Loading...
To know more about this phase of the DPI life cycle, click here
Click on any process listed below to learn about illustrative practices that can be implemented.
F1.2 Incorporate legal safeguards against coercive measures of enforcement
F1 Do no harm
SV2 Weak rule of law, RI4 Disempowerment
F5.4 Establish appropriate legal framework to govern DPI initiatives, ensuring clarity on scope, purpose, and limitations.
F5 Uphold the rule of law
RS1 Privacy vulnerability, SV2 Weak rule of law
F5.5 Implement independent oversight and impartial grievance adjudication.
SV1 Digital distrust, RI4 Disempowerment
O2.5 Assess DPI against alternative policy options
O2 Evolve with evidence
SV5 Unsustainability, RI1Discrimination
O3.7 Undertake a Data Protection Impact assessments and legislative reforms prior to DPI roll out
O3 Ensure data privacy by design
O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate
RI4 Disempowerment, SV2 Weak rule of law
O5.7 Oversee the implementation of privacy and data protection impact assessments prior roll-out.
O5 Ensure data protection during use
SV3 Weak institutions, RS1 Privacy vulnerability
O5.9 Assess existence of comprehensive data protection laws that outline the lawful processing, retention, and protection of personal data
SV2 Weak rule of law, RS1 Privacy vulnerability