Advanced Search
Search Results
285 total results found
Perceivability
An application that is perceivable means that information can be identified by more than one sense. Some of the recommended practices to ensure perceivability are listed below. Text alternatives [Recommended] Text alternatives should describe non-text conten...
Operability
Software applications should allow users to perform all the actions necessary to navigate the user interface. Navigation should be seamless via all methods, such as the mouse, arrow keys and trackpad. When software is operable, it facilitates the use of assist...
Understandability
Software that is understandable means that the user comprehends both the information it presents and the requirements for operation. Some of the practices to make software understandable include: Use plain language [Mandatory] Write content in plain language...
Robustness
Robustness means that software should be compatible with most devices and assistive technologies. Robust software adapts to ensure content is accessible as technologies evolve. Key practices include: Responsive design [Mandatory] Ensure that government webs...
Minimizing form fields [Mandatory]
Keep forms concise by only including essential fields necessary for collecting the required information. Minimizing form fields reduces user effort and completion time, improving the overall user experience.
Clear instructions [Mandatory]
Provide clear and concise instructions for each form field to guide users through the data entry process. Clearly explain what information is required and how it should be formatted to reduce errors and ensure accurate data collection.
Progress indicators[Recommended]
Use progress indicators or step-by-step guidance to show users where they are in the form completion process and how much progress they have made. Progress indicators help users understand the scope of the form and encourage them to continue through the comple...
Inline validation [Mandatory]
Implement inline validation to provide immediate feedback to users as they fill out the form. Highlight any errors or formatting issues in real-time, allowing users to correct mistakes before submitting the form.
Data privacy [Mandatory]
Ensure data privacy and security by implementing measures to protect user information from unauthorized access or disclosure. Use encryption protocols, secure server connections, and data encryption techniques to safeguard sensitive data collected through form...
Transparency [Mandatory]
Be transparent about how user data will be used, stored, and shared. Provide a privacy policy or data usage statement that clearly outlines the purposes for collecting data and the steps taken to protect user privacy.
Accessibility[Recommended]
Design forms with accessibility in mind, ensuring that all users, including those with disabilities, can easily interact with and complete the form. Use accessible form elements, provide alternatives for visual content, and follow accessibility guidelines to e...
Guidelines for Designing Government Websites for Different Devices
Responsive Design [Mandatory] Adopt a responsive design approach that allows government websites to adapt and display optimally on various devices, including desktops, laptops, tablets, and smartphones. Responsive design ensures that content remains accessibl...
Responsive Design Techniques and Considerations for Mobile Users
Media Queries[Recommended] Use CSS media queries to apply different styles based on the characteristics of the device, such as screen width, resolution, and orientation. Media queries allow designers to create adaptive layouts and customize the presentation o...
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer of RISA.
Project plan and schedules [Mandatory]
Project plans and schedules are usually created before the project starts and are continuously updated during the software development process. A project plan defines the project’s scope, schedule, deliverables, milestones and tasks and may take different form...
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer of RISA.a
Introduction
Government software plays a pivotal role in facilitating efficient operations and serving the public interest. Government software should be used responsibly and ethically to ensure integrity of software systems, safeguard sensitive data and uphold the public ...
Security
Government software often handles sensitive information, including personal data of citizens, classified documents, and critical infrastructure data. Controlling access helps mitigate the risk of unauthorized access, data breaches, and cyberattacks that could ...
Data Protection and Privacy
Government software may contain confidential or personally identifiable information (PII) that must be protected according to privacy regulations. By controlling access, government agencies can ensure that only authorized personnel with a legitimate need to ac...
Preventing unauthorized modifications
Government software systems may include critical functions and processes that, if tampered with or modified by unauthorized users, could disrupt operations or compromise the integrity of government services. By controlling access, agencies can prevent unauthor...