Recently Updated Pages
Accessibility[Recommended]
Design forms with accessibility in mind, ensuring that all users, including those with disabiliti...
Transparency [Mandatory]
Be transparent about how user data will be used, stored, and shared. Provide a privacy policy or ...
Data privacy [Mandatory]
Ensure data privacy and security by implementing measures to protect user information from unauth...
Inline validation [Mandatory]
Implement inline validation to provide immediate feedback to users as they fill out the form. Hig...
Progress indicators[Recommended]
Use progress indicators or step-by-step guidance to show users where they are in the form complet...
Clear instructions [Mandatory]
Provide clear and concise instructions for each form field to guide users through the data entry ...
Minimizing form fields [Mandatory]
Keep forms concise by only including essential fields necessary for collecting the required infor...
Robustness
Robustness means that software should be compatible with most devices and assistive technologies....
Understandability
Software that is understandable means that the user comprehends both the information it presents ...
Perceivability
An application that is perceivable means that information can be identified by more than one sens...
Operability
Software applications should allow users to perform all the actions necessary to navigate the use...
Scope and objectives
This document provides guidelines that are aimed at ensuring that software applications and digit...
Introduction
Government websites and systems serve as vital conduits between government institutions and the p...
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer ...
Roles and responsibilities
Below are the typical roles in a software project and security responsibilities. These can be adj...
Security user awareness and training and best practices for employees
Security user awareness and training is the process of educating employees about cybersecurity an...
Security incident management
Security incident management is the process of identifying, reporting, analyzing and managing sec...
Minimum security controls for data protection
The following technical measures need to be implemented across government institutions in order t...
Security by default
“Secure-by-Default” means software products should be resilient against prevalent exploitation te...
Upgrade /Decommission
This stage involves retiring or removing a software system from service. The software may then be...