Gud Apps

Download Guidelines in PDF format

Data Quality

With increasing reliance by Government on the data captured by eGovernance solutions for major policy decisions, the data quality has assumed prime importance. It is increasingly driving the policy decisions, benefits are transferred to beneficiaries based on data captured by eGovernance applications and performance of government functionaries and field offices and of the government itself is being judged based on the data captured by eGovernance applications. It is, therefore, imperative that sufficient attention is given to ensuring quality of data captured by these applications. In this context, this section provides guidelines to arrive at common data standards and interfaces to be used to take care for data, its user interfaces and data quality parameters.

  • Data Element

    A data element, also called a data item or field, is the smallest piece of data that has meaning, which need not be broken further. Often a data element is self defining such as Student name, enrolment number. The attributes of data element includes name/label, type, length, output format etc. Follwoing points can futher be elaborated on data element

    • Data Identification
    • Data Size
    • Data Domain
    • Validations
    • Verification
    • Data Availability
    • User Interface
    • Metadata Standards
    • Record Identification
    • Record Level Validation
    • Data Functions
    • Identifiers
  • Record Element

    This section deliberates on group of related data elements termed as record i.e. a record is a meaningful combination of related data elements that is included in a data flow or retained in a data store.

    • Record Identification
    • Record Level Validation
  • Data Functions

    This section deliberates on issues related to data stores generally referred as tables or entities or data functions. A data function represents functionality provided to the user to meet internal and external data storage requirement. It is a user recognizable group of logically related data or control information maintained in the form of database tables.

    • Data Function/Table Identification
    • Referential Integrity
  • Identifiers

    Following points should be dicussed along with criteria for defining identifiers.

    • Criteria for Defining of New Identifier
    • Common Identifiers
    • Indian Financial System Code (IFSC)
  • Guidelines for Common Data Elements

    For specification of data common data elements, Snake Case (Lower Case Embedded Underscore) has been chosen as naming convention. For more details of this point Guidelines PDF can be referred.


The ways in which someone may be authenticated fall into three categories, based on what are known as the factors of authentication:

1. Something the user knows,
2. Something the user has, and
3. Something the user is.

Each authentication factor covers a range of elements used to authenticate or verify a person's identity prior to being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority.It is suggested that for positive authentication, elements from at least two, and preferably all three, factors should be verified. The three factors (classes) and some of elements of each factor are:

1. the knowledge factors: Something the user knows (e.g., a password, Partial Password, pass phrase, or personal identification number (PIN), challenge response (the user must answer a question, or pattern), Security question etc.
2. the ownership factors: Something the user has (e.g., wrist band, ID card, security token, cell phone with built-in hardware token, software token, or cell phone holding a software token)
3. the inherence factors: Something the user is or does (e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient), signature, face, voice, unique bio-electric signals, or other biometric identifier).

In a web application it is easy to confuse authentication and session management (dealt with in a later section). Users are typically authenticated by a username and password or similar mechanism. When authenticated, a session token is usually placed into the user's browser (stored in a cookie). This allows the browser to send a token each time a request is being made, thus performing entity authentication on the browser. The act of user authentication usually takes place only once per session, but entity authentication takes place with every request.

  • Authentication Levels

    Authentictation level can be divided into three categories
    1. Single-factor authentication
    2. Two-factor authentication [2FA]
    3. Multi-factor authentication

  • Authentication Types

    The authentication type in web applications can be based on the sensitivity of the application. This can be categorized in following 1. HTTP Basic Authentication 2. Form Based Authentication 3. Digital Certificates (SSL and TLS) 4. One Time Password 5. Biometric Authentication

  • Implementation of Authentication

    Authentication can be implemented in following depending on application need. 1. HTTP Basic/ Form Based Authentication 2. Authentication using Database 3. Authentication using LDAP 4. Certificate based Authentication 5. One Time Password Based Authentication 6. Custom Application generated OTP 7. Aadhaar Based OTP. 8. Time Based One Time Password (TOTP) 9. Biometric Based Authentication

