# L3 - Development

To know more about this phase of the DPI life cycle, click [here](https://safedpi.gitbook.io/safeguards/universal-dpi-safeguards-framework/responsible-authorities/r1-government/l3-development).

**Click on any process listed below to learn about illustrative practices that can be implemented.**

<table><thead><tr><th>Process</th><th width="236">Principle</th><th>Risk</th></tr></thead><tbody><tr><td><a href="../../processes/f4.12-ensure-accountability-through-records-controls">F4.12 Ensure accountability through records controls</a></td><td><a href="../../principles/foundational-principles/f4-reinforce-transparency-accountability">F4: Reinforce transparency and accountability</a></td><td><a href="../../risks/risks-to-structural-vulnerabilities">SV4 Technical shortcomings</a>, <a href="../../risks/risks-to-safety">RS4 Lack of recourse</a></td></tr><tr><td><a href="../../processes/f6.5-implement-optional-features-for-user-control-over-personal-data">F6.5 Implement optional features for user control over personal data</a></td><td><a href="../../principles/foundational-principles/f6-promote-autonomy-and-agency">F6: Promote autonomy and agency</a></td><td><a href="../../risks/risks-to-inclusion">RI4 Disempowerment</a>, <a href="../../risks/risks-to-safety">RS1 Privacy vulnerability</a></td></tr><tr><td><a href="../../processes/o2.5-implement-rigorous-testing-protocols">O2.5 Implement rigorous testing protocols</a></td><td><a href="../../principles/operational-principles/o2-evolve-with-evidence">O2: Evolve with evidence</a></td><td><a href="../../risks/risks-to-structural-vulnerabilities">SV4 Technical Shortcomings</a></td></tr><tr><td><a href="../../processes/o3.21-establish-mechanisms-to-ensure-a-right-to-opt-out-whenever-appropriate">O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate</a></td><td><a href="../../principles/operational-principles/o3-ensure-data-privacy-by-design">O3: Ensure data privacy by design</a></td><td><a href="../../risks/risks-to-inclusion">RI4 Disempowerment</a>, <a href="../../risks/risks-to-safety">RS1 Privacy vulnerability</a></td></tr><tr><td><a href="../../processes/o3.4-provide-features-to-protect-users-from-tracking-and-profiling">O3.4 Provide features to protect users against tracking and profiling</a></td><td><a href="../../principles/operational-principles/o3-ensure-data-privacy-by-design">O3: Ensure data privacy by design</a></td><td><a href="../../risks/risks-to-structural-vulnerabilities">SV1 Digital distrust</a>, <a href="../../risks/risks-to-inclusion">RI4 Disempowerment</a></td></tr><tr><td><a href="../../processes/o4.4-establish-a-trusted-unique-secure-and-accurate-identity-system">O4.4 Establish a trusted—unique, secure, and accurate—identity. Make more specific to this process</a></td><td><a href="../../principles/operational-principles/o4-assure-data-security-by-design">O4: Assure data security by design</a></td><td><a href="../../risks/risks-to-structural-vulnerabilities">SV1 Digital distrust</a>, <a href="../../risks/risks-to-inclusion">RI4 Disempowerment</a></td></tr><tr><td><a href="../../processes/o4.5-implement-data-validation-completeness-and-consistency-checks">O4.5 Implement data validation, completeness, and consistency checks</a></td><td><a href="../../principles/operational-principles/o4-assure-data-security-by-design">O4: Assure data security by design</a></td><td><a href="../../risks/risks-to-safety">RS2 Digital insecurity</a></td></tr><tr><td><a href="../../processes/o4.6-use-an-established-cybersecurity-framework">O4.6 Use an established cybersecurity framework</a></td><td><a href="../../principles/operational-principles/o4-assure-data-security-by-design">O4: Assure data security by design</a></td><td><a href="../../risks/risks-to-safety">RS2 Digital insecurity</a></td></tr><tr><td><a href="../../processes/o5.3-ensure-digital-presevation-of-records">O5.3 Ensure digital presevation of records</a></td><td><a href="../../principles/operational-principles/o5-ensure-data-protection-during-use">O5: Ensure data protection during use</a></td><td><a href="../../risks/risks-to-structural-vulnerabilities">SV4 Technical shortcomings</a>, <a href="../../risks/risks-to-safety">RS2 Digital insecurity</a></td></tr><tr><td><a href="../../processes/o6.7-ensure-that-dpi-are-linguistically-appropriate-for-the-whole-population">O6.7 Ensure that DPI are linguistically appropriate for the whole population</a></td><td><a href="../../principles/operational-principles/o6-respond-to-gender-ability-or-age">O6: Respond to gender, ability or age</a></td><td><a href="../../risks/risks-to-inclusion">RI3 Exclusion</a>, <a href="../../risks/risks-to-structural-vulnerabilities">SV4 Technical shortcoming</a></td></tr><tr><td><a href="../../processes/o9.1-ensure-modularity-and-reusability-across-sectors-enabling-evolution-with-society">O9.1 Ensure modularity and reusability across sectors, enabling evolution with society by unbundling DPI into core components (e.g., digital identity, payments, data sharing)</a></td><td><a href="../../principles/operational-principles/o9-build-and-share-open-assets">O9: Build and share open assets</a></td><td><a href="../../risks/risks-to-structural-vulnerabilities">SV4 Technical shortcomings</a></td></tr></tbody></table>
