arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

L1 - Conception and Scoping

To know more about this phase of the DPI life cycle, click here

Click on any process listed below to learn about illustrative practices that can be implemented.

Process
Principle
Risks avoided

,

,

,

,

,

,

,

F1.2 Incorporate legal safeguards against coercive measures of enforcement
F1 Do no harm
SV2 Weak rule of law
RI4 Disempowerment
F5.4 Establish appropriate legal framework to govern DPI initiatives, ensuring clarity on scope, purpose, and limitations.
F5 Uphold the rule of law
RS1 Privacy vulnerability
SV2 Weak rule of law
F5.5 Implement independent oversight and impartial grievance adjudication.
F5 Uphold the rule of law
SV1 Digital distrust
RI4 Disempowerment
O2.5 Assess DPI against alternative policy optionsarrow-up-right
O2 Evolve with evidence
SV5 Unsustainability,
RI1Discrimination
O3.7 Undertake a Data Protection Impact assessments and legislative reforms prior to DPI roll out
O3 Ensure data privacy by design
RS1 Privacy vulnerability
SV2 Weak rule of law
O3.21 Establish mechanisms to ensure a right to opt-out whenever appropriate
O3 Ensure data privacy by design
RI4 Disempowerment
SV2 Weak rule of law
O5.7 Oversee the implementation of privacy and data protection impact assessments prior roll-out.
O5 Ensure data protection during use
SV3 Weak institutions
RS1 Privacy vulnerability
O5.9 Assess existence of comprehensive data protection laws that outline the lawful processing, retention, and protection of personal data
O5 Ensure data protection during use
SV2 Weak rule of law
RS1 Privacy vulnerability