arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

L4 - Deployment

To know more about this phase of the DPI life cycle - Click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risks avoided

F3.1 Provide accessible in-person options for identity proofing and authentication
F3 Do not discriminate
RI2 - Unequal access , RI3 - Exclusion
O1.1 Equip CSOs and civic tech organizations with tools and partnerships
O1 Leverage market dynamics
SV.1 Digital distrust , RI3. - Exclusion
O6.1 Raise awareness if the DPI guidance is not linguistically appropriate for the whole population
O6 Respond to gender, ability or age
RI2 - Unequal access , RI3 - Exclusion