Accessibility Tools

Skip to main content

Information Security Policy

Information is one of the most important elements of business management at the Central Bank of Libya. Information systems, databases, and communication networks of the world have become the basis for the banking sector from the industrial age to the new current age of technology. Information security is at the core of the Central Bank which plays an important role in the protection of assets, interests and information. Initiated by the Governor of the Central Bank of Libya in 2008, the CBL has adopted a plan based on international standards to upgrade the protection of privacy information and assets using technical and human resources.

The terms of the security plan consists of the following:

  • Item No. 1
    Information security concerning employees, managers, and contractors
    To determine the responsibilities and duties towards information security concerning employees, managers, and contractors.
  • Item No. 2
    Classification of the assets of the bank
    Classification of the assets of the bank and determine the required levels of protection using international standards. Item No.
  • Item No. 3
    Upgrade security access to bank facilities
    Implement additional security protocols of entry and access to bank facilities, including sensitive equipment, information systems and databases.
  • Item No. 4
    Password Management
    The establishment of the passwords and other security related responsibilities.
  • Item No. 5
    Physical and environmental security
    Identifying facilities to protect and prevent unauthorized access, information theft, equipment theft and disruption of work or eavesdropping. Also, protecting infrastructure equipment such as fire equipment and air conditioners.
  • Item No. 6
    E-Mail Security
    The establishment of protocols to protect E-mails and databases. Email is the largest distributor of viruses and spam which needs mechanisms and procedures to make sure data is not corrupted or stolen. Item No.
  • Item No. 7
    Upgrade Encryption
    Introduction of mechanisms to reduce human error, theft, embezzlement and corruption.
  • Item No. 8
    Upgrade Encryption
    To upgrade and maintain the confidentiality, creditability, and integrity of the information using the latest encryption software
  • Item No. 9
    Remote Access
    Establishment of security precautions and mechanisms to be taken to prevent access to the bank’s internal network using remote access.
  • Item No. 10
    Systems development and maintenance
    Analyze, maintain and upgrade the current system in place to ensure building security. The mechanisms focus on peacekeeping, security, encryption, data and configuration.
  • Item No. 11
    Antivirus
    Analyze the procedures and software for anti-virus and anti-spam software.
  • Item No. 12
    Backup

    Establish procedures to backup copies of data, storage media and information security.

  • Item No. 13
    Incident Response

    Procedure to learn, monitor and reduce time of security breaches and breakdowns in the system operations to reduce direct or indirect damage to the CBL and the public.

  • Item No. 14
    Security of networks and facilities

    Protect networks from eavesdropping, spying, theft, disruption, and unwanted modification.

  • Item No. 15
    Continuity of workflow management

    Protection of sensitive business tasks and information in the event of a crisis or disaster such as fires or earthquakes.

  • Item No. 16
    Security of wireless communications

    Emphasis on proper mobile network encryption.

  • Item No. 17
    Network Security Monitoring

    Allow limited access to the information network through the development of a separate network to the public. This network is separated from the internal network to help protect it from malicious attacks.