Skip to main content
Australian Government Architecture
Search
Header menu
Home
Purpose of the AGA
Explore the AGA
How to use
Contact
Identity Verification
Separately verify a person’s identity before associating a biometric with a claimed identity
Avoid new investments - Identity Management Individual
Avoid investment in new identity capabilities that are available as existing government assets
Best practice - Identity Management Individual
Ensure best practices are applied in building digital services
Mainframe policy: Adhere to reuse principles
Adhere to reuse principles Give priority to the adoption of reuseable digital and ICT solutions, patterns, or knowledge, and, where necessary, design...
Metadata and Semantics policy (position)
This policy aims to manage and utilise metadata and semantics to make Government owned data more accessible, understandable and valuable to the...
Metadata and Semantics policy: Collaboration with private and research sectors
Collaborate with the private and research sectors for mutual understanding of how data should be best described, interpreted and managed.
Metadata and Semantics policy: Optimise data usage
Optimise the use and reuse of public data.
Metadata and Semantics policy: Data availability
Release non-sensitive data as open by default, using standardised descriptions for metadata shared across agencies.
Secure Data Exchange policy (Position)
Case Management build for reuse.
Build for reuse. Where reuse is not possible, provide evidence of which systems across government have been investigated (specifically across the...
Pagination
Previous page
‹‹
Page 8
Next page
››
Subscribe to Unendorsed