  • Sign-up/login Processes

    A typical sign-up form contains a couple of fields, the objective is to identify a person to whom we are going to provide access for using the application and facilitate with single sign-on.Ways to recall Sign-up Credentials are 1. Sign-up using Application Specific User-id/Password 2. Sign-up using Official User-id/Password (e.g. NIC Email) 3. Sign-up using Social Networking User-id/Password

  • Additional Best Practices

    We can use following best practices to higher level of security. 1. Stop Auto User Creation 2. Using Captcha 3. Context Based Authentication 4. Additional image based profile verification 5. Using Forgot Password 6. Using Profile/Transactional Password 7. Security Questions 8. New Account Activation links 9. Account Locking 10. Account Audit Policy

Form Designing

The e-governance applications support large range of activities from provding information like location of RTO to providng intelligent GPS based accident reporting and support services. The effective implementation of e-Governance solutions requires hassel free interaction between e-governance application and its users. The “Form” is one of the most important element used in these systems/applications for interaction and collection of data. The effectiveness, efficiency and user satisfaction can be improved by developing applications with well-designed forms. To improve the usability of e-Governance Applications, it is important that sufficient attention is given to design and development of these web forms. This section provides practical guidelines and best practices for design of web forms as part of e-governance applications to provide effectiveness, efficiency, and a pleasant and satisfying experience to the users who use them. The application of these guidelines will also help in reducing on design efforts and keep the consistency for end-user with more predictable and standardized user interface.

  • Design Principles - Considerations for Form Design

    While designing a form, we should look outside-in means the User should be kept in mind while designing the form. The primary goal while designing a form need to be “Speed” and “Accuracy”.

  • Structuring of Form

    A form is a conversation. And like any conversation, it should be represented by a logical communication between two parties— User and the Owner of the Application. While developing the form we can keep the following points in mind 1. Only Ask What’s Required 2. Order the Form Logically and 3. Group Related Information

  • Form Elements

    The Web Form is made up of elements. Every Web Form has at least three basicelements: labels, input fields, and actions. We can follow the standard given in guidelines while choosing these elements.

  • Form Validations

    It is important that the quality of data is ensured. As mostly the data captured is further used for policy planning and decision making, the poor quality of data can results in ill-informed decisions and policies. Validations are very important tool to ensure quality of data captured as part of our applications.

  • Document Upload, Storage and Management

    Documents, images uploaded on a web application become integral part of the application work-flow with multiple users with different roles accessing them at different stages of the document life-cycle (creation, uploading, storage, tracking, retrieval, disposal etc). Keeping in view the limitation of bandwidth and need for faster upload/ retrieval speed, document size, formats etc need to be carefully planned and controlled.

Reports Designing

When we begin to build an application, the focus is naturally on designing input screens for capturing data and designing the database which is optimized for data entry. However, the main purpose of any application is not just to capture data but to use it to monitor performance, use it as a guide in decision making and developing future policy guidelines. The management primarily concentrates on what the stored data can reveal about a programme or performance of an entity and how they can use that information to improve the performance so that the overall governance objective is effectively met. Reporting and analytics are two areas which fulfil these aspirations of the decision makers. This document gives you a few guidelines and checklist for preparation of reports for yur application. The first step obviously understands the user requirements. The first section identifies a set of questions you should ask your client or the end user and also yourself before you build report. Rest of the sections elaborate on the questions by giving you simple guidelines for generating useful and user-friendly reports.

  • Conduct a thorough analysis of user scenarios

    You should prepare a list of question to ask from user. To Know your user and their requirement. Reports can be categorized a) MIS Reports b) Moniotring Reports c) Performance Reports d) Exceptional Reports

  • Report Design

    Before making report design team should thoroughly brain stormed about the following point 1. Setting up a Report – The Query Filter 2. Report Layout 3. Emphasize Important Information 4. Format and Paginate 5. Make the report distributable 6. Design Database specifically for Reports

  • Reporting Frameworks

    Reporting Frameworks provide the much needed facilities to quickly turn out great looking reports. Frameworks are available for Java, .NET and PHP. Frameworks for Java include BIRT, JasperReport, Pentaho etc. Microsoft provides the Microsoft Reporting Server.