stakeholder 4
Open Source Communities
Open Source Communities
Open Source Communities
Who are they?
Organised or semi-organised, self-governing and often an ad-hoc community of contributors constituted for the development of projects that are open-source.
What do they do?
Supports the development of standards and protocols, builds open-source technology, provides intellectual resources (e.g. through volunteering), and advocates for open-source adoption.
Examples
Companies such as Opin Kerfi and Roksnet are open source contributors for the development of X-Tee
Filter By:
all
Law
Policy
Technical Standard
Operational Guideline
PRINCIPLE 2: ADHERE TO
PRIVACY AND SECURITY STANDARDS
Technical Standard
Implement encryption and security safeguards for processing or storing personal data
P2.T6/T
This is the process of converting information into a form that is unreadable by unauthorised individuals. Encryption should be integrated into the design and development of DPI infrastructure from its inception and must also align with relevant legal and regulatory frameworks. Best practices can include the adoption of industry-recognized encryption standards and internal data management protocols.
Rationale
Encryption plays a crucial role in ensuring the confidentiality, integrity, and authenticity of data by acting as a powerful safeguard against unauthorised data exploitation, breaches, and cyber threats. By encrypting data, DPIs can mitigate the risk of sensitive information being intercepted or compromised in their storage, transmission and processing.
Practice
India:
UPI: NCPI’s UPI Procedural guidelines mandate that “all the UPI transaction data should be stored in the app providers’ end in encrypted format”.
Estonia:
X-Tee: The ID card carries a chip with embedded files, and uses 384-bit ECC public key encryption.
Stakeholders
PUBLIC SECTOR
PRIVATE SECTOR
OPEN-SOURCE COMMUNITIES
DEVELOPMENT ACTORS
Lifecycle
DEVELOPMENT
DEPLOYMENT
Tool
6
Tool
7
PRINCIPLE 3: Promote collaboration
and co-creation towards and public benefit
Tool
1
Tool
2
Tool
4
Policy
Establish codified consultation processes for developments within the DPI
P3.T1/P
These take the form of processes such as public notifications on official websites, open forums, online surveys, or structured consultations with specific stakeholder groups. Codification in this regard fosters a structured approach to gathering input, conducting impact assessments, and incorporating feedback into decision-making.
Rationale
Public notices and proactive consultations throughout the lifecycle of DPI serve as a means to engage the larger community and help create a structured and accountable framework that promotes openness, transparency, and stakeholder inputs on potential concerns with any developments in the system. This ensures that the decision-making process is not confined to a select few.
Practice
India:
ONDC: ONDC holds frequent meetings with network participants that are a part of the user council to discuss crucial policy developments, and publish a summary of proceedings for all meetings.
Estonia:
X-Tee: The Bills Information System (EIS) is a digital platform in Estonia for inter-institutional document coordination, government and parliamentary submission, and public consultations, allowing public tracking of drafts, document searching, and participation in the legislative process.
Stakeholders
PUBLIC SECTOR
PRIVATE SECTOR
OPEN-SOURCE COMMUNITIES
DEVELOPMENT ACTORS
CSOs and END USERS
Lifecycle
CONCEPTION
DEVELOPMENT
ADAPTATION
Filter By:
all
Law
Policy
Technical Standard
Operational Guideline
PRINCIPLE 2: ADHERE TO
PRIVACY AND SECURITY STANDARDS
Technical Standard
Implement encryption and security safeguards for processing or storing personal data
P2.T6/T
This is the process of converting information into a form that is unreadable by unauthorised individuals. Encryption should be integrated into the design and development of DPI infrastructure from its inception and must also align with relevant legal and regulatory frameworks. Best practices can include the adoption of industry-recognized encryption standards and internal data management protocols.
Rationale
Encryption plays a crucial role in ensuring the confidentiality, integrity, and authenticity of data by acting as a powerful safeguard against unauthorised data exploitation, breaches, and cyber threats. By encrypting data, DPIs can mitigate the risk of sensitive information being intercepted or compromised in their storage, transmission and processing.
Practice
India:
UPI: NCPI’s UPI Procedural guidelines mandate that “all the UPI transaction data should be stored in the app providers’ end in encrypted format”.
Estonia:
X-Tee: The ID card carries a chip with embedded files, and uses 384-bit ECC public key encryption.
Stakeholders
PUBLIC SECTOR
PRIVATE SECTOR
OPEN-SOURCE COMMUNITIES
DEVELOPMENT ACTORS
Lifecycle
DEVELOPMENT
DEPLOYMENT
Tool
6
Tool
7
PRINCIPLE 3: Promote collaboration
and co-creation towards and public benefit
Tool
1
Tool
2
Tool
4
Policy
Establish codified consultation processes for developments within the DPI
P3.T1/P
These take the form of processes such as public notifications on official websites, open forums, online surveys, or structured consultations with specific stakeholder groups. Codification in this regard fosters a structured approach to gathering input, conducting impact assessments, and incorporating feedback into decision-making.
Rationale
Public notices and proactive consultations throughout the lifecycle of DPI serve as a means to engage the larger community and help create a structured and accountable framework that promotes openness, transparency, and stakeholder inputs on potential concerns with any developments in the system. This ensures that the decision-making process is not confined to a select few.
Practice
India:
ONDC: ONDC holds frequent meetings with network participants that are a part of the user council to discuss crucial policy developments, and publish a summary of proceedings for all meetings.
Estonia:
X-Tee: The Bills Information System (EIS) is a digital platform in Estonia for inter-institutional document coordination, government and parliamentary submission, and public consultations, allowing public tracking of drafts, document searching, and participation in the legislative process.
Stakeholders
PUBLIC SECTOR
PRIVATE SECTOR
OPEN-SOURCE COMMUNITIES
DEVELOPMENT ACTORS
CSOs and END USERS
Lifecycle
CONCEPTION
DEVELOPMENT
ADAPTATION
Note: This tool is best viewed ON a desktop/laptop
Aapti Institute
37, Aga Abbas Ali Rd, Halasuru
Yellappa Chetty Layout, Sivanchetti Gardens Bengaluru, Karnataka 560042
For inquiries
2024 Aapti All right reserved.
Privacy Policy
Terms of Service
Cookies Settings
Note: This tool is best viewed ON a desktop/laptop
Aapti Institute
37, Aga Abbas Ali Rd, Halasuru
Yellappa Chetty Layout, Sivanchetti Gardens Bengaluru, Karnataka 560042
For inquiries
2024 Aapti All right reserved.
Privacy Policy
Terms of Service
Cookies Settings
Note: This tool is best viewed ON a desktop/laptop
Aapti Institute
37, Aga Abbas Ali Rd, Halasuru
Yellappa Chetty Layout, Sivanchetti Gardens Bengaluru, Karnataka 560042
For inquiries
2024 Aapti All right reserved.
Privacy Policy
Terms of Service
Cookies Settings
