stakeholder 4

Open Source Communities

Open Source Communities

Open Source Communities

Who are they?

Organised or semi-organised, self-governing and often an ad-hoc community of contributors constituted for the development of projects that are open-source.  

What do they do?

Supports the development of standards and protocols, builds open-source technology, provides intellectual resources (e.g. through volunteering), and advocates for open-source adoption.

Examples

Companies such as Opin Kerfi and Roksnet are open source contributors for the development of X-Tee

Filter By:

all

Law

Policy

Technical Standard

Operational Guideline

PRINCIPLE 2: ADHERE TO

PRIVACY AND SECURITY STANDARDS

Technical Standard

Implement encryption and security safeguards for processing or storing personal data

P2.T6/T

This is the process of converting information into a form that is unreadable by unauthorised individuals. Encryption should be integrated into the design and development of DPI infrastructure from its inception and must also align with relevant legal and regulatory frameworks. Best practices can include the adoption of industry-recognized encryption standards and internal data management protocols.

Rationale

Encryption plays a crucial role in ensuring the confidentiality, integrity, and authenticity of data by acting as a powerful safeguard against unauthorised data exploitation, breaches, and cyber threats. By encrypting data, DPIs can mitigate the risk of sensitive information being intercepted or compromised in their storage, transmission and processing.

Practice

India:

UPI: NCPI’s UPI Procedural guidelines mandate that “all the UPI transaction data should be stored in the app providers’ end in encrypted format”.

Estonia:

X-Tee: The ID card carries a chip with embedded files, and uses 384-bit ECC public key encryption.

Stakeholders

PUBLIC SECTOR

PRIVATE SECTOR

OPEN-SOURCE COMMUNITIES

DEVELOPMENT ACTORS

Lifecycle

DEVELOPMENT

DEPLOYMENT

Tool

6

Tool

7

PRINCIPLE 3: Promote collaboration
and co-creation towards and public benefit

Tool

1

Tool

2

Tool

4

Policy

Establish codified consultation processes for developments within the DPI

P3.T1/P

These take the form of processes such as public notifications on official websites, open forums, online surveys, or structured consultations with specific stakeholder groups. Codification in this regard fosters a structured approach to gathering input, conducting impact assessments, and incorporating feedback into decision-making.

Rationale

Public notices and proactive consultations throughout the lifecycle of DPI serve as a means to engage the larger community and help create a structured and accountable framework that promotes openness, transparency, and stakeholder inputs on potential concerns with any developments in the system. This ensures that the decision-making process is not confined to a select few.

Practice

India:

ONDC: ONDC holds frequent meetings with network participants that are a part of the user council to discuss crucial policy developments, and publish a summary of proceedings for all meetings.

Estonia:

X-Tee: The Bills Information System (EIS) is a digital platform in Estonia for inter-institutional document coordination, government and parliamentary submission, and public consultations, allowing public tracking of drafts, document searching, and participation in the legislative process.

Stakeholders

PUBLIC SECTOR

PRIVATE SECTOR

OPEN-SOURCE COMMUNITIES

DEVELOPMENT ACTORS

CSOs and END USERS

Lifecycle

CONCEPTION

DEVELOPMENT

ADAPTATION

Filter By:

all

Law

Policy

Technical Standard

Operational Guideline

PRINCIPLE 2: ADHERE TO

PRIVACY AND SECURITY STANDARDS

Technical Standard

Implement encryption and security safeguards for processing or storing personal data

P2.T6/T

This is the process of converting information into a form that is unreadable by unauthorised individuals. Encryption should be integrated into the design and development of DPI infrastructure from its inception and must also align with relevant legal and regulatory frameworks. Best practices can include the adoption of industry-recognized encryption standards and internal data management protocols.

Rationale

Encryption plays a crucial role in ensuring the confidentiality, integrity, and authenticity of data by acting as a powerful safeguard against unauthorised data exploitation, breaches, and cyber threats. By encrypting data, DPIs can mitigate the risk of sensitive information being intercepted or compromised in their storage, transmission and processing.

Practice

India:

UPI: NCPI’s UPI Procedural guidelines mandate that “all the UPI transaction data should be stored in the app providers’ end in encrypted format”.

Estonia:

X-Tee: The ID card carries a chip with embedded files, and uses 384-bit ECC public key encryption.

Stakeholders

PUBLIC SECTOR

PRIVATE SECTOR

OPEN-SOURCE COMMUNITIES

DEVELOPMENT ACTORS

Lifecycle

DEVELOPMENT

DEPLOYMENT

Tool

6

Tool

7

PRINCIPLE 3: Promote collaboration
and co-creation towards and public benefit

Tool

1

Tool

2

Tool

4

Policy

Establish codified consultation processes for developments within the DPI

P3.T1/P

These take the form of processes such as public notifications on official websites, open forums, online surveys, or structured consultations with specific stakeholder groups. Codification in this regard fosters a structured approach to gathering input, conducting impact assessments, and incorporating feedback into decision-making.

Rationale

Public notices and proactive consultations throughout the lifecycle of DPI serve as a means to engage the larger community and help create a structured and accountable framework that promotes openness, transparency, and stakeholder inputs on potential concerns with any developments in the system. This ensures that the decision-making process is not confined to a select few.

Practice

India:

ONDC: ONDC holds frequent meetings with network participants that are a part of the user council to discuss crucial policy developments, and publish a summary of proceedings for all meetings.

Estonia:

X-Tee: The Bills Information System (EIS) is a digital platform in Estonia for inter-institutional document coordination, government and parliamentary submission, and public consultations, allowing public tracking of drafts, document searching, and participation in the legislative process.

Stakeholders

PUBLIC SECTOR

PRIVATE SECTOR

OPEN-SOURCE COMMUNITIES

DEVELOPMENT ACTORS

CSOs and END USERS

Lifecycle

CONCEPTION

DEVELOPMENT

ADAPTATION

Note: This tool is best viewed ON a desktop/laptop

Aapti Institute

37, Aga Abbas Ali Rd, Halasuru

Yellappa Chetty Layout, Sivanchetti Gardens Bengaluru, Karnataka 560042

For inquiries

Follow us

2024 Aapti All right reserved.

Privacy Policy

Terms of Service

Cookies Settings

Note: This tool is best viewed ON a desktop/laptop

Aapti Institute

37, Aga Abbas Ali Rd, Halasuru

Yellappa Chetty Layout, Sivanchetti Gardens Bengaluru, Karnataka 560042

For inquiries

Follow us

2024 Aapti All right reserved.

Privacy Policy

Terms of Service

Cookies Settings

Note: This tool is best viewed ON a desktop/laptop

Aapti Institute

37, Aga Abbas Ali Rd, Halasuru

Yellappa Chetty Layout, Sivanchetti Gardens Bengaluru, Karnataka 560042

For inquiries

Follow us

2024 Aapti All right reserved.

Privacy Policy

Terms of Service

Cookies Settings