1. CONTENT ARCHIVAL POLICY
The content components are created with metadata, source and validity date. There would be some content which is permanent in nature and for such content it is assumed that the content would reviewed in every ten years unless it is edited / deleted based on requirement. The content shall not be displayed on the Website after the validity date.
Some of the short lived content components like tenders, recruitment etc., which will not have any relevance on the website after the intended purpose.
The content components like documents, reports; latest news is regularly reviewed as per the Content Review Policy.
The content is reviewed at least two weeks prior to the validity date and if required content will be revalidated and validity date is modified. If content is not relevant, then the content is archived and no longer published on the Website.
The above mentioned policy is in force and will be followed while maintaining the website.
2. CONTENT CONTRIBUTION, MODERATION AND APPROVAL POLICY (CMAP)
The objective behind the WAR Room website is to keep vigil on all units under South Sector HQ Chennai through real time data. This website is designed, developed and maintained by WAR Room, CISF SS Chennai. The content in this website is the result of a collaborative effort of various branches of the department. A web based Content Management System (CMS) is used by the Web Information Manager to add, update and maintain the website URLs with CISF website. If the URL is rejected at any level then it is reverted back to the contributor for modification/information.
3. WEBSITE CONTINGENCY MANAGEMENT POLICY
The presence of the website on the Internet and very importantly the site is fully functional all the times. It is expected of the Government websites to deliver information and services on a 24X7 basis. Hence, all efforts should be made to minimize the downtime of the website as far as possible.
It is therefore necessary that a proper Contingency Plan to be prepared in handle any eventualities and restore the site in the shortest possible time. The possible contingencies include:
- Defacement of the website: All possible security measures must be taken for the website to prevent any possible defacement/hacking by unscrupulous elements. However, if despite the security measures in place, such an eventuality occurs, there must be a proper contingency plan, which should immediately come into force. If it has been established beyond doubt that the website has been defaced, the site must be immediately blocked. The contingency plan must clearly indicate as to whom is the person authorized to decide on the further course of action in such eventualities. The complete contact details of this authorized person must be available at all times with the web management team. Efforts should be made to restore the original site in the shortest possible time. At the same time, regular security reviews and checks should be conducted in order to plug any loopholes in the security.
- Data Corruption: A proper mechanism has to be worked out by the concerned in consultation with their web hosting service provider to ensure that appropriate and regular back-ups of the website data are being taken. These enable a fast recovery and uninterrupted availability of the information to the citizens in view of any data corruption.
- Hardware/Software Crash: Though such an occurrence is a rarely, still in case the server on which the website is being hosted crashes due to some unforeseen reason, the web hosting service provider must have enough redundant infrastructure available to restore the website at the earliest.
- Natural Disasters: There could be circumstances whereby due to some natural calamity, the entire data center where the website is being hosted gets destroyed or ceases to exist. A well planned contingency mechanism has to be in place for such eventualities whereby is should be ensured that the Hosting Service Provider has a ‘Disaster Recovery Centre (DRC)’ set up at a geographically remote location and the website is switched over to the DRC with minimum delay and restored on the Net.
Apart from the above, in the event of any National Crisis or unforeseen calamity, Government websites are looked upon as a reliable and fast source of information to the public. A well defined contingency plan for all such eventualities must be in place so that the emergency information/contact help-lines could be displayed on the website without any delay. For this, the concerned person in the department responsible for publishing such emergency information must be identified and the complete contact details should be available at all times.
4. COPYRIGHT POLICY
Material featured on this site may be reproduced free of charge in any format or media without requiring specific permission. This is subject to the material being reproduced accurately and not being used in a derogatory manner or in a misleading context. Where the material is being published or issued to others, the source must be prominently acknowledged. However, the permission to reproduce this material does not extend to any material on this site, which is identified as being the copyright of a third party. Authorization to reproduce such material must be obtained from the copyright holders concerned.
Materials on this website are subject to copyright protection unless otherwise indicated. The material may be downloaded without requiring specific prior permission. Any other proposed use of the material is subject to the approval of CISF South Sector HQ Chennai. Application for obtaining permission should be made to firstname.lastname@example.org
5. CONTENT REVIEW POLICY
All possible efforts need to be taken to keep the content on the Website current and up-to-date. This Content Review Policy defines the roles and responsibilities of the website content review and the manner in which it need to be carried out. Review Policies are defined for the diverse content elements.
The Review Policy is based on different type of content elements, its validity and relevance as well as the archival policy.
The entire website content would be reviewed for syntax checks once a month by the CISF SS HQ WAR Room Team.
6. HYPER LINKING POLICY
Links to external websites/portals
At some places in this website, you may find links to other websites/portals. This links have been placed for your convenience. CISF SS HQ is not responsible for the contents and reliability of the linked websites and does not necessarily endorse the views expressed in them. Mere presence of the link or its listing on this website should not be assumed as endorsement of any kind. CISF SS HQ can neither guarantee that these links will work all the time nor it has any control over availability of linked pages.
Links to CISF SS HQ WAR Room website by other websites
Prior permission is required before hyperlinks are directed from any website to this site. Permission for the same, stating the nature of the content on the pages from where the link has to be given and the exact language of the Hyperlink should be obtained by sending a request at (email@example.com).
7. WEBSITE MONITORING POLICY
CISF SS HQ has a Website Monitoring Policy in place and the website is monitored periodically to address and fix the quality and compatibility issues around the following parameters:
Performance: Site download time is optimized for a variety of network connections as well as devices. All important pages of the website are tested for this.
Functionality: All modules of the website are tested for their functionality. The interactive components of the site such as, feedback forms are working smoothly.
Broken Links:The website is thoroughly reviewed to rule out the presence of any broken links or errors.
Traffic Analysis: The site traffic is regularly monitored to analyze the usage patterns as well as visitors’ profile and preferences.
Feedback: Feedback from the visitors is the best way to judge a website’s performance and make necessary improvements. A proper mechanism for feedback is in place to carry out the changes and enhancements as suggested by the visitors.
8. WEBSITE SECURITY POLICY
CISF SS HQ WAR Room website contains information is accessible to limited users only. However, the website maintains a copyright interest in the contents of all of its websites.
Unauthorized attempts to upload information or change information are strictly prohibited, and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
9. USER ID AND PASSWORD POLICY:
Access to sensitive or proprietary business information on CISF SS HQ WAR Room website is limited to users who have been determined to have an appropriate official reason for having access to such data. All registered users who are granted security access will be identified by a user name provided by webmaster.
Users who are granted password access to restricted information are prohibited from sharing those passwords with or divulging those passwords to any third parties. User will notify us immediately in the event a User ID or password is lost or stolen or if User believes that a non-authorized individual has discovered the User ID or password.
If you have any questions or comments regarding CISF SS HQ WAR Room Website Security Policy, please contact the Web Information Manager by using the Feedback option in CISF SS HQ WAR Room website.
Web Information Manager
CISF South Sector HQ,