Advanced Search
Search Results
71 total results found
Password Management
Objective: Ensure secure handling of user certificate passwords. Guidelines: Do not store user certificate passwords in the database or on any easily accessible file. It is the user responsibility to ensure the password protection Use HTTPS to encrypt d...
Timestamp Validation (Optional)
Objective: Validate the timestamps associated with digital signatures to ensure their reliability and time synchronization. Guidelines: Use a trusted Time Stamping Authority (TSA) to provide accurate and synchronized timestamps for digital signatures. T...
Objectives
These guidelines aim at providing a uniform framework for the design, configuration, and management of digitalization across government institutions in Rwanda to: Harmonize and ensure security and protection of critical systems, infrastructure, data and inf...
Benefits
Adoption of these guidelines will allow government institutions to: Have a high quality and reliable work environment. Efficiently deliver government services to citizens. Remove duplication and reduce costs related to digitalization operations. Enable ...
Scope
These guidelines shall be strictly adhered to by all government institutions, including institutions at central and local government as well as all their affiliated agencies and parastatals.They cover areas including network infrastructure, hardware and end-us...
Principles
These digitalization implementation guidelines shall be used as best practices for digitalization deployment. Digitalization offices shall submit sector level compliance reports annually as an assessment tool to evaluate enforcement of these guidelines. Al...
Network design
The following parameters shall be based on while designing institution network: Number of users in the institution: The number of network users shall be both employees and guests. Services accessed or offered by the institution: Services shall be defined ...
Network Implementation
Network equipment: The network equipment and devices comprising the core network infrastructure to provide connectivity and security features shall among others include a rack, minimum routers, switches, and access points, as well as a firewall. Network ca...
Network Management
Network performance: Redundancy, load balancing, application response time, and quality of service shall be controlled and assured. Network maintenance: Each institution shall elaborate a network maintenance plan together with the disaster recovery (DR), bu...
User devices
Institutional devices used by employees shall be labeled (tagged), recorded and proper naming shall be done. They shall not be used to illegally process, distribute, or store any data protected by copyright of intellectual property. These devices shall not be ...
Precaution measures
Offices with digitalization equipment shall be locked to prevent theft and other risks. Digitalization equipment shall not be placed next to air conditioners as humidity and heat can shorten the life of internal components. Users shall not eat, drink or sm...
Stolen computers
In case of a stolen computer, the user shall immediately report to the supervisor and to Rwanda investigation bureau (RIB) and to the administrator in charge. Institution’s rules and regulations governing loss of public properties shall be applied.
User responsibilities
Users shall ensure proper use of digitalization equipment in accordance with all provisions of these guidelines. Users are required to report any misuse or potential threats to digitalization equipment. It is the user’s responsibility to seek guidance when...
Hardware acquisition, maintenance
All IT equipment shall be checked once in every quarter and maintained according to the elaborated maintenance plan. Institutions shall always refer to RISA hardware acquisition and maintenance framework contracts.
Hardware disposal
Following the institution’s disposal committee resolutions regarding digitalization equipment to be disposed, the current electronic devices’ disposal guidelines shall be adhered to.
Software applications
Architectural model for e-government applications: All systems shall be documented in five viewpoints including the enterprise viewpoint (describing purpose, scope and processes), the information viewpoint (determining the structure and semantics of the syst...
Data
Data produced or collected by government institutions is necessary for measuring effectiveness and developing public services. In that sense, institutions are expected to perform the following: Data discovery and metadata capture. Search and filtering. Bu...
Business Continuity (BC) and Disaster Recovery (DR)
Business continuity management is a planning and holistic management through which institutions create and implement measures, strategies and plans which are effective to manage crises, respond to/ and recover from a disaster. Business continuity is more than...
User collaboration and email service
All Public institutions are obliged to encourage and make sure that all employees own official work emails and to collaborate online using official and well tested channels such as for video conferencing or document handling and transfer. All employees shal...
Password Policy
The following are minimum requirements to create as well as protecting password: The length of a password is 10 characters and shall comprise at least 2 lowercase, 2 uppercase, numbers, and special characters such as ! @ # $ {} : ” > ? <; Password shall no...