arrow-left

All pages
gitbookPowered by GitBook
1 of 5

Loading...

Loading...

Loading...

Loading...

Loading...

L5 - Operations and Maintenance

To know more about this phase of the DPI life cycle, click here.

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

L1 - Conception and Scoping

To know more about this phase of the DPI life cycle, click .

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

F1.5 Assess system uptime to ensure reliability.
F1: Do no harm
SV1 Digital distrust

here
F4.10 Implement comprehensive reporting and accessibility protocols
F4: Reinforce transparency and accountability
SV1 Digital distrust
SV4. Technical shortcomings
F6.5 Implement optional features for user control over personal data
F6: Promote autonomy and agency
RI4 Disempowerment,
S1 Privacy vulnerability
F9.13 Implement public-private partnership frameworks for sustainable DPI implementation
F9: Focus on future sustainability
SV3 Weak institutions
O4.7 Implement a framework for safe data storage and processing
O4: Assure data security by design
RS2. Digital insecurity
S1 Privacy vulnerability
SV4. Technical shortcomings
O4.5 Implement data validation, completeness, and consistency checks
O4: Assure data security by design
RS2. Digital insecurity
O5.4 Conduct regular security audits to check encryption protocols
O5: Ensure data protection during use
RS2. Digital insecurity
S1 Privacy vulnerability
O5.5 Implement regular performance metrics tracking with predefined response protocols
O5: Ensure data protection during use
SV3 Weak institutions
RS2. Digital insecurity
SV4. Technical shortcomings
O3.26 Implement strict controls to enforce purpose limitation and restrict secondary data use
O3 Ensure data privacy by design
RS1 Privacy vulnerability,
SV1 Digital distrust

L2 - Strategy and Design

To know more about this phase of the DPI life cycle, click here.

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

,

,

,

,

,

, ,

, ,

F2.4 Design and implement backup processes for users who lack assumed documentation
F2: Do not discriminate
R13 Exclusion,
RI1 Discrimination
F4.10 Implement comprehensive reporting and accessibility protocols
F4: Reinforce transparency and accountability
SV1 Digital Distrust,
SV4 Technical shortcomings
F6.5 Implement optional features for user control over personal data
F6: Promote autonomy and agency
RI4 Disempowerment
RS1 Privacy vulnerability
O2.5 Implement rigorous testing protocols
O2: Evolve with evidence
SV3 Weak institutions
O3.14 Integrate strict data minimization protocols into design
O3: Ensure data privacy by design
RS1 Privacy vulnerability
O3.15 Implement strict controls to enforce purpose limitation and restrict secondary data use.
O3: Ensure data privacy by design
RS1 Privacy vulnerability
SV1 Digital distrust
O3.16 Embed strong standards of privacy from the start and integrate it into design and processes
O3: Ensure data privacy by design
O3.17 Ensure compliance with privacy laws and evaluate risks related to PII by conducting and publicly documenting privacy impact assessments for new or updated technologies and systems.
O3: Ensure data privacy by design
O3.18 Emphasize transparency and user empowerment in managing data.
O3: Ensure data privacy by design
RI4 Disempowerment
RS1 Privacy vulnerabilities
O3.19 Develop privacy requirements and select mitigation strategies, documenting and iterating your analysis as needed.
O3: Ensure data privacy by design
O.20 Ensure unobservability of Daily User Interactions by Design
O3: Ensure data privacy by design
RS1 Privacy vulnerability
O.21 Establish mechanisms to ensure a right to opt-out whenever appropriate
O3: Ensure data privacy by design
RI4 Disempowerment
RS1 Privacy vulnerability
O3.22 Ensure linkability, unobservability, and zero-knowledge proofs are the default
O3: Ensure data privacy by design
RS1 Privacy vulnerability
RS2 Digital insecurity
O3.23 Establish Robust Data Delinking Mechanisms once the purpose of the processing of personal information has been served
O3: Ensure data privacy by design
RS1 Privacy vulnerability
O3.24 Make alternative mechanisms besides biometrics available for enrollment for special cases (leave nobody behind)
O3: Ensure data privacy by design
O3.25 Ensure that biometric authentication is not mandatory
O3: Ensure data privacy by design
RI3 Exclusion
RS1 Privacy vulnerability
SV4 Technical shortcomings
O4.3 Ensure secure and auditable data handling
O4: Assure data security by design
RS2 Digital insecurity
RS1 Privacy vulnerability
SV4 Technical shortcomings
O6.6 Embed vulnerability in product design
O6: Respond to gender, ability or age
RI4 Disempowerment

R4 - Technology Provider

hashtag
Typical DPI-related roles and responsibilities of 'Technology Providers' include:

  • providing a focal point for technical work, risk identification and mitigation strategies

  • having influence over and advising on actual implementation through to maintenance and support of DPI

hashtag
Click Next to explore the process recommendations in the

Conception and Scoping stage of the DPI Lifecycle.

L3 - Development

To know more about this phase of the DPI life cycle, click here.

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risk

,

,

,

,

,

,

,

F4.12 Ensure accountability through records controls
F4: Reinforce transparency and accountability
SV4 Technical shortcomings
RS4 Lack of recourse
F6.5 Implement optional features for user control over personal data
F6: Promote autonomy and agency
RI4 Disempowerment
RS1 Privacy vulnerability
O2.5 Implement rigorous testing protocols
O2: Evolve with evidence
SV4 Technical Shortcomings
O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate
O3: Ensure data privacy by design
RI4 Disempowerment
RS1 Privacy vulnerability
O3.4 Provide features to protect users against tracking and profiling
O3: Ensure data privacy by design
SV1 Digital distrust
RI4 Disempowerment
O4.4 Establish a trusted—unique, secure, and accurate—identity. Make more specific to this process
O4: Assure data security by design
SV1 Digital distrust
RI4 Disempowerment
O4.5 Implement data validation, completeness, and consistency checks
O4: Assure data security by design
RS2 Digital insecurity
O4.6 Use an established cybersecurity framework
O4: Assure data security by design
RS2 Digital insecurity
O5.3 Ensure digital presevation of records
O5: Ensure data protection during use
SV4 Technical shortcomings
RS2 Digital insecurity
O6.7 Ensure that DPI are linguistically appropriate for the whole population
O6: Respond to gender, ability or age
RI3 Exclusion
SV4 Technical shortcoming
O9.1 Ensure modularity and reusability across sectors, enabling evolution with society by unbundling DPI into core components (e.g., digital identity, payments, data sharing)
O9: Build and share open assets
SV4 Technical shortcomings