arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

L5 - Operations and Maintenance

To know more about this phase of the DPI lifecycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risks

,

,

,

F4.14 Oversee the publication of reports on user complaints and inclusion metrics.
F4 Reinforce transparency and accountability
RS4 Lack of recourse
SV3 Weak institutions
F9.10 Set a normative framework for public-private partnership to implement DPI frameworks
F9 Focus on future sustainability
SV2 Weak rule of law
O3.29 Audit data processed against the specified purpose that is being served
O3 Ensure data privacy by design
RS2 Digital insecurity
RS1 Privacy vulnerability
O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate
O3 Ensure data privacy by design
RI4 Disempowerment
SV2 Weak rule of law
O3.3 Analyze stakeholder interests and implement approprate safeguards
O3 Ensure data privacy by design
RS1 Privacy vulnerability
O3.5 Enable third-party audits
O3 Ensure data privacy by design
RS1 Privacy vulnerability
O4.9 Mandate security audits by third parties
O4 Assure data security by design
RS2 Digital insecurity,
SV1 Digital distrust