Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

217 total results found

Data migration documentation [Mandatory]

Software Technical Documentation Product documentation

Data migration documentation is required when a software project involves moving data from a legacy software system to the new software system. It can also include moving data from manual files or spreadsheets to the new system. Types of data migration documen...

User documentation [Mandatory]

Software Technical Documentation Product documentation

This documentation is created for end-users and should explain in the simplest way possible how users can effectively use the software. User documentation provides an overview of the product’s functionality and gives basic guidelines on how to use it. The docu...

Software configuration and maintenance documentation [Mandatory]

Software Technical Documentation Product documentation

Software maintenance and configuration document  is a  document that provides key information required to effectively maintain the software. It includes the configurations required for the software including security settings, installation instructions, versio...

Certificate Revocation

PKI Service Integration Guidelines (For...

Objective: Ensure your system correctly performs the certificate validity check. Guidelines:  The deployed system should be able to checks the certificate validity i.e. to check if the certificate is not revoked. Two protocols are used: OCSP (Online Ce...

Certificate Expiration

PKI Service Integration Guidelines (For...

Objective  Prevent the use of expired certificates in your system. Guidelines Automatically check the certificates validity period during the validation process. Ensure that expired certificates are not accepted by the system for any operation. The user...

Signature Validation

PKI Service Integration Guidelines (For...

Objective: Validate the authenticity and integrity of digital signatures, including Long-Term Validation (LTV) or Time-based validity. Guidelines: Implement validation mechanisms to verify digital signatures against trusted certificates. Enable Long-Term...

Password Management

PKI Service Integration Guidelines (For...

Objective: Ensure secure handling of user certificate passwords. Guidelines: Do not store user certificate passwords in the database or on any easily accessible file. It is the user responsibility to ensure the password protection Use HTTPS to encrypt d...

Timestamp Validation (Optional)

PKI Service Integration Guidelines (For...

Objective:  Validate the timestamps associated with digital signatures to ensure their reliability and time synchronization. Guidelines: Use a trusted Time Stamping Authority (TSA) to provide accurate and synchronized timestamps for digital signatures. T...

Objectives

Digital Adoption Implementation Guideli... Introduction

These guidelines aim at providing a uniform framework for the design, configuration, and management of digitalization across government institutions in Rwanda to: Harmonize and ensure security and protection of critical systems, infrastructure, data and inf...

Benefits

Digital Adoption Implementation Guideli... Introduction

Adoption of these guidelines will allow government institutions to: Have a high quality and reliable work environment. Efficiently deliver government services to citizens.  Remove duplication and reduce costs related to digitalization operations. Enable ...

Scope

Digital Adoption Implementation Guideli... Introduction

These guidelines shall be strictly adhered to by all government institutions, including institutions at central and local government as well as all their affiliated agencies and parastatals.They cover areas including network infrastructure, hardware and end-us...

Principles

Digital Adoption Implementation Guideli...

These digitalization implementation guidelines shall be used as best practices for digitalization deployment. Digitalization offices shall submit sector level compliance reports annually as an assessment tool to evaluate enforcement of these guidelines. Al...

Network design

Digital Adoption Implementation Guideli... Network and Communication Infrastructure

The following parameters shall be based on while designing institution network:  Number of users in the institution: The number of network users shall be both employees and guests. Services accessed or offered by the institution: Services shall be defined ...

Network Implementation

Digital Adoption Implementation Guideli... Network and Communication Infrastructure

 Network equipment: The network equipment and devices comprising the core network infrastructure to provide connectivity and security features shall among others include a rack, minimum routers, switches, and access points, as well as a firewall. Network ca...

Network Management

Digital Adoption Implementation Guideli... Network and Communication Infrastructure

Network performance: Redundancy, load balancing, application response time, and quality of service shall be controlled and assured. Network maintenance: Each institution shall elaborate a network maintenance plan together with the disaster recovery (DR), bu...

User devices

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Institutional devices used by employees shall be labeled (tagged), recorded and proper naming shall be done. They shall not be used to illegally process, distribute, or store any data protected by copyright of intellectual property. These devices shall not be ...

Precaution measures

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Offices with digitalization equipment shall be locked to prevent theft and other risks. Digitalization equipment shall not be placed next to air conditioners as humidity and heat can shorten the life of internal components. Users shall not eat, drink or sm...

Stolen computers

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

In case of a stolen computer, the user shall immediately report to the supervisor and to Rwanda investigation bureau (RIB) and to the administrator in charge. Institution’s rules and regulations governing loss of public properties shall be applied.

User responsibilities

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Users shall ensure proper use of digitalization equipment in accordance with all provisions of these guidelines. Users are required to report any misuse or potential threats to digitalization equipment. It is the user’s responsibility to seek guidance when...

Hardware acquisition, maintenance

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

All IT equipment shall be checked once in every quarter and maintained according to the elaborated maintenance plan.  Institutions shall always refer to RISA hardware acquisition and maintenance framework contracts.