arrow-left

All pages
gitbookPowered by GitBook
1 of 7

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

L2 - Strategy and Design

To know more about this phase of the DPI life cycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

L5 - Operations and Maintenance

To know more about this phase of the DPI life cycle, click

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

All stages

Process
Principle
Risk

SV 1 Digital distrust,

SV4 Technical shortcomings

F2.1 Implement alternative enrollment measures

F2 Do not discriminate

RI3 Exclusion

F3.3 Assess the interoperability system

F3 Do not exclude

SV3 Weak institutions,

SV4 Technical shortcomings

F3.4 Develop alternative processes to allow access to services without requiring subscription to a DPI system

F3 Do not exclude

RI3 Exclusion

RI2 Unequal access

F3.5 Implement affirmative design measures

F3 Do not exclude

SV2 Weak rule of law

RI3 Exclusio

F4.5 Establish comprehensive auditing mechanisms

F4 Reinforce transparency and accountability

SV3 Weak institutions,

F4.6 Create stakeholder participation systems

F4 Reinforce transparency and accountability

RI3 Exclusion

SV 1 Digital distrust,

F4.7 Ensure an auditable data trail for dispute redressal

F4 Reinforce transparency and accountability

RS2 Digital insecurity

RS4 Lack of recourse

F4.8 Provide clear definitions for key human rights terms so basic understanding of harms is inter-operable and can be benchmarked across systems.

F4 Reinforce transparency and accountability

RI4 Disempowerment

RI2 Unequal access

F6.3 Incorporate user choice mechanisms to participate

F6 Promote autonomy and agency

RI4 Disempowerment

SV4 Technical shortcomings

F6.4 Design user interfaces that empower data subjects with clear and continuous control over their data.

F6 Promote autonomy and agency

RI4 Disempowerment

F7.3 Forward relevant stakeholder inputs to the DPI implementors.

F7 Foster community engagement

SV3 Weak institutions

RI4 Disempowerment

F7.4 Sustain the participation of affected communities in the process by providing funding for the total cost of community engagment

F7 Foster community engagement

RI2 Unequal access RI3 Exclusion

F8.3 Ensure that the DPI interface indicates the responsible public authority and their contact information for complaints and inquiries.

F8 Ensure effective remedy and redress

SV1 Digital distrust

F9.4 Adopt common standards, conduct regular system integration tests, and ensure that redundant system operations are removed

F9 Focus on future sustainability

SV5 Unsustainability

SV3 Weak institutions

F9.5 Conduct stringent security checks and vendor assessments

F9 Focus on future sustainability

SV3 Weak institutions SV5 Unsustainability

F9.6 Encourage modular system design and support for multiple technologies.

F9 Focus on future sustainability

SV3 Weak institutions SV5 Unsustainability

F9.7 Adopt comprehensive procurement processes that prevent vendor lock in

F9 Focus on future sustainability

SV4 Technical shortcomingsSV2 Weak rule of law

O1.4 Provide tools and support to enable integration and scalability

O1 Leverage market dynamics

SV5 Unsustainability

O1.5 Develop an open access system with APIs, accountability, and fraud protections

O1 Leverage market dynamics

RI3 ExclusionRS2 Digital insecurity

O2.2 Implement regular public consultations and review mechanisms.

O2 Evolve with evidence

RI3 Exclusion RI4 Disempowerment

O2.3 Design mechanisms to generate relevant data

O2 Evolve with evidence

SV3 Weak institutions SV4 Technical shortcomings

O2.4 Design feedback loops to address data inaccuracies and enable community reporting

O2 Evolve with evidence

RS2 Digital insecuritySV4 Technical shortcomingsSV 1 Digital distrust

O3.5 Integrate strict data minimization protocols into design

O3 Ensure data privacy by design

SV 1 Digital distrust

RS1 Privacy Vulnerability

O3.6 Establish multi-layered security controls to protect data throughout its lifecycle

O3 Ensure data privacy by design

RS1 Privacy Vulnerability SV4 Technical shortcomingsRI4 Disempowerment

O3.7 Undertake a Data Protection Impact assessments and legislative reforms prior to DPI roll out

O3 Ensure data privacy by design

RS1 Privacy Vulnerability SV2 Weak rule of law

O3.8 Enable third party audits

O3 Ensure data privacy by design

RS1 Privacy Vulnerability

O3.9 Establish Robust Data Delinking Mechanisms once the purpose of the processing of personal information has been served

O3 Ensure data privacy by design

RS1 Privacy Vulnerability RS2 Digital insecurity

O3.10 Enable different levels of privacy between payer and payee, where appropriate.

