arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

O4.3 Ensure secure and auditable data handling

O4: Assure data security by design

RS2 Digital insecurity, RS1 Privacy vulnerability, SV4 Technical shortcomings

L2: Strategy & Design

hashtag
Practices

  • Adopt a federated and decentralized architecture to enhance privacy and resilience by distributing data and control.

  • Utilize tokenization and data masking, implement granular electronic consent frameworks, enforce end-to-end encryption, and employ digital signatures and verifiable credentials to ensure robust, auditable, and trustworthy data management and transactions.

hashtag
Resources

References

CDPI (N/d). DPI Tech Architecture Principles. Centre for Digital Public Infrastructure. https://docs.cdpi.dev/the-dpi-wikipedia/dpi-tech-architecture-principles