Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

71 total results found

Password Management

PKI Service Integration Guidelines (For...

Objective: Ensure secure handling of user certificate passwords. Guidelines: Do not store user certificate passwords in the database or on any easily accessible file. It is the user responsibility to ensure the password protection Use HTTPS to encrypt d...

Timestamp Validation (Optional)

PKI Service Integration Guidelines (For...

Objective:  Validate the timestamps associated with digital signatures to ensure their reliability and time synchronization. Guidelines: Use a trusted Time Stamping Authority (TSA) to provide accurate and synchronized timestamps for digital signatures. T...

Objectives

Digital Adoption Implementation Guideli... Introduction

These guidelines aim at providing a uniform framework for the design, configuration, and management of digitalization across government institutions in Rwanda to: Harmonize and ensure security and protection of critical systems, infrastructure, data and inf...

Benefits

Digital Adoption Implementation Guideli... Introduction

Adoption of these guidelines will allow government institutions to: Have a high quality and reliable work environment. Efficiently deliver government services to citizens.  Remove duplication and reduce costs related to digitalization operations. Enable ...

Scope

Digital Adoption Implementation Guideli... Introduction

These guidelines shall be strictly adhered to by all government institutions, including institutions at central and local government as well as all their affiliated agencies and parastatals.They cover areas including network infrastructure, hardware and end-us...

Principles

Digital Adoption Implementation Guideli...

These digitalization implementation guidelines shall be used as best practices for digitalization deployment. Digitalization offices shall submit sector level compliance reports annually as an assessment tool to evaluate enforcement of these guidelines. Al...

Network design

Digital Adoption Implementation Guideli... Network and Communication Infrastructure

The following parameters shall be based on while designing institution network:  Number of users in the institution: The number of network users shall be both employees and guests. Services accessed or offered by the institution: Services shall be defined ...

Network Implementation

Digital Adoption Implementation Guideli... Network and Communication Infrastructure

 Network equipment: The network equipment and devices comprising the core network infrastructure to provide connectivity and security features shall among others include a rack, minimum routers, switches, and access points, as well as a firewall. Network ca...

Network Management

Digital Adoption Implementation Guideli... Network and Communication Infrastructure

Network performance: Redundancy, load balancing, application response time, and quality of service shall be controlled and assured. Network maintenance: Each institution shall elaborate a network maintenance plan together with the disaster recovery (DR), bu...

User devices

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Institutional devices used by employees shall be labeled (tagged), recorded and proper naming shall be done. They shall not be used to illegally process, distribute, or store any data protected by copyright of intellectual property. These devices shall not be ...

Precaution measures

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Offices with digitalization equipment shall be locked to prevent theft and other risks. Digitalization equipment shall not be placed next to air conditioners as humidity and heat can shorten the life of internal components. Users shall not eat, drink or sm...

Stolen computers

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

In case of a stolen computer, the user shall immediately report to the supervisor and to Rwanda investigation bureau (RIB) and to the administrator in charge. Institution’s rules and regulations governing loss of public properties shall be applied.

User responsibilities

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Users shall ensure proper use of digitalization equipment in accordance with all provisions of these guidelines. Users are required to report any misuse or potential threats to digitalization equipment. It is the user’s responsibility to seek guidance when...

Hardware acquisition, maintenance

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

All IT equipment shall be checked once in every quarter and maintained according to the elaborated maintenance plan.  Institutions shall always refer to RISA hardware acquisition and maintenance framework contracts.

Hardware disposal

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Following the institution’s disposal committee resolutions regarding digitalization equipment to be disposed, the current electronic devices’ disposal guidelines shall be adhered to.

Software applications

Digital Adoption Implementation Guideli... Software Applications and Data

Architectural model for e-government applications: All systems shall be documented in five viewpoints including the enterprise viewpoint (describing purpose, scope and processes), the information viewpoint (determining the structure and semantics of the syst...

Data

Digital Adoption Implementation Guideli... Software Applications and Data

Data produced or collected by government institutions is necessary for measuring effectiveness and developing public services. In that sense, institutions are expected to perform the following: Data discovery and metadata capture. Search and filtering. Bu...

Business Continuity (BC) and Disaster Recovery (DR)

Digital Adoption Implementation Guideli... Software Applications and Data

Business continuity management is a planning and holistic management through which institutions create and implement measures, strategies and plans which are effective to manage crises, respond to/ and recover from a disaster. Business continuity is more than...

User collaboration and email service

Digital Adoption Implementation Guideli... System Administration

All Public institutions are obliged to encourage and make sure that all employees own official work emails and to collaborate online using official and well tested channels such as for video conferencing or document handling and transfer. All employees shal...

Password Policy

Digital Adoption Implementation Guideli... System Administration

The following are minimum requirements to create as well as protecting password: The length of a password is 10 characters and shall comprise at least 2 lowercase, 2 uppercase, numbers, and special characters such as ! @ # $ {} : ” > ? <; Password shall no...