1 minute read

NEWS FROM THE COUNTRY OFFICE

Next Article
STARTING STORY

STARTING STORY

News from Country Office

GIZ Corporate Design Center

Information Security and TIT BITS How can you tell if a website can securely handle your data?

GIZ Corporate design (CD) is a set of legally obligatory design guidelines that guarantees the organisation projects a respectable and consistently recognisable image. These design requirements must be followed for all GIZ publications and promotional materials in Germany and other countries. The corporate design standards apply to both analogue products like business cards, brochures, giveaways, and office signage as well as digital ones like PowerPoint presentations and emails.

Detailed guidelines and aids as well as pointers on how to differentiate

between GIZ, BMZ and EU design are available in four languages (German, English, French and Spanish) in the Corporate Design Center (CDC) and under the heading Processes and Rules (P+R). Here you can also find logos, world maps, various templates and lots more.

The GIZ Corporate Design Center houses all pertinent GIZ corporate design guidelines and templates as well as those of its commissioning parties for publications, country brochures, web content, videos, trade show materials, and many other things.

Here is the link to the GIZ Corporate design Center

HTTPS (Hypertext Transfer Protocol Secure) is an internet communication protocol that protects the integrity and confidentiality of data between the user's computer and the site. Users expect a secure and private online experience when using a website. We encourage you to adopt HTTPS in order to protect your users' connections to your website, regardless of the content on the site.

Data sent using HTTPS is secured via the Transport Layer Security protocol (TLS), which provides three key layers of protection:

Encryption: Encrypting the exchanged data to keep it secure from eavesdroppers. That means that while the user is browsing a website, nobody can "listen" to their conversations, track their activities across multiple pages, or steal their information.

Data integrity: Data cannot be modified or corrupted during transfer, intentionally or otherwise, without being detected.

Authentication: Proves that your users communicate with the intended website. It protects against man-in-the-middle attacks and builds user trust, which translates into other business benefits.

This article is from: