
      Criteria

      Electronic registered delivery service between state entities, citizens and private sector entities is regulated. The service provides legally binding data exchange and guarantees the confidentiality and integrity of information.

      Accepted references

      Legal act

      Evidence

      Law N. 008/PR/2015, On Electronic Transactions

      Title IV, Chapter IV, Articles 123 – 125

      Chapter IV: Provisions specific to electronic registered service providers

      Art 123: At the time of sending the message, the electronic registered service provider issues to the sender an acknowledgment of sending, provided with its secure electronic signature indicating, in accordance with the provisions defined by regulatory means, the date on which the message has been sent to the recipient.

      Art 124: The electronic registered service provider implements the necessary means to:
      a) to protect the contents of the message of the sender against any alteration and modification;
      b) to prevent any loss or appropriation by a third party of the message; and
      c) ensure the confidentiality of transmitted and retained data throughout the communication and preservation process.

      Art 125: The electronic registered service provider verifies, by appropriate means, the identity of the recipient of the electronic registered user, with or without acknowledgment of receipt, before the electronic registered delivery is issued.

      For the purposes of paragraph 1 above, use is made of an electronic signature referred to in Article 20 of this Law.

    • 7.7. Competent supervisory authority 3
      3
      3
      Requirements
      Criteria

      There is an authority responsible for the supervision of qualified trust service providers.

      Accepted references

      Official website or legal act

      Evidence

      Law N. 008/PR/2015, On Electronic Transactions

      Articles 158 – 171

      Title VI: Control of Accredited Providers, Procedures and Sanctions

      Chapter I: The principle of control

      Art 158: A surveillance of the accredited persons is organized by periodic controls at the initiative of the ANSICE.

      Art 159: The decisions of granting or withdrawal of accreditation taken by ANSICE are published in the Official Gazette of the Republic of Chad.

  • 8. Protection of personal data 4/4 100%
    4
    4 100%
    • 8.1. Personal data protection legislation 1
      1
      1
      Requirements
      Criteria

      There is a legal act for personal data protection.

      Accepted references

      Legal act

      Evidence

      Law N. 007/PR/2015, About the Protection of Personal Data

      Art 1: The object of this law is to set up a system of protection of the private and professional life resulting from the collection, the treatment, the transmission, the storage and the use of the data with personal character, subject to the protection of public order.

    • 8.2. Personal data protection authority 3
      3
      3
      Requirements
      Criteria

      There is an independent public supervisory authority that is responsible for personal data protection.

      Accepted references

      Official website or legal act

      Evidence

      National Agency of IT Security and Electronic Certification (ANSICE)

      Law N. 006/PR/2015, About the Creation of the National Agency of IT Security and Electronic Certification

      Article 6, 7, 8


      Law N. 007/PR/2015, About the Protection of Personal Data

      Article 5: ANSICE: National Agency for Computer Security and Electronic Certification. Independent national administrative authority responsible for ensuring compliance with the provisions of this law on the national territory.

INCIDENT AND CRISIS MANAGEMENT INDICATORS

CONTRIBUTORS

Radu Serrano
Intern at eGA