116. Chad 18.18

116th National Cyber Security Index
95th Global Cybersecurity Index
174th ICT Development Index
134th Networked Readiness Index
Population 14.5million
Area (km2) 1.3million
GDP per capita ($) 2.4thousand
NCSI FULFILMENT PERCENTAGE
NCSI DEVELOPMENT TIMELINE 3 years All data
RANKING TIMELINE
NCSI Update Data source
26 Nov 2018 Public data collection

Version 26 Nov 2018

GENERAL CYBER SECURITY INDICATORS
BASELINE CYBER SECURITY INDICATORS
  • 5. Protection of digital services 0/5 0%
    0
    5 0%
    • 5.1. Cyber security responsibility for digital service providers 0
      0
      1
      Requirements
      Criteria

      According to legislation, digital service providers (except micro and small enterprises): (1) must manage cyber/ICT risks or (2) must implement established cyber/information security requirements.

      Accepted references

      Legal act

      Evidence
    • 5.2. Cyber security standard for the public sector 0
      0
      1
      Requirements
      Criteria

      Public sector digital service providers must implement (1) cyber/ICT security requirements (defined by legislation) or (2) a widely recognised security standard.

      Accepted references

      Legal act

      Evidence
    • 5.3. Competent supervisory authority 0
      0
      3
      Requirements
      Criteria

      The government has a competent authority in the field of cyber/information security that has the power to supervise public and private digital service providers regarding the implementation of cyber/information security requirements.

      Accepted references

      Official website or legal act

      Evidence
  • 6. Protection of essential services 0/6 0%
    0
    6 0%
    • 6.1. Operators of essential services are identified 0
      0
      1
      Requirements
      Criteria

      There is a legal act that allows to identify operators of essential services.

      Accepted references

      Legal act

      Evidence
    • 6.2. Cyber security requirements for operators of essential services 0
      0
      1
      Requirements
      Criteria

      According to the legislation, operators of essential services must manage cyber/ICT risks.

      Accepted references

      Legal act

      Evidence
    • 6.3. Competent supervisory authority 0
      0
      3
      Requirements
      Criteria

      The government has a competent authority in the field of cyber/information security that has the power to supervise operators of essential services, regarding cyber/information security requirements.

      Accepted references

      Official website or legal act

      Evidence
    • 6.4. Regular monitoring of security measures 0
      0
      1
      Requirements
      Criteria

      Operators of essential services must regularly (at least once every 3 years) provide evidence of the effective implementation of cyber/information security policies (e.g. audit result, documentation, specific report).

      Accepted references

      Legal act

      Evidence
  • 7. E-identification and trust services 5/9 56%
    5
    9 56%
    • 7.1. Unique persistent identifier 0
      0
      1
      Requirements
      Criteria

      The government provides a unique persistent identifier to all citizens, residents, and legal entities. For example, the identifier remains the same after document expiration and name change.

      Accepted references

      Legal act

      Evidence
    • 7.2. Requirements for cryptosystems 0
      0
      1
      Requirements
      Criteria

      Requirements for cryptosystems in the field of trust services are regulated.

      Accepted references

      Legal act

      Evidence
    • 7.3. Electronic identification 0
      0
      1
      Requirements
      Criteria

      Electronic identification is regulated.

      Accepted references

      Legal act

      Evidence
    • 7.4. Electronic signature 1
      1
      1
      Requirements
      Criteria

      E-signature is regulated

      Accepted references

      Legal act

      Evidence

      Law N. 008/PR/2015, On Electronic Transactions

      Title I, Chapter II, Section II, Articles 20 – 24; About the electronic Signature

    • 7.5. Timestamping 0
      0
      1
      Requirements
      Criteria

      Timestamping is regulated.

      Accepted references

      Legal act

      Evidence
    • 7.6. Electronic registered delivery service 1
      1
      1
      Requirements
      Criteria

      Electronic registered delivery service between state entities, citizens and private sector entities is regulated. The service provides legally binding data exchange and guarantees the confidentiality and integrity of information.

      Accepted references

      Legal act

      Evidence

      Law N. 008/PR/2015, On Electronic Transactions

      Title IV, Chapter IV, Articles 123 – 125

      Chapter IV: Provisions specific to electronic registered service providers

      Art 123: At the time of sending the message, the electronic registered service provider issues to the sender an acknowledgment of sending, provided with its secure electronic signature indicating, in accordance with the provisions defined by regulatory means, the date on which the message has been sent to the recipient.

      Art 124: The electronic registered service provider implements the necessary means to:
      a) to protect the contents of the message of the sender against any alteration and modification;
      b) to prevent any loss or appropriation by a third party of the message; and
      c) ensure the confidentiality of transmitted and retained data throughout the communication and preservation process.

      Art 125: The electronic registered service provider verifies, by appropriate means, the identity of the recipient of the electronic registered user, with or without acknowledgment of receipt, before the electronic registered delivery is issued.

      For the purposes of paragraph 1 above, use is made of an electronic signature referred to in Article 20 of this Law.

    • 7.7. Competent supervisory authority 3
      3
      3
      Requirements
      Criteria

      There is an authority responsible for the supervision of qualified trust service providers.

      Accepted references

      Official website or legal act

      Evidence

      Law N. 008/PR/2015, On Electronic Transactions

      Articles 158 – 171

      Title VI: Control of Accredited Providers, Procedures and Sanctions

      Chapter I: The principle of control

      Art 158: A surveillance of the accredited persons is organized by periodic controls at the initiative of the ANSICE.

