# Procedures, Steps and Standards

# Guidelines on Acceptable Software Use

Government institutions must ensure that all software is used in a lawful, ethical, and secure manner. This section outlines detailed procedures, Do’s, Don’ts, and best practices for software usage within public institutions.

##### **Intended Purpose \[Mandatory\]**

**Procedures:**

- Users must use software applications strictly for their intended work-related purposes.
- Department heads should clearly define acceptable and unacceptable software uses within their units.
- IT departments should monitor software logs to detect non-compliant or unauthorized use.
- Any misuse should be reported immediately to the system administrator or designated ICT officer.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do use government software only for tasks that align with official duties.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t use government software for personal, commercial, or political activities.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Provide annual refresher training on acceptable software use.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr><tr style="mso-yfti-irow: 2;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do follow approved workflows and security policies when using applications.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t upload, store, or process non-official data using government software.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Enforce disciplinary actions for repeated misuse or policy violation.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr><tr style="mso-yfti-irow: 3; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Implement user activity monitoring tools for accountability.</span>

</td></tr></tbody></table>

##### **Licensed Software \[Mandatory\]**

**Procedures:**

- Only install software that has been properly procured and licensed by the institution.
- Maintain an up-to-date software inventory with license information and expiry dates.
- Periodically verify software compliance through license audits.
- Renew licenses before expiry and uninstall any unlicensed software immediately.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra-1" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do read and understand software license agreements before installation.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t install pirated or unapproved software.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Schedule quarterly internal audits to check compliance with licensing policies.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do store purchase and license documentation securely.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t share or copy software installers without authorization.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Engage RISA or the national procurement authority for enterprise-wide licenses when possible.</span>

</td></tr></tbody></table>

##### **Intellectual Property \[Mandatory\]**

**Procedures:**

- Verify ownership or licensing terms before using any third-party or open-source software.
- Acknowledge the developers’ IP when modifying or integrating external code into government projects.
- Ensure that any customization of proprietary software follows contractual agreements.
- Report suspected IP violations immediately to the ICT management or legal department.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra-2" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do respect copyright and patent laws.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t reverse-engineer, copy, or distribute proprietary software.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Establish an IP compliance checklist before system deployment.</span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do use open-source software under approved licenses (e.g: Apache).</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t use cracked or unauthorized versions.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Train IT staff and end-users on recognizing and respecting software IP rights.</span>

</td></tr></tbody></table>

##### **Software Updates \[Mandatory\]**

**Step-by-Step Procedures:**

- The IT department must develop a software update schedule for all critical applications.
- Enable automatic updates for operating systems, antivirus, and productivity tools when feasible.
- For non-automatic systems, conduct monthly patch management sessions.
- Document all updates performed for accountability and auditing.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra-3" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do apply critical security patches as soon as they are released.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t postpone or ignore update notifications.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Test major updates in a controlled environment before deployment to production.</span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do inform users before major updates that may affect system availability.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t install updates from untrusted or unofficial sources.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Maintain rollback plans in case updates cause service disruptions.</span>

</td></tr></tbody></table>

##### **Reporting Violations \[Recommended\]**

**Procedures:**

- Create an internal reporting channel using email, hotline or ticket system for users to report violations.
- Assign an ICT security focal point to receive, log, and act upon reported issues.
- Protect whistleblowers from retaliation and ensure confidentiality.
- Document all incidents, responses, and resolutions.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra-4" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do encourage staff to report suspicious activities promptly.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t ignore minor incidents; report all issues for review.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Integrate violation tracking into the institution’s Service Desk system.</span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do include violation reporting in cybersecurity awareness sessions.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t share violation reports outside official channels.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Conduct post-incident reviews to identify root causes and preventive measures.</span>

</td></tr></tbody></table>

##### **Storage Locations \[Mandatory\]**

**Procedures:**

- Store all government software and data only on officially approved servers, data centers, or cloud platforms.
- Prohibit saving government data on personal USB drives, laptops, or unauthorized devices.
- IT teams must regularly back up software configurations and critical data.
- Apply encryption to data in storage and during transfer.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra-5" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do use secure government-managed repositories for storing software.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t upload software or government data to public storage (e.g: Google Drive, Dropbox) unless officially approved.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Implement a centralized storage policy defining approved locations.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr><tr style="mso-yfti-irow: 2;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do perform scheduled backups and verify data integrity.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t use personal email to transmit installation files or system credentials.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Classify data according to sensitivity levels (public, confidential, restricted).</span>

