Advanced Search
Search Results
739 total results found
Protecting Intellectual Property
Government software may contain proprietary algorithms, code, or technologies developed for specific government purposes. Some of the software may also be licensed with specific restrictions that should be complied with. Controlling access helps protect these ...
Scope and Objectives
To ensure that all Government of Rwanda websites follow a consistent, professional, and user-focused approach to design and content management. By adhering to these standards, institutions will achieve the following benefits: Consistency and BrandingMaintain ...
Centralized Government Portal
Hosting Government institutions must utilize hosting services that meet the highest standards of security, reliability, and regulatory compliance, in full adherence to the Law on Data Protection and Privacy in Rwanda. To promote compliance, standardization, ...
Objectives
These guidelines aim at providing a uniform framework for the design, configuration and management of ICT across government institutions in Rwanda in order to: Harmonize and ensure maximum security Improve and conform to best ICT practices and standards E...
Benefits
Adoption of these guidelines will allow government institutions to: Have high quality and reliable ICT environment Efficiently deliver government services Remove duplications and reduce cost related to ICT operation Enable scale up and easy integration o...
Scope
These guidelines are expected to be strictly adhered to by all government institutions including institutions at central and local government as well as all their affiliated agencies and parastatals. They cover areas including network infrastructure, hardware ...
Principles
These ICT Implementation guidelines will be used as best practices for ICT deployment. Regular ICT audits will be conducted periodically by RISA to ensure compliance and enforcement. All institutions should have individual 3 years ICT strategic plans that ...
Network Design
Number of users in the institution: identify the number of network users both onsite and offsite. Services accessed or offered by the institution: services should be defined andcategorized depending on processes and availability requirements Broadband tech...
Network Implementation
Network equipment: network equipment and devices comprising the core network infrastructure to provide connectivity and security features include rack, minimum routers, switches, and access points, as well as a firewall. Network cabling, labeling and physic...
Network Management
Network performance: redundancy, load balancing, application response time, and quality of service should be controlled and assured. Network maintenance: each institution should elaborate a network maintenanceplan, together with the disaster recovery and bu...
Services
Government institutions are required to host all government data in the National Data Center (NDC) as per the Ministerial instruction in March 2012). However in case of colocation, institutions may rent space for servers and other computing hardware at the Dat...
Computers and Communication devices
The following are the minimum requirements that shall guide Government institutions during the acquisition of computers and communication devices for office use or any other administrative purpose. However, the detailed technical specifications are found in th...
Power Supply and backup
The computer network infrastructure at the institutional premises should have main power supply and power backup battery. General specifications are provided in the framework contract that governs the acquisition of the computer devices and related power suppl...
Scanners and printers
Government institutions are recommended to acquire printing, scanning and copying as services instead of procuring, operating and maintaining printers, scanners and copiers. Institutions’ system administrators should have control usage and ensure access creden...
End-use equipment
User devices: institutional devices used by employees should be labeled and recorded. Proper naming should be done, in accordance to advised network set up. They should not be used to illegally process, distribute, or store any data protected by copyright of...
Hardware maintenance
Maintenance plan: All IT equipment should be checked once in every quarter, and maintained according to the elaborated maintenance plan. Maintenance contract with equipment supplier: After the warranty period, there should be agreements with equipment supplie...
Software applications
Architectural model for e-government applications: all systems should be documented in five viewpoints including the enterprise viewpoint (describe purpose, scope and processes), the information viewpoint (determines the structure and semantics of the system...
Data
Data availability: Data should be available round the clock (24-hour access) to access from different time zones. Data creation: single point of capture, duplication of data capture should be avoided as much as possible. Standardization of shared data: sho...
Password Protection
Password should not be written down on paper; Password should not be sent through email, Password should not be included in a non-encrypted stored document, Password should not be revealed over the phone, Password should not be revealed or hinted on a...
Email Accounts
Official Government of Rwanda (GoR) employees as well as administrative visitors of departments must request for a generic user account to facilitate operations and communications. A request must be made to IT departments. Generic accounts created are not to b...