Recently Updated Pages
System access and authorization
All corporate computers shall be joined to the Active Directory-Domain Controller for proper ma...
Email Accounts
All employees shall use corporate emails for any official communication. Email accounts belong...
Password Policy
The following are minimum requirements to create as well as protecting password: The length of...
User collaboration and email service
All Public institutions are obliged to encourage and make sure that all employees own official ...
Business Continuity (BC) and Disaster Recovery (DR)
Business continuity management is a planning and holistic management through which institutions c...
Data
Data produced or collected by government institutions is necessary for measuring effectiveness an...
Software applications
Architectural model for e-government applications: All systems shall be documented in five view...
Timestamp Validation (Optional)
Objective: Validate the timestamps associated with digital signatures to ensure their reliabili...
Main Strategies for Disposal of Old It Equipment
Reference is made to Ministerial order n° 007/2009 of 01/12/2009 determining the institution and ...
Main Phases for Disposal of Old It Equipment
Sufficient thought and analysis must be carried out in advance to all aspects of old equipment di...
Main Strategies for Disposal of Old It Equipment
Reference is made to Ministerial order n° 007/2009 of 01/12/2009 determining the institution and ...
Digitalization project implementation
The agile mode of implementation which allows visibility of project details and ability to manage...
Digitalization project documentation
Proper documentations of all digitalization projects across the government shall include the back...
Digitalization project initiation
All digitalization projects shall be derived from the assessment as indicated in the above sectio...
Supply Chain Risk Management
In collaboration with a competent authority where applicable, the institution shall establish a...
Contingency Planning
The institution shall ensure that backup copies of data, software and system images are regular...
System and Communications Protection
The institution shall monitor, control, and protect communications (i.e., information transmitt...
Risk Assessment
The institution shall periodically (at least once a year) assess the risk to institutional operat...
Media Protection
The institution shall protect (i.e., physically control and securely store) system media contai...
Maintenance
The institution shall perform maintenance on institutional digitalization systems. The institu...