</td></tr><tr style="mso-yfti-irow: 3; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Periodically review access permissions to storage systems.</span>

</td></tr></tbody></table>

##### **Security Awareness \[Mandatory\]**

**Procedures:**

- Conduct regular security awareness training for all employees and contractors.
- Include modules on phishing, malware prevention, and responsible software use.
- Display reminders on login screens or dashboards about secure usage practices.
- Evaluate user understanding through short quizzes or e-learning modules.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra-6" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do stay alert for phishing emails or suspicious links.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t open attachments from unknown senders.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Incorporate software security awareness into onboarding sessions.</span>

</td></tr><tr style="mso-yfti-irow: 2;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do immediately report any suspected malware or data breach.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t install browser extensions or apps without IT approval.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Reward compliance and positive reporting behavior.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr><tr style="mso-yfti-irow: 3; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Run simulated phishing tests quarterly to reinforce awareness.</span>

</td></tr></tbody></table>

##### **Central Management \[Recommended\]**

**Procedures:**

- All software installations must be performed or approved by the central IT unit.
- Use centralized management tools to deploy and update software across all workstations.
- Regularly synchronize software inventory to detect unauthorized applications.
- Establish an institutional software catalogue of approved and supported applications.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra-7" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do manage all installations from central repositories or IT-managed servers.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t allow staff to install or modify software independently.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Adopt an endpoint management platform (e.g: Ansible).</span>

</td></tr><tr style="mso-yfti-irow: 2;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do enforce standard configurations for uniformity.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t maintain outdated or redundant applications.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Schedule monthly compliance scans to ensure all systems meet software standards.</span>

</td></tr><tr style="mso-yfti-irow: 3; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Maintain centralized logs for auditing and troubleshooting.</span>

</td></tr></tbody></table>

# Guidelines on User Access Management

User Access Management is the process of creating, managing, and securing user accounts on software systems. It ensures that only authorized personnel can access government systems, protects sensitive data, and maintains accountability. This section outlines the mandatory procedures, standards, and best practices that every government institution must follow to manage user access effectively.

##### **Authorized Access \[Mandatory\]**

Ensure that only legitimate, authorized users can access government software applications according to their job roles and responsibilities.

**Step-by-Step Procedures:**

- Define user roles and responsibilities before granting access.
- Submit an Access Request Form approved by the user’s supervisor or department head.
- The IT administrator reviews the request for necessity, role alignment, and risk.
- Access is granted based on the principle of least privilege (users only get access needed to perform their duties).
- Maintain a user access register with details of all users, roles, and permissions.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-practice" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do verify each user’s identity before granting access.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t grant administrative rights unless necessary.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Implement role-based access control (RBAC).</span>

</td></tr><tr style="mso-yfti-irow: 2;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do review access rights periodically (every 3–6 months).</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t approve access requests without written authorization.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Automate access approval and logging through identity management tools.</span>

</td></tr><tr style="mso-yfti-irow: 3; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Require annual user access recertification.</span>

</td></tr></tbody></table>

##### **Termination of User Accounts \[Mandatory\]**

Prevent unauthorized access from former employees, contractors, or temporary users.

**Procedures:**

- HR or department heads must immediately notify the IT department when an employee resigns, transfers, or is terminated.
- IT staff must disable or delete the user account within 24 hours of notification.
- Remove associated access rights, including email, VPN, cloud services, and databases.
- Transfer or archive the user’s data according to the institution’s data retention policy.
- Conduct quarterly audits to detect dormant or unauthorized accounts.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-practice-1" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do confirm account termination with written acknowledgment from HR.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t leave inactive accounts enabled.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Use an automated deprovisioning system linked to HR exit workflows.</span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do maintain a record of all deactivated accounts.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t reuse deleted usernames without clearance.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr></tbody></table>

##### **Third-Party Access \[Mandatory\]**

Ensure that external vendors or partners access government software systems securely and temporarily.

