How to identify
Official website links end with .gov.pg
Government agencies communicate via .gov.pg websites (e.g. ict.gov.pg).
Trusted websites

DIGITAL STANDARDS AND GUIDELINES

STANDARDS AND GUIDELINES

The Department of ICT in Papua New Guinea sets digital standards to ensure all government digital services are secure, user-friendly, and consistent. These cover website design, data sharing, cybersecurity, digital identity, and cloud infrastructure, helping create a connected, efficient, and citizen-focused digital government across all levels of public service.

02.  CYBER SECURITY

The Cybersecurity Standards and Guidelines establish standards, guidelines, and best practices for identifying and implementing appropriate cyber security measures to protect their systems and data from cyber threats, thereby improving their cybersecurity posture.

04.  WEBSITE

These standards cover various aspects of web design, including layout, navigation, content, graphics, coding, and security. By adhering to these standards, website owners can create websites that are user-friendly, easy to navigate, visually appealing, and accessible to all users, regardless of their device, browser, or physical ability.

02.  DOMAIN NAME

The Domain Name Standard proposed by Digital Government Standard of PNG DICT provides guidelines for the registration, management, and use of domain names within the Papua New Guinea government domain.

05.  DIGITAL ID

A digital identity, usually referred to as a digital ID, (UNDER CONSULTATION) is an electronic or digital type of identification. In a variety of online engagements and transactions, it is used for verifying and authenticating the identity of people or other entities. Online banking, social networking platforms, government agencies, and other digital settings where identity verification is required frequently employ digital IDs

03. EMAIL

The primary objective of these standards is to maintain a consistent and predictable method of naming government email  addresses as well as provide guidelines for the proper use of government emails, email security, and email management.

03. SOCIAL MEDIA

This document provides mitigation advice and security controls to help reduce threats such as unauthorized access as well as steps to follow in order to retrieve a stolen account.Provide necessary guidance to help departments or agencies manage their social media
accounts securely.