O3 Ensure data privacy by design

RS2 Digital insecurityRS1 Privacy Vulnerability

O3.11 Implement symmetrical identification so users know the identity of the other party in a transaction.

O3 Ensure data privacy by design

SV1 Digital distrust

O3.12 Implement and protect the right to pseudonymity within DPI systems, when applicable.

O3 Ensure data privacy by design

SV1 Digital distrust

O3.13 Ensure that biometric authentication is not mandatory

O3 Ensure data privacy by design

RS1 Privacy Vulnerability SV4 Technical shortcomingsRI3 Exclusion

O4.8 Design specific security features to protect against unauthorized access and data breaches

O4 Assure data security by design

RS1 Privacy Vulnerability

F3.3 Identify and address end user/citizen needs
F3 Do not exclude
RI3 Exclusion
F1.3 Establish monitoring and mitigation teams
F1 Do no harm

y

O9 Build and share open assets

F1.4 Establish monitoring and mitigation teams

F1 Do no harm

SV1 Digital distrust,

SV4 Technical shortcomings

F4.11 Publish reports on inclusion and user complaints.

F4 Reinforce transparency and accountability

here

O6.8 Use a participatory approach to foster inclusive, responsive, and empowering DPI for marginalized communities.

O6 Respond to gender, ability or age

R1.4 Disempowerment,

R1.3 Exclusion

O7.2 Invite all stakeholders for regular discussions

O7 Practice inclusive governance

R1.3 Exclusion

RI2 Unequal access

F7.8 Implement a capacity-building strategy using a Whole-of-Government approach to ensure all relevant functional groups can effectively support safeguards.

F7 Foster community engagement

L1 - Conception and Scoping

To know more about this phase of the DPI life cycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

L4 - Deployment

To know more about this phase of the DPI life cycle, click

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risks
SV1 Digital distrust,
R13 Exclusion
F8.4 Implement multi-channel complaint resolution mechanism that tracks resolution
F8 Ensure effective remedy and redress
RS4. Lack of recourse
F8.5 Establish capability to succesfully remedy user exclusion & harm
F8 Ensure effective remedy and redress
RS4. Lack of recourse
RI4 Disempowerment
F8.6 Empower regulators with independent oversight
F8 Ensure effective remedy and redress
SV2 Weak rule of law
F9.12 Train civil servants, citizens and the private sector on new iterations of DPI implementation
F9 Focus on future sustainability
SV3 Weak institutions
SV5 Unsustainabilit
O2.7 Design systems to capture evolving user needs
O2 Evolve with evidence
R13 Exclusion
SV1 Digital distrust,
O2.8 Leverage analytics for ongoing evaluation and informed decision-making.
O2 Evolve with evidence
SV3 Weak institutions
O2.9 Establish mechanisms to assess the value users derivearrow-up-right
O2 Evolve with evidence
R13 Exclusion
SV1 Digital distrust,
O4.7 Invite security audits by third parties
O4 Assure data security by design
RS2 Digital insecurity,
SV4 Technical shortcomings
O5.6 Implement regular performance metrics tracking with predefined response protocols
O5 Ensure data protection during use
SV3 Weak institutions
RS2 Digital insecurity,
SV4 Technical shortcomings
O5.5 Ensure that access to personal information is based on the informed consent of the user that is freely given and can be withdrawn
O5 Ensure data protection during use
RS1 Privacy vulnerability,
RS4 Lack of recourse
O5.8 Create redress mechanisms that allow for bad actors (fraud, identity theft, data protection violations, etc) to be expelled.
O5 Ensure data protection during use
RS2. Digital insecurity
O5.3 Ensure digital preservation of records
O5 Ensure data protection during use
SV4 Technical shortcomings
O7.1 Establish governance frameworks that ensure transparency, accountability, and stakeholder participation
O7 Practice inclusive governance
SV3 Weak institutions
RI4 Disempowerment
O8.6 Ensure budgetary allocation for DPI financial sustainability and adequate resourcing for continuous development.
O8 Sustain financial viability
SV5 Unsustainability
O9.2 Develop a centralized platform for digital asset sharing and foster a community of practice for knowledge exchange
SV4 Technical shortcomings
O9.3 Nurture engagement with technical community and private actors
O9 Build and share open assets
SV4 Technical shortcomings
O9.4 Create an online repository of Open DPI components, reference architecture for maintenenace, review, improvement and engagement with technical community and private actors
O9 Build and share open assets
SV4 Technical shortcomings
SV3 Weak institutions

RS1 Privacy vulnerability

RS4 Lack of recourse

F5.2 Underpin identification systems (and other DPI systems) by legitimate, comprehensive, and enforceable legal and regulatory frameworks

F5 Uphold the rule of law

SV1 Digital distrust

SV3 Weak institutions

F6.2 Design and deploy mechanisms that provide individuals and communities with control over their personal and collective data

F6 Promote autonomy and agency

RI4 Disempowerment

SV1 Digital distrust

F7.1 Forward relevant stakeholder inputs to the DPI implementors.

