Universal DPI Safeguards
search
Ctrlk
  • 🇺🇳About the Universal DPI Safeguards Initiativechevron-right
  • 🗃️How to use the Hub
  • 🛡️Universal DPI Safeguards Frameworkchevron-right
    • compassNavigating the Framework
    • people-groupResponsible Authoritieschevron-right
      • R1 - Governmentchevron-right
      • R2 - Regulatorchevron-right
      • R3 - Donorchevron-right
        • L1 Conception and Scoping
        • L2 Strategy and Design
        • L4 Deployment
        • L5 Operations and Maintenance
      • R4 - Technology Providerchevron-right
      • R5 - Advocateschevron-right
    • repeatLife Cycle Stages
    • shield-halvedPrincipleschevron-right
    • screwdriver-wrenchProcesseschevron-right
    • triangle-exclamationRiskschevron-right
  • 🌏Country Implementationchevron-right
  • 🤝Ecosystem Engagementchevron-right
  • ℹ️Additional Resources and Informationchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🛡️Universal DPI Safeguards Frameworkchevron-right
  2. people-groupResponsible Authoritieschevron-right
  3. R3 - Donor

L2 Strategy and Design

To know more about this phase of the DPI life cycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principles
Risks Avoided

F4.3 Facilitate comprehensive access to system architecture informationarrow-up-right

F4 Reinforce transparency and accountability

SV1 Digital distrust, RI4 Disempowerment

F7.2 Sustain the participation of affected communities in the process by providing funding for the total cost of community engagmentarrow-up-right

F7 Foster community engagement

RI3 Exclusion, RI2 Unequal access

O8.4 Ensure that the price of using DPI is affordable to people and businessesarrow-up-right

O8 Sustain financial viability

RI3 Exclusion, RI2 Unequal access

Last updated 1 year ago