Recently Updated Pages
End-to-End Security – Lifecycle Protection
Privacy by Design, having been embedded into the system before the first element of information b...
Full Functionality – Positive-Sum, not Zero-Sum
Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum ...
Privacy Embedded into Design
Privacy by Design is embedded into the design and architecture of IT systems and business practic...
Privacy as the Default
Privacy by Design seeks to deliver the maximum degree of privacy by ensuring that personal data a...
Proactive not Reactive; Preventative not Remedial
The Privacy by Design approach is characterized by proactive rather than reactive measures. It an...
Why it's Important to Build in Privacy by Design
Taking a privacy by design approach is an essential tool in minimizing privacy risks and building...
What is Privacy by Design?
Privacy by Design is about creating a consistent framework and approach for proactively embedding...
Scope and objectives
This Privacy by Design (PbD) guideline document outlines a framework to embed privacy considerati...
Introduction
With increased digitization of Government processes and services, significant amounts of data are...
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer ...
Performance monitoring[Mandatory]
Monitor the application's performance. Check the speed, friction in usage and load times for the ...
Security maintenance[Mandatory]
Regular security audits are essential to protect sensitive government data and maintain public tr...
Regular updates[Mandatory]
Monitor the application regularly to check for issues and bugs which should be resolved on a time...
Compatibility to new device versions and software[Mandatory]
Continuously assess compatibility of the app to new versions of Operating systems e.g IOS or Andr...
User support and feedback[Mandatory]
Provide options for users support and feedback within the mobile app where possible.
Monitoring analytics [Mandatory]
Government institutions should apply appropriate analytics tools for monitoring the mobile app to...
Data privacy
Ensuring data privacy for government applications in Rwanda is crucial to complying with Rwanda's...
Security
Least privileges [Mandatory] Mobile applications should be designed with the least privileges on...
Monitoring analytics[Recommended]
Apply appropriate analytics for monitoring the mobile app to gauge engagement and customer behavi...
Branding[Mandatory]
Adhere to Government of Rwanda branding guidelines when designing mobile applications