Loading...
To know more about this phase of the DPI life cycle, click here
Click on any process listed below to learn about illustrative practices that can be implemented.
F1 .4 Establish monitoring and mitigation teams
F1 Do no harm
SV1 Digital distrust,
SV4 Technical shortcomings
F2.2 Provide accessible in-person options for identity proofing and authentication
F2 Do not discriminate
R12 Unequal access,
RI1 Discrimination,
RS3 Physical insecurity
F2.3 Establish mechanisms to promote ongoing user awareness and engagement
RI4 Disempowerment
F9.8 Build institutional memory
F9 Focus on future sustainability
SV5 Unsustainability,
SV3 Weak institution
F9.9 Document and maintain an archive on the outcomes of pilot studies, testing, and decision-making
SV3 Weak institutions