Search

Advanced Search

GIGW Workshop at NIC Delhi on 12 August 2013

Lokesh Joshi, Delhi lokesh[at]nic[dot]in
  |   Aug 13, 2013
DG addressing the participants
DG addressing the participants

GIGW Workshop
GIGW Workshop

NIC has developed “Guidelines for Indian Government websites” (GIGW) as an initiative under the National Portal of India Project. These guidelines aim at achieving the objective of making the Indian Government websites comply with the essential pre-requisites of UUU Trilogy i.e; Usable, User-Centric and Universally Accessible and follow the best practices over the entire lifecycle of website, web portal and web application right from its conceptualization, design, development and management.

These guidelines have been adopted by Department of Administrative Reforms and Public Grievance (DARPG) and are an integral part of the Central Secretariat Manual of Office Procedure (CSMOP).

To facilitate early compliance, a workshop was organized on Guidelines (GIGW)  at  NIC (convention Hall) on 12th August, 2013 for the Website Nodal Officers of the Ministries/Departments and the concerned NIC officials.

DG, NIC Shri A Mohan, in his inaugural address shared with the gathering how as early as 1994, NIC had begun assisting Government of India organizations with website development and hosting activities. Further, being a pioneer, NIC had ingrained into its blood website development finesse, and the time was now ripe to use all resources available to ensure government websites complied with GIGW guidelines.

Mrs. Neeta Verma, DDG, Data Center & Web Services Division, addressed the audience next, and explained how the trifurcation of responsibilities could help in ensuring early compliance with GIGW guidelines:

  1. Government departments
  2. Developers
  3. Hosting Service Provider

Further, she detailed how Government websites developers could expedite early compliance with GIGW guidelines by adopting frameworks, platforms & open source / proprietary Content Management Systems (CMS) having compliance inbuilt in its features & workflows.

Participants actively engaged in the 4 hour-long workshops to understand how best practices could be followed, templates could be customized, and tools listed on the http://web.guidelines.gov.in/tools.php could be used to test & thereafter expedite and ensure compliance with GIGW guidelines.

  

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...