Advanced Search
Search Results
520 total results found
Submission of annual ICT procurement plan to RISA
ICT procurement plans: all government institutions should consolidate and share with RISA at centralizedprocurement@risa.gov.rw their ICT procurement plans on yearly basis in accordance to the government planning cycle. RISA compiles and harmonizes submitted...
ICT centralized procurement
Centralized hardware procurement − On yearly basis, RISA selects commonly procured ICT items from submitted institutional ICT procurement plans.− RISA sets technical specifications based on government needs and technologytrend.− RISA initiates annual cent...
Decentralized ICT tenders
Procurement process: institutions should obtain approval from RISA to initiate anyICT procurement process Relevance of the hardware/software item: RISA shall confirm the to be acquired based on submitted ICT gap analysis and ICT gap bridging roadmap in refe...
Development vs acquisition of software
Decision to acquire or develop the software: government institutions should seek advice from RISA about the acquiring or developing the software.The below criteria should be based on in order to take a decision between acquisition anddevelopment: Government...
Minimum requirements to determine the best solution
Total lifecycle cost: including initial cost, installation, training, and recurrent cost for maintenance and support. Maintainability: the ease of how (cost and effort) the software can be modified tocorrect faults, improve performance or other attribute or...
Internet bandwidth procurement
Internet services: government institutions should source all their internet services (4G internet and Fiber Internet connection) needs through the established framework as per the March 2012 ministerial instructions. (See annex) Bandwidth capacity to be pur...
Procurement of hosting and cloud services
Hosting and cloud services: government institutions should source all their hosting needs through the established framework asper the March 2012 ministerial instructions.Government entities sign individual contracts with the provider and a sample contracts as ...
Consequences of Non-Complience
Non-compliance of these guidelines may lead to disciplinary actions, where the individual will stand for all risks and damage caused by not implementing these guidelines. Exceptions to these guidelines shall be allowed only if approved by RISA.
Document Review Cycle
RISA shall review these guidelines annually or when deemed necessary to address new issues arising from the use of IT systems and emerging technology trends in the industry. IT department in every government institution shall investigate and follow-up on repor...
References
Guideline on minimum Bandwidth for Broadband Internet Connectivity in Rwanda Directives on Cyber Security for Network and Information System
Introduction
Business continuity Management (BCM) is a planning and management discipline through which organizations design, implement and maintain measures, plans and strategies which are effective to manage crisis, respond to/ recover from a disaster; This start with an...
Business Continuity (BC) And Disaster Recovery (DR)
BC includes DR and DR requires guidance from BC, to direct priorities and set scope. Figure 1: Business continuity and Disaster recovery BUSINESS CONTINUITY (BC) DISASTER RECOVERY(DR) OBJECTIVE: Build resilience OBJECTIVE: Build ...
Business Continuity Management (BCM) Lifecycle
Business continuity management (BCM) is centred around a BCM lifecycle that consists of following phases: Figure 2: Business Continuity Management Lifecycle Identification: Assets Inventory And Risk Assessment This phase is a starting point of BC...
Introduction
The purpose of these guidelines is to help public entities and GoR’s private partners to have a common understanding of EA practice and to guide the systematic mapping of the institution’s IT landscape (Blueprint) in clear steps namely: the ASIS situation, the...
Reference Documents
For full guidance and overall context purpose, this document should be read in conjunction with the following documents: Government of Rwanda Enterprise Architecture Governance: This document outlines the governance structure around enterprise architecture wi...
Compliance
One of the key benefits for establishing an institution’s blueprint is to ensure the right selection and right scoping of IT projects, making clear the direct linkage between the IT project and the institution’s business requirements. The blueprint also serves...
Mainly Confronted Disasters in Rwanda and Management
BCM is a planning that extends well beyond IT function, it looks at everything that might cause interruption or losses in our business in order to provide effectives strategies for protecting our infrastructure, environment on which our business operations and...
Blueprint Development Guidelines
For ease of consultation these guidelines are provided in the form of diagrams organized in the following flow: 1. EA Development Value Chain 2. Business Requirements Analysis 2.1. Understand Business Requirements and Value Drivers2.2. Confirm Scope and App...
IT- Disaster Recovery for a Business Continuity
IT disaster recovery consists of developing step-by-step procedures for a full recovery, disaster avoidance and business continuity. When many think about DR, they usually think about Backup, while it is only one piece in BC-DR puzzle and inefficien...