F7 Foster community engagement

SV3 Weak institutions

RI4 Disempowerment

F9.2 Ensure adequate resourcing for continuous development.

F9 Focus on future sustainability

SV5 Unsustainability

O1.2 Establish policies that promote fair competition and require multiple participants in the ecosystem

O1 Leverage market dynamics

SV5 Unsustainability

O1.3 Mitigate the risk of market distortion and monopolies

O1 Leverage market dynamics

SV3 Weak institutions

O2.1 Assess DPI against alternative policy options

O2 Evolve with evidence

SV5 Unsustainability

RI1 Discrimination

O3.1 Verify the existence and enforcement of regulations, policies and procedures that mandate purpose limitation.

O3 Ensure data privacy by design

RS1 Privacy vulnerability

SV2 Weak rule of law

O3.2 Undertake a Data Protection Impact assessments and legislative reforms prior to DPI roll out

O3 Ensure data privacy by design

RS1 Privacy vulnerability

SV2 Weak rule of law

O3.3 Analyze stakeholder interests and implement approprate safeguards

O3 Ensure data privacy by design

RS1 Privacy vulnerability

SV2 Weak rule of law

O3.4 Provide features to protect users from tracking and profiling while allowing responsible data use

O3 Ensure data privacy by design

SV1 Digital distrust

RI4 Disempowerment

O4.1 Establish a framework for safe data storage and processing

O4 Assure data security by design

RS2 Digital insecurity

O4.2 Establish a cybersecurity framework for DPI

O4 Assure data security by design

RS2 Digital insecurity

O5.1 Implement privacy and data protection impact assessments prior roll-out

O5 Ensure data protection during use

SV2 Weak rule of law

RS1 Privacy vulnerability

O5.2 Require relying parties to register their DPI use cases in a public registry, detailing the specific functionalities and data attributes they intend to use.

O5 Ensure data protection during use

SV1 Digital distrust

O6.2 Understand the needs of affected communities and test the impact of DPI on these groups.

O6 Respond to gender, ability or age

RI4 Disempowerment

RI3 Exclusion

O6.3 Ensure equitable access to DPI

O6 Respond to gender, ability or age

RI2 Unequal access

RI3 Exclusion

O6.4 Include networks of human agents to help users utilize and engage with DPI systems

O6 Respond to gender, ability or age

RI2 Unequal access

RI3 Exclusion

O8.1 Estimate the costs of deployment, operational costs, and estimate payback period

O8 Sustain financial viability

SV5 Unsustainability

O8.2 Design the sustainable financing model for the DPI

O8 Sustain financial viability

SV5 Unsustainability

F3.2 Implement affirmative design measures
F3 Do not exclude
SV2 Weak rule of law
F5.1 Establish transparency and full documentation for data sharing arrangements
F5 Uphold the rule of law

F1 .4 Establish monitoring and mitigation teams

F1 Do no harm

SV1 Digital distrust,

SV4 Technical shortcomings

F2.2 Provide accessible in-person options for identity proofing and authentication

F2 Do not discriminate

here

R12 Unequal access,
RI1 Discrimination,
RS3 Physical insecurity
F2.3 Establish mechanisms to promote ongoing user awareness and engagement
F2 Do not discriminate
SV1 Digital distrust,
RI4 Disempowerment
F9.8 Build institutional memory
F9 Focus on future sustainability
SV5 Unsustainability,
SV3 Weak institution
F9.9 Document and maintain an archive on the outcomes of pilot studies, testing, and decision-making
F9 Focus on future sustainability
SV3 Weak institutions

R1 - Government

hashtag
Typical DPI-related roles and responsibilities of 'Government' include:

  • overall governance: from policymaking to public service delivery

  • creating policies to set development goals

  • guiding inclusive digitalization

  • providing budgetary support for development purposes and DPI development

  • providing proof of progress to constituents

  • listening to feedback and improving legislative, executive and judicial administration

hashtag
Click Next to explore the process recommendations in the

L3 - Development

To know more about this phase of the DPI life cycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risks

Conception and Scoping stage of the DPI life cycle.

F4.9 Insitutionalize oversight mechanisms
F4 Reinforce transparency and accountability
SV3 Weak institutions
F4.10 Adhere to open standards and modular architecture.
F4 Reinforce transparency and accountability
SV4 Technical shortcomings
RS2 Digital insecurity
O8.5 Focus on cost reduction
O8 Sustain financial viability
SV5 Unsustainability