Universal DPI Safeguards
search
Ctrlk
  • 🇺🇳About the Universal DPI Safeguards Initiativechevron-right
  • 🗃️How to use the Hub
  • 🛡️Universal DPI Safeguards Frameworkchevron-right
    • compassNavigating the Framework
    • people-groupResponsible Authoritieschevron-right
      • R1 - Governmentchevron-right
      • R2 - Regulatorchevron-right
        • L1 - Conception and Scoping
        • L2 - Strategy and Design
        • L5 - Operations and Maintenance
        • All stages
      • R3 - Donorchevron-right
      • R4 - Technology Providerchevron-right
      • R5 - Advocateschevron-right
    • repeatLife Cycle Stages
    • shield-halvedPrincipleschevron-right
    • screwdriver-wrenchProcesseschevron-right
    • triangle-exclamationRiskschevron-right
  • 🌏Country Implementationchevron-right
  • 🤝Ecosystem Engagementchevron-right
  • ℹ️Additional Resources and Informationchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🛡️Universal DPI Safeguards Frameworkchevron-right
  2. people-groupResponsible Authoritieschevron-right
  3. R2 - Regulator

L5 - Operations and Maintenance

To know more about this phase of the DPI lifecycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risks

F4.14 Oversee the publication of reports on user complaints and inclusion metrics.

F4 Reinforce transparency and accountability

RS4 Lack of recourse, SV3 Weak institutions

F9.10 Set a normative framework for public-private partnership to implement DPI frameworks

F9 Focus on future sustainability

SV2 Weak rule of law

O3.29 Audit data processed against the specified purpose that is being served

O3 Ensure data privacy by design

RS2 Digital insecurity, RS1 Privacy vulnerability

O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate

O3 Ensure data privacy by design

RI4 Disempowerment, SV2 Weak rule of law

O3.3 Analyze stakeholder interests and implement approprate safeguards

O3 Ensure data privacy by design

RS1 Privacy vulnerability

O3.5 Enable third-party audits

O3 Ensure data privacy by design

RS1 Privacy vulnerability

O4.9 Mandate security audits by third parties

O4 Assure data security by design

RS2 Digital insecurity, SV1 Digital distrust

Last updated 1 year ago