Skip to main content
Digital security

Guidance and regulation

Skip to results
46 results sorted by Most viewed
  • How to connect the app to the website if you need to prove your identity with GOV.UK One Login.

  • How to use the GOV.UK ID Check app to prove your identity, including how to download the app and how to scan your face and your photo ID.

  • How to change the password, phone number or email address you use to sign in to your GOV.UK One Login.

  • How the government classifies information assets to ensure they are appropriately protected.

  • What to do if you're having problems proving your identity with GOV.UK One Login using security questions.

  • Good Practice Guide (GPG) 45 helps you decide how to check someone's identity.

  • How to get a security code to sign in to your GOV.UK One Login and what to do if you're having problems receiving a code.

  • We’re working to help people securely prove who they are without having to present physical documents.

  • How to delete your GOV.UK One Login, and what happens if you do this.

  • How to use chatbots and webchat tools to improve your users’ experience of your service.

  • Check for any known problems creating, signing in or resetting your user ID or password.

  • The Technology Code of Practice is a set of criteria to help government design, build and buy technology.

  • The Microsoft 365 Guidance for UK government is a set of recommended configurations for UK government organisations using Microsoft 365

  • Apply the government secure email policy.

  • Find out what a .gov.uk Approved Registrar does, how to choose one and information about pricing.

  • This is collated guidance from government websites and independent bodies to help you follow the technology code of practice.

  • What to do if you get an email, text message or phone call from GOV.UK One Login that you were not expecting or think may be a scam or a hack.

  • What you can and cannot do when you help someone you know create a GOV.UK One Login and prove their identity.

  • Configure email services securely using encryption and anti-spoofing.

  • Spreadsheets are a common way to share data. Use this information to help you avoid common errors, improve interoperability and create more accessible spreadsheets.