      Art 159: The decisions of granting or withdrawal of accreditation taken by ANSICE are published in the Official Gazette of the Republic of Chad.

  • 8. Protection of personal data 4/4 100%
    4
    4 100%
    • 8.1. Personal data protection legislation 1
      1
      1
      Requirements
      Criteria

      There is a legal act for personal data protection.

      Accepted references

      Legal act

      Evidence

      Law N. 007/PR/2015, About the Protection of Personal Data

      Art 1: The object of this law is to set up a system of protection of the private and professional life resulting from the collection, the treatment, the transmission, the storage and the use of the data with personal character, subject to the protection of public order.

    • 8.2. Personal data protection authority 3
      3
      3
      Requirements
      Criteria

      There is an independent public supervisory authority that is responsible for personal data protection.

      Accepted references

      Official website or legal act

      Evidence

      National Agency of IT Security and Electronic Certification (ANSICE)

      Law N. 006/PR/2015, About the Creation of the National Agency of IT Security and Electronic Certification

      Article 6, 7, 8


      Law N. 007/PR/2015, About the Protection of Personal Data

      Article 5: ANSICE: National Agency for Computer Security and Electronic Certification. Independent national administrative authority responsible for ensuring compliance with the provisions of this law on the national territory.

INCIDENT AND CRISIS MANAGEMENT INDICATORS
  • 9. Cyber incidents response 0/6 0%
    0
    6 0%
    • 9.1. Cyber incidents response unit 0
      0
      3
      Requirements
      Criteria

      The government has a unit (CSIRT, CERT, CIRT, etc.) that is specialised in national-level cyber incident detection and response.

      Accepted references

      Official website or legal act

      Evidence
    • 9.2. Reporting responsibility 0
      0
      1
      Requirements
      Criteria

      Digital service providers and operators of essential services have an obligation to notify appointed government authorities of cyber security incidents.

      Accepted references

      Legal act

      Evidence
    • 9.3. Single point of contact for international coordination 0
      0
      2
      Requirements
      Criteria

      The government has designated a single point of contact for international cyber security coordination.

      Accepted references

      Official website or legal act

      Evidence
  • 10. Cyber crisis management 0/5 0%
    0
    5 0%
  • 11. Fight against cybercrime 4/9 44%
    4
    9 44%
    • 11.1. Cybercrimes are criminalised 1
      1
      1
      Requirements
      Criteria

      Cybercrimes are defined by legislation.

      Accepted references

      Legal act

      Evidence

      Law N. 009/PR/2015, On Cybersecurity and the Fight against Cybercrime


      Anti-Cybercrime Unit of the National Agency of IT Security and Electronic Certification

      Law N. 006/PR/2015, About the Creation of the National Agency of IT Security and Electronic Certification

      Article 5

    • 11.2. Cybercrime unit 3
      3
      3
      Requirements
      Criteria

      There is a government entity with a specific function of combatting cybercrime.

      Accepted references

      Official website or legal act

      Evidence

      Anti-Cybercrime Unit of the National Agency of IT Security and Electronic Certification

      Law N. 006/PR/2015, About the Creation of the National Agency of IT Security and Electronic Certification

      Article 5: 

      ANSICE must set up a Cyber Crime Cell composed of magistrates, judicial police officers, computer scientists and telecommunications specialists.

      The Cyber Crime Unit is primarily responsible for establishing a partnership with technical service providers, including access and accommodation providers, to make the fight against cybercrime effective and to ensure the participation of these technical intermediaries have the fight against the illicit contents.

      In fulfilling its mission, the Cyber Crime Unit's mission is to collect the evidence of offenses provided for in this law, to search for and identify the perpetrators and to refer them to the competent judicial authorities.

    • 11.3. Digital forensics unit 0
      0
      3
      Requirements
      Criteria

      There is a government entity with a specific function of digital forensics.

      Accepted references

      Official website or legal act

      Evidence
    • 11.4. 24/7 contact point for international cybercrime 0
      0
      2
      Requirements
      Criteria

      The government has designated an international 24/7 contact point for cybercrimes.

      Accepted references

      Official website or legal act

      Evidence
  • 12. Military cyber operations 0/6 0%
    0
    6 0%
    • 12.1. Cyber operations unit 0
      0
      3
      Requirements
      Criteria

      Military forces have a unit (cyber command, etc.) that is specialised in planning and conducting cyber operations.

      Accepted references

      Official website or legal act

      Evidence
    • 12.2. Cyber operations exercise 0
      0
      2
      Requirements
      Criteria

      Military forces have conducted a cyber operations exercise or an exercise with a cyber operations component in the country in the last 3 years.

      Accepted references

      Exercise document/website or press release

      Evidence
    • 12.3. Participation in international cyber exercises 0
      0
      1
      Requirements
      Criteria

      The country's military team has participated in an international cyber operations exercise in the last 3 years.

      Accepted references

      Exercise document/website or press release

      Evidence
Information Disclaimer

The information provided on the NCSI website is based on publicly available evidence materials. The appearance in the index and subsequent ranking is commensurate to the existence and public availability of such information. The NCSI links to third party websites and information. The NCSI and eGA are not responsible for the accuracy or completeness of third party website information.

What can I do to improve my country's data in NCSI?

Become a data contributor Update a specific indicator with evidence data

CONTRIBUTORS

Radu Serrano
Intern at eGA