**Procedures:**

- Require third parties to sign a Confidentiality and Non-Disclosure Agreement (NDA).
- Access must be formally requested and approved for a specific purpose and time frame.
- Create a dedicated account for the third party with limited privileges and log all activities.
- Monitor sessions in real time, especially for production environments.
- Disable access immediately after task completion.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-practice-2" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do verify the identity and legitimacy of all third-party users.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t provide administrative credentials.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Use a secure remote access gateway or jump server for vendor sessions.</span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do audit third-party access logs monthly.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t allow shared or unmonitored VPN connections.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr></tbody></table>

##### **Generic or Shared User Accounts \[Mandatory\]**

Maintain accountability by ensuring all actions on systems are traceable to an individual user.

**Procedures:**

- Prohibit creation of shared or generic accounts.
- All users must have unique credentials.
- If a shared account is unavoidable, document who used it, when, and for what purpose.
- Implement enhanced logging and multi-factor authentication (MFA) for such accounts.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-practice-3" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Practice</span>**

</td></tr><tr style="mso-yfti-irow: 1; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do maintain accountability records for exceptional shared access.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t use shared accounts for daily operations</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Integrate systems with centralized directory services (e.g: Active Directory) to enforce identity traceability.</span>

</td></tr></tbody></table>

##### **Securing Login Credentials \[Mandatory\]**

Protect user credentials from unauthorized disclosure or misuse.

**Procedures:**

- Users must create strong passwords according to institutional policy.
- Never write passwords on paper or share them verbally or electronically.
- Change passwords immediately if a breach is suspected.
- IT teams should encrypt passwords in storage and transmission.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-practice-4" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do use password managers approved by the IT department.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t reuse passwords across systems.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Implement automatic password rotation for privileged accounts.</span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do lock your screen when away from your workstation</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t disclose login credentials via email or chat.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr></tbody></table>

##### **Password Policies \[Mandatory\]**

Ensure consistent and secure password management across all systems by following the Standards (based on NIST SP 800-63B):

- Minimum length: 8–12 characters.
- Must include uppercase, lowercase, numbers, and special characters.
- Password expiry: every 90 days (or use continuous monitoring if MFA is enforced).
- Lockout after three (3) failed attempts.

**Procedures:**

- IT administrators configure password policies in all systems.
- Users are informed during onboarding.
- Systems log password change history for auditing.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-practice-5" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Practice</span>**

</td></tr><tr style="mso-yfti-irow: 1; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do encourage use of passphrases.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t force frequent unnecessary password changes (unless a breach occurs).</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Adopt adaptive authentication where risk-based password validation is applied.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr></tbody></table>

##### **Multi-Factor Authentication (MFA) \[Mandatory\]**

Enhance security by requiring more than one factor of authentication.

**Procedures:**

- Implement MFA for all high-privilege accounts and sensitive applications.
- Combine at least two of the following:
- Something you know (password).
- Something you have (security token or code).
- Something you are (biometric trait).
- Provide users with setup guidance and recovery options.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-best-pra" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-size: 11.0pt; line-height: 115%; font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Best practice</span>**

</td></tr><tr style="mso-yfti-irow: 1; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do enforce MFA for VPN, email, and system admin logins.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t allow exceptions without written approval from IT Security.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-size: 11.0pt; line-height: 115%; font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Regularly review and update MFA settings to ensure only authorized users have active access.</span>

</td></tr></tbody></table>

##### **Biometrics \[Recommended\]**

Add an additional layer of user authentication to enhance security and convenience.

**Procedures:**

- Implement biometric authentication (fingerprint, face, or iris recognition) in systems supporting it.
- Ensure compliance with Rwanda’s Data Protection and Privacy Law for biometric data handling.
- Provide alternative authentication for users who opt out of biometrics.
- Store biometric templates securely using encryption and hashing techniques.

<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" id="bkmrk-do%E2%80%99s-don%E2%80%99ts-practice-6" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do’s</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’ts</span>**

</td><td style="width: 155.85pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208">**<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Practice</span>**

</td></tr><tr style="mso-yfti-irow: 1;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do inform users about how their biometric data is used and stored.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Don’t use biometric data for non-authentication purposes.</span>

<span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Combine biometric authentication with MFA for sensitive or high-security systems.</span>

</td></tr><tr style="mso-yfti-irow: 2; mso-yfti-lastrow: yes;"><td style="width: 155.8pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;">Do restrict biometric data access to authorized security personnel only.</span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td><td style="width: 155.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt;" valign="top" width="208"><span style="font-family: 'Times New Roman',serif; mso-font-kerning: 0pt; mso-ligatures: none;"> </span>

</td></tr></tbody></table>