arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

L2 - Strategy and Design

To know more about this phase of the DPI life cycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

,

,

,

F2.5 Recognise access to DPI-based public services as a human right
F2 Do not discriminate
RI3 Exclusion
F4.13 Establish requirements for auditable data trails to support dispute redressal
F4 Reinforce transparency and accountability
SV3 Weak institutions,
RS4 Lack of recourse
F7.5 Implement a whisteblower channel, allowing the public to address potential complaints
F7 Foster community engagement
RI2 Unequal access
RS4 Lack of recourse
F8.8 Set redress mechanisms and other consumer protection tools for failed/fraudulent financial transactions
F8 Ensure effective remedy and redress
RS4 Lack of recourse
SV3 Weak rule of law
O1.6 Enable transparency in the development of standards by standard-setting bodies
O1 Leverage market dynamics
RI3 Exclusion
O3.28 Undertake a Data Protection Impact assessments and legislative reforms prior to DPI roll out
O3 Ensure data privacy by design
RS1 Privacy vulnerability
SV2 Weak rule of law
O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate
O3 Ensure data privacy by design
RI4 Disempowerment,
SV2 Weak rule of law
O5.7 Oversee the implementation of privacy and data protection impact assessments prior roll-out
O5 Ensure data protection during use
RS1 Privacy vulnerability,
SV2 Weak rule of law
O8.7 Ensure that the price of using DPI is affordable to people and businesses
08 Sustain financial viability
RI2 Unequal access, RI3 Exclusion