Advanced Search
Search Results
472 total results found
Monitoring analytics [Mandatory]
Government institutions should apply appropriate analytics tools for monitoring the mobile app to gauge user engagement and behaviour. This will facilitate continuous improvement. At the very least, platform analytics should be reported through Apple iTunes Co...
User support and feedback[Mandatory]
Provide options for users support and feedback within the mobile app where possible.
Compatibility to new device versions and software[Mandatory]
Continuously assess compatibility of the app to new versions of Operating systems e.g IOS or Android as well as new versions of mobile devices.
Regular updates[Mandatory]
Monitor the application regularly to check for issues and bugs which should be resolved on a timely basis to ensure continued user satisfaction. Regular updates must be provided to address bugs, enhance features, and adapt to evolving technology standards.
Security maintenance[Mandatory]
Regular security audits are essential to protect sensitive government data and maintain public trust. Regular security updates should be done to address any security issues identified.
Performance monitoring[Mandatory]
Monitor the application's performance. Check the speed, friction in usage and load times for the application and make improvements as required so ensure a smooth user experience.
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer of RISA.
Introduction
With increased digitization of Government processes and services, significant amounts of data are captured and generated including personal data. The protection of personal data is both an ethical and legal obligation as defined by Rwanda's law on protection o...
Scope and objectives
This Privacy by Design (PbD) guideline document outlines a framework to embed privacy considerations throughout all aspects of software development and data management. It applies to all Government institutions in Rwanda as well as their contractors and servic...
What is Privacy by Design?
Privacy by Design is about creating a consistent framework and approach for proactively embedding privacy into the design and operation of IT systems, applications, and business practices by default. Privacy by Design, importantly, isn’t just about securing da...
Why it's Important to Build in Privacy by Design
Taking a privacy by design approach is an essential tool in minimizing privacy risks and building trust. Designing software with privacy in mind at the outset can lead to benefits that include: Build user trust: Privacy by design helps to build trust with u...
Proactive not Reactive; Preventative not Remedial
The Privacy by Design approach is characterized by proactive rather than reactive measures. It anticipates and prevents privacy-invasive events before they happen. Privacy by Design does not wait for privacy risks to materialize, nor does it offer remedies for...
Privacy as the Default
Privacy by Design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice. If an individual does nothing, their privacy remains intact. No action is required on the p...
Privacy Embedded into Design
Privacy by Design is embedded into the design and architecture of IT systems and business practices. It is not bolted on as an add-on, after the fact. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy ...
Full Functionality – Positive-Sum, not Zero-Sum
Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. Privacy by Design avoids the pretense of false dichotomies, such a...
End-to-End Security – Lifecycle Protection
Privacy by Design, having been embedded into the system before the first element of information being collected, extends securely throughout the entire lifecycle of the data involved — strong security measures are essential to privacy, from start to finish. Th...
Visibility and Transparency
Privacy by Design seeks to assure all stakeholders that whatever the business practice or technology involved, it is operating according to the stated promises and objectives, subject to independent verification. Its component parts and operations remain visib...
Respect for User Privacy
Above all, Privacy by Design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options. Keep it user-centric!The best Priva...
Requirements Gathering and Analysis
Define privacy requirements [Mandatory] - Identify and document privacy requirements based on best practices, applicable laws and regulations. For example, Rwanda’s law on data protection and privacy requires institutions to implement appropriate technical a...
Design
Privacy design principles [Mandatory] - Apply privacy principles such as data minimization, purpose limitation, and user consent by design. Privacy enhancing technology [Recommended] - Implement privacy-enhancing technologies (PETs) such as encryption, anon...