arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

L5 - Operations and Maintenance

To know more about this phase of the DPI life cycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

y

O9 Build and share open assets

F1.4 Establish monitoring and mitigation teams
F1 Do no harm
SV1 Digital distrust,
SV4 Technical shortcomings
F4.11 Publish reports on inclusion and user complaints.
F4 Reinforce transparency and accountability
SV1 Digital distrust,
R13 Exclusion
F8.4 Implement multi-channel complaint resolution mechanism that tracks resolution
F8 Ensure effective remedy and redress
RS4. Lack of recourse
F8.5 Establish capability to succesfully remedy user exclusion & harm
F8 Ensure effective remedy and redress
RS4. Lack of recourse
RI4 Disempowerment
F8.6 Empower regulators with independent oversight
F8 Ensure effective remedy and redress
SV2 Weak rule of law
F9.12 Train civil servants, citizens and the private sector on new iterations of DPI implementation
F9 Focus on future sustainability
SV3 Weak institutions
SV5 Unsustainabilit
O2.7 Design systems to capture evolving user needs
O2 Evolve with evidence
R13 Exclusion
SV1 Digital distrust,
O2.8 Leverage analytics for ongoing evaluation and informed decision-making.
O2 Evolve with evidence
SV3 Weak institutions
O2.9 Establish mechanisms to assess the value users derivearrow-up-right
O2 Evolve with evidence
R13 Exclusion
SV1 Digital distrust,
O4.7 Invite security audits by third parties
O4 Assure data security by design
RS2 Digital insecurity,
SV4 Technical shortcomings
O5.6 Implement regular performance metrics tracking with predefined response protocols
O5 Ensure data protection during use
SV3 Weak institutions
RS2 Digital insecurity,
SV4 Technical shortcomings
O5.5 Ensure that access to personal information is based on the informed consent of the user that is freely given and can be withdrawn
O5 Ensure data protection during use
RS1 Privacy vulnerability,
RS4 Lack of recourse
O5.8 Create redress mechanisms that allow for bad actors (fraud, identity theft, data protection violations, etc) to be expelled.
O5 Ensure data protection during use
RS2. Digital insecurity
O5.3 Ensure digital preservation of records
O5 Ensure data protection during use
SV4 Technical shortcomings
O7.1 Establish governance frameworks that ensure transparency, accountability, and stakeholder participation
O7 Practice inclusive governance
SV3 Weak institutions
RI4 Disempowerment
O8.6 Ensure budgetary allocation for DPI financial sustainability and adequate resourcing for continuous development.
O8 Sustain financial viability
SV5 Unsustainability
O9.2 Develop a centralized platform for digital asset sharing and foster a community of practice for knowledge exchange
SV4 Technical shortcomings
O9.3 Nurture engagement with technical community and private actors
O9 Build and share open assets
SV4 Technical shortcomings
O9.4 Create an online repository of Open DPI components, reference architecture for maintenenace, review, improvement and engagement with technical community and private actors
O9 Build and share open assets
SV4 Technical shortcomings