Loading...
To know more about this phase of the DPI life cycle, click here
Click on any process listed below to learn about illustrative practices that can be implemented.
,
To know more about this phase of the DPI lifecycle, click here
RS1 Privacy vulnerability, SV2 Weak rule of law
F5.5 Implement independent oversight and impartial grievance adjudication.
F5 Uphold the rule of law
SV1 Digital distrust, RI4 Disempowerment
O2.5 Assess DPI against alternative policy optionsarrow-up-right
O2 Evolve with evidence
SV5 Unsustainability, RI1Discrimination
O3.7 Undertake a Data Protection Impact assessments and legislative reforms prior to DPI roll out
O3 Ensure data privacy by design
O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate
RI4 Disempowerment, SV2 Weak rule of law
O5.7 Oversee the implementation of privacy and data protection impact assessments prior roll-out.
O5 Ensure data protection during use
SV3 Weak institutions, RS1 Privacy vulnerability
O5.9 Assess existence of comprehensive data protection laws that outline the lawful processing, retention, and protection of personal data
SV2 Weak rule of law, RS1 Privacy vulnerability
SV2 Weak rule of law
O3.29 Audit data processed against the specified purpose that is being served
RS2 Digital insecurity, RS1 Privacy vulnerability
O3.3 Analyze stakeholder interests and implement approprate safeguards
RS1 Privacy vulnerability
O3.5 Enable third-party audits
O4.9 Mandate security audits by third parties
O4 Assure data security by design
RS2 Digital insecurity, SV1 Digital distrust
setting appropriate and effective guardrails
supervising and enforcing laws and regulations