Search results for legislation as code
-
Collaboration, co-funded development and a new document management module
Found in Blog / Published 06 July 2017 / By Paul Murray ,
In 2015, MPI took the SilverStripe Document Management System (DMS) and extended it to better suit their needs. With thousands of documents to manage and varying permission structures to factor in, it was important for them to have additional document management functionality.
With many other government agencies facing the same document management challenges it became clear that there was an opportunity to make use of co-funded development to share these features across CWP users.
Co-funded de… -
Securing your CMS accounts
Found in News
Later this month two-factor authentication (2FA) will be turned on across the websites run by the Digital.govt.nz team: Digital.govt.nz, Data.govt.nz and Govt.nz. We’ve decided to require 2FA following CERT NZ guidance on making sure accounts are secure.
If you have a content management system (CMS) login to one of these websites, you’ll need to set up 2FA by 27 September 2019, or you’ll be prompted to do it when you log in. Now is also a good time to change your password.
Resetting your passw… -
Other types of service models for public cloud
Found in Standards & guidance / Technology and architecture / Cloud services / About public cloud services / Service models for public cloud / Other types of service models for public cloud
Most public cloud services combine aspects of multiple service models. Other types of service models have been developed to handle different needs — such as DaaS, BPaaS, CaaS and FaaS.
-
Digital Executive Board
Found in Digital government / Leadership / Digital Executive Board
The Digital Executive Board supports the digitisation and integration of public services.
-
3. Integrate security and privacy proportionate to risk from the outset
Found in Standards & guidance / Digital Service Design Standard / Principles / 3. Integrate security and privacy proportionate to risk from the outset
Consider the user and business context when applying access and security classifications.
Evaluate security risk and privacy obligations and apply the necessary treatments at source.
Identify the data and information the digital service will be providing or storing and address the security level, legal responsibilities, privacy issues and risks associated with the service (consulting with experts where appropriate).
Try to make the appropriate consideration of privacy and security an ongoing par… -
Catalogue approved services
Found in Standards & guidance / Technology and architecture / Cloud services / Cloud plans / Shadow cloud / Manage shadow cloud in your organisation / Catalogue approved services
Set up or update your organisation’s catalogue of approved public cloud services.
-
GEA-NZ dimension: Strategy, investment and policy
Found in Standards & guidance / Technology and architecture / Enterprise architecture / GEA-NZ framework / Dimensions of the GEA-NZ framework / GEA-NZ dimension: Strategy, investment and policy
Government strategy, investment prioritisation and policy evolution are drivers of change in the public sector, along with continuous change driven by customers and the environment.
-
Confirmation Service
Found in Products & services / Products and services A-Z / Confirmation Service
The Confirmation Service allows organisations to check identity information against official databases saving time and money as well as reducing risk.
-
Google Analytics events - top five things to track
Found in Blog / Published 06 October 2016 / By Lana Gibson ,
A Google Analytics (GA) event might sound like a soiree held at one of their shiny offices. Unfortunately (or fortunately?) events are needed to track user interactions that aren’t covered by the core reports.
Why do I need to use events?Events are user interactions with content that can be tracked independently from a web page or a screen load. See Google Analytics guidance for more information.
You need to add events to your page code to tell GA to track some of your most valuable user inter…