Skip to main content
Australian Government Architecture
Search
Header menu
Home
Purpose of the AGA
Explore the AGA
How to use
Contact
Cloud computing policy: Automate where suitable
Automate where suitable Automation enables support teams to focus on the more complex requirements that are unique to their business by minimising...
Cloud computing policy: Monitor the health and usage of services in real time
Monitor the health and usage of services in real time Entities must have visibility of their cloud usage, cloud health and enable them to control...
Leverage existing investment
Engage with other agencies with prior experience in adoption of biometric technologies to leverage existing investment as well as knowledge,...
Monitoring and Reporting
Establish monitoring and reporting systems and processes that will measure and report on Biometrics performance, risks, and key operational issues...
Reuse Biometric Solutions
Investigate the reuse of existing investment in biometric solutions
Manual Control
Maintain manual control over biometric decision making, such that errors in the biometric solution can be overridden and corrected by human operators
Identity Verification
Separately verify a person’s identity before associating a biometric with a claimed identity
Avoid new investments - Identity Management Individual
Avoid investment in new identity capabilities that are available as existing government assets
Best practice - Identity Management Individual
Ensure best practices are applied in building digital services
Mainframe policy: Adhere to reuse principles
Adhere to reuse principles Give priority to the adoption of reuseable digital and ICT solutions, patterns, or knowledge, and, where necessary, design...
Pagination
Previous page
‹‹
Page 7
Next page
››
Subscribe to Consulting