Guidelines on Acceptable Software Use
Government institutions must ensure that all software is used in a lawful, ethical, and secure manner. This section outlines detailed procedures, Do’s, Don’ts, and best practices for software usage within public institutions.
Intended Purpose [Mandatory]
Procedures:
- Users must use software applications strictly for their intended work-related purposes.
- Department heads should clearly define acceptable and unacceptable software uses within their units.
- IT departments should monitor software logs to detect non-compliant or unauthorized use.
- Any misuse should be reported immediately to the system administrator or designated ICT officer.
|
Do’s |
Don’ts |
Best practice |
|
Do use government software only for tasks that align with official duties.
|
Don’t use government software for personal, commercial, or political activities. |
Provide annual refresher training on acceptable software use.
|
|
Do follow approved workflows and security policies when using applications. |
Don’t upload, store, or process non-official data using government software.
|
Enforce disciplinary actions for repeated misuse or policy violation.
|
|
|
|
Implement user activity monitoring tools for accountability. |
Licensed Software [Mandatory]
Procedures:
- Only install software that has been properly procured and licensed by the institution.
- Maintain an up-to-date software inventory with license information and expiry dates.
- Periodically verify software compliance through license audits.
- Renew licenses before expiry and uninstall any unlicensed software immediately.
|
Do’s |
Don’ts |
Best practice |
|
Do read and understand software license agreements before installation. |
Don’t install pirated or unapproved software.
|
Schedule quarterly internal audits to check compliance with licensing policies.
|
|
Do store purchase and license documentation securely.
|
Don’t share or copy software installers without authorization.
|
Engage RISA or the national procurement authority for enterprise-wide licenses when possible. |
Intellectual Property [Mandatory]
Procedures:
- Verify ownership or licensing terms before using any third-party or open-source software.
- Acknowledge the developers’ IP when modifying or integrating external code into government projects.
- Ensure that any customization of proprietary software follows contractual agreements.
- Report suspected IP violations immediately to the ICT management or legal department.
|
Do’s |
Don’ts |
Best practice |
|
Do respect copyright and patent laws.
|
Don’t reverse-engineer, copy, or distribute proprietary software. |
Establish an IP compliance checklist before system deployment. |
|
Do use open-source software under approved licenses (e.g: Apache). |
Don’t use cracked or unauthorized versions.
|
Train IT staff and end-users on recognizing and respecting software IP rights. |
Software Updates [Mandatory]
Step-by-Step Procedures:
- The IT department must develop a software update schedule for all critical applications.
- Enable automatic updates for operating systems, antivirus, and productivity tools when feasible.
- For non-automatic systems, conduct monthly patch management sessions.
- Document all updates performed for accountability and auditing.
|
Do’s |
Don’ts |
Best practice |
|
Do apply critical security patches as soon as they are released.
|
Don’t postpone or ignore update notifications.
|
Test major updates in a controlled environment before deployment to production. |
|
Do inform users before major updates that may affect system availability. |
Don’t install updates from untrusted or unofficial sources. |
Maintain rollback plans in case updates cause service disruptions. |
Reporting Violations [Recommended]
Procedures:
- Create an internal reporting channel using email, hotline or ticket system for users to report violations.
- Assign an ICT security focal point to receive, log, and act upon reported issues.
- Protect whistleblowers from retaliation and ensure confidentiality.
- Document all incidents, responses, and resolutions.
|
Do’s |
Don’ts |
Best practice |
|
Do encourage staff to report suspicious activities promptly. |
Don’t ignore minor incidents; report all issues for review.
|
Integrate violation tracking into the institution’s Service Desk system. |
|
Do include violation reporting in cybersecurity awareness sessions.
|
Don’t share violation reports outside official channels.
|
Conduct post-incident reviews to identify root causes and preventive measures. |
Storage Locations [Mandatory]
Procedures:
- Store all government software and data only on officially approved servers, data centers, or cloud platforms.
- Prohibit saving government data on personal USB drives, laptops, or unauthorized devices.
- IT teams must regularly back up software configurations and critical data.
- Apply encryption to data in storage and during transfer.
|
Do’s |
Don’ts |
Best practice |
|
Do use secure government-managed repositories for storing software.
|
Don’t upload software or government data to public storage (e.g: Google Drive, Dropbox) unless officially approved. |
Implement a centralized storage policy defining approved locations.
|
|
Do perform scheduled backups and verify data integrity. |
Don’t use personal email to transmit installation files or system credentials. |
Classify data according to sensitivity levels (public, confidential, restricted). |
|
|
|
Periodically review access permissions to storage systems. |
Security Awareness [Mandatory]
Procedures:
- Conduct regular security awareness training for all employees and contractors.
- Include modules on phishing, malware prevention, and responsible software use.
- Display reminders on login screens or dashboards about secure usage practices.
- Evaluate user understanding through short quizzes or e-learning modules.
|
Do’s |
Don’ts |
Best practice |
|
Do stay alert for phishing emails or suspicious links.
|
Don’t open attachments from unknown senders.
|
Incorporate software security awareness into onboarding sessions. |
|
Do immediately report any suspected malware or data breach. |
Don’t install browser extensions or apps without IT approval. |
Reward compliance and positive reporting behavior.
|
|
|
|
Run simulated phishing tests quarterly to reinforce awareness. |
Central Management [Recommended]
Procedures:
- All software installations must be performed or approved by the central IT unit.
- Use centralized management tools to deploy and update software across all workstations.
- Regularly synchronize software inventory to detect unauthorized applications.
- Establish an institutional software catalogue of approved and supported applications.
|
Do’s |
Don’ts |
Best practice |
|
Do manage all installations from central repositories or IT-managed servers. |
Don’t allow staff to install or modify software independently. |
Adopt an endpoint management platform (e.g: Ansible). |
|
Do enforce standard configurations for uniformity.
|
Don’t maintain outdated or redundant applications.
|
Schedule monthly compliance scans to ensure all systems meet software standards. |
|
|
|
Maintain centralized logs for auditing and troubleshooting. |
No Comments