# Hardware & End-User Equipment

# User devices

Institutional devices used by employees shall be labeled (tagged), recorded and proper naming shall be done. They shall not be used to illegally process, distribute, or store any data protected by copyright of intellectual property. These devices shall not be used in activities that contribute to decreasing the employee’s productivity.

# Precaution measures

- Offices with digitalization equipment shall be locked to prevent theft and other risks.
- Digitalization equipment shall not be placed next to air conditioners as humidity and heat can shorten the life of internal components.
- Users shall not eat, drink or smoke next to digitalization equipment as these may cause safety risks.
- Only suitable cleaning tools shall be used when cleaning computer keyboards, screens, printers and other digitalization equipment.
- Whenever possible, digitalization equipment shall not be connected to the same electric power as other power consuming devices.
- All other digitalization equipment taken into government premises shall be identified and recorded at the entrance security checkpoint.

# Stolen computers

In case of a stolen computer, the user shall immediately report to the supervisor and to Rwanda investigation bureau (RIB) and to the administrator in charge. Institution’s rules and regulations governing loss of public properties shall be applied.

# User responsibilities

- Users<span style="letter-spacing: -.75pt;"> </span>shall<span style="letter-spacing: -.65pt;"> </span>ensure<span style="letter-spacing: -.7pt;"> </span>proper<span style="letter-spacing: -.7pt;"> </span>use<span style="letter-spacing: -.75pt;"> </span>of<span style="letter-spacing: -.75pt;"> </span>digitalization<span style="letter-spacing: -.65pt;"> </span>equipment<span style="letter-spacing: -.75pt;"> </span>in<span style="letter-spacing: -.75pt;"> </span>accordance<span style="letter-spacing: -.7pt;"> </span>with<span style="letter-spacing: -.75pt;"> </span>all<span style="letter-spacing: -.75pt;"> </span>provisions<span style="letter-spacing: -.75pt;"> </span>of<span style="letter-spacing: -.75pt;"> </span>these <span style="letter-spacing: -.1pt;">guidelines.</span>
- Users<span style="letter-spacing: -.15pt;"> </span>are<span style="letter-spacing: -.1pt;"> </span>required to<span style="letter-spacing: -.05pt;"> </span>report any<span style="letter-spacing: -.3pt;"> </span>misuse<span style="letter-spacing: -.05pt;"> </span>or potential<span style="letter-spacing: -.05pt;"> </span>threats to<span style="letter-spacing: -.05pt;"> </span>digitalization<span style="letter-spacing: .05pt;"> </span><span style="letter-spacing: -.1pt;">equipment.</span>
- It<span style="letter-spacing: 1.05pt;"> </span>is<span style="letter-spacing: 1.05pt;"> </span>the<span style="letter-spacing: 1.0pt;"> </span>user’s<span style="letter-spacing: 1.0pt;"> </span>responsibility to<span style="letter-spacing: 1.05pt;"> </span>seek<span style="letter-spacing: 1.0pt;"> </span>guidance when<span style="letter-spacing: 1.0pt;"> </span>in<span style="letter-spacing: 1.05pt;"> </span>doubt<span style="letter-spacing: 1.05pt;"> </span>of what<span style="letter-spacing: 1.05pt;"> </span>constitutes<span style="letter-spacing: 1.0pt;"> </span>acceptable or prohibited use of digitalization equipment.
- While<span style="letter-spacing: 2.0pt;"> </span>the<span style="letter-spacing: 2.0pt;"> </span>physical<span style="letter-spacing: 2.0pt;"> </span>and<span style="letter-spacing: 2.0pt;"> </span>logical<span style="letter-spacing: 2.0pt;"> </span>security<span style="letter-spacing: 2.0pt;"> </span>of<span style="letter-spacing: 2.0pt;"> </span>digitalization<span style="letter-spacing: 2.0pt;"> </span>equipment<span style="letter-spacing: 2.0pt;"> </span>and<span style="letter-spacing: 2.0pt;"> </span>data<span style="letter-spacing: 2.0pt;"> </span>is<span style="letter-spacing: 2.0pt;"> </span>primarily<span style="letter-spacing: 2.0pt;"> </span>a<span style="letter-spacing: 2.0pt;"> </span>responsibility<span style="letter-spacing: -.2pt;"> </span>of the Government, users as well shall take note that they share this responsibility.

# Hardware acquisition, maintenance

All IT equipment shall be checked once in every quarter and maintained according to the elaborated maintenance plan. Institutions shall always refer to RISA hardware acquisition and maintenance framework contracts.

# Hardware disposal

Following the institution’s disposal committee resolutions regarding digitalization equipment to be disposed, the current electronic devices’ disposal guidelines shall be adhered to.