DIGIT Core
PlatformDomainsAcademyDesign SystemFeedback
2.8
2.8
  • ☑️Introducing DIGIT Platform
    • DIGIT - Value Proposition
  • Platform
    • 🔎Overview
      • Principles
      • Architecture
        • Service Architecture
        • Infrastructure Architecture
        • Deployment Architecture
      • Technology
        • API Gateway
        • Open Source Tools
      • Checklists
        • API Checklist
        • Security Checklist
          • Security Guidelines Handbook
          • Security Flow - Exemplar
        • Performance Checklist
        • Deployment Checklist
      • UI Frameworks
        • React UI Framework
    • 🔧Core Services
      • Workflow Service
        • Setting Up Workflows
        • Configuring Workflows For An Entity
        • Workflow Auto Escalation
        • Migration To Workflow 2.0
      • Location Services
      • User Services
      • Access Control Services
      • PDF Generation Service
      • MDMS (Master Data Management Service)
        • Setting up Master Data
          • MDMS Overview
          • MDMS Rewritten
          • Configuring Tenants
          • Configuring Master Data
          • Adding New Master
          • State Level Vs City Level Master
      • Payment Gateway Service
      • User Session Management
      • Indexer Service
        • Indexer Configuration
      • URL Shortening Service
      • XState Core Chatbot
        • Xstate-Chatbot Message Localisation
        • XState-Chatbot Integration Document
      • NLP Engine Service
        • NLP Chatbot
      • SMS Template Approval Process
      • Telemetry Service
      • Document Uploader Service
      • Notification Enhancement Based On Different Channel
      • Report Service
        • Configuring New Reports
          • Impact Of Heavy Reports On Platform
          • Types Of Reports Used In Report Service
      • SMS Notification Service
        • Setting Up SMS Gateway
          • Using The Generic GET & POST SMS Gateway Interface
      • Survey Service
      • Persister Service
        • Persister Configuration
      • Encryption Service
        • Encryption Client Library
        • User Data Security Architecture
        • Guidelines for supporting User Privacy in a module
      • FileStore Service
      • ID Generation Service
      • Localization Service
        • Configuring Localization
          • Setup Base Product Localization
          • Configure SMS and Email
      • Email Notification Service
      • Searcher Service
      • Zuul Service
      • User OTP Service
      • OTP Service
      • Chatbot Service
      • National Dashboard Ingest
        • National Dashboard API Performance Testing Specs and Benchmark
        • National Dashboard: Steps for Index Creation
        • National Dashboard Adaptor Service
          • Deployment of Airflow DAG
          • Trigger Airflow DAG
          • Configure Airflow
          • Insert & Delete Data - Steps
          • Important Links & Credentials
          • Code Structure
          • KT Sessions
          • Pre-requisites For Enabling Adaptor
        • Revenue Maximisation
      • Audit Service
        • Signed Audit Performance Testing Results
      • Service Request
      • Self Contained Service Architecture (HLD)
      • Accelerators
        • Inbox Service
    • ✏️API Specifications
      • User
      • Access Control
      • Employee
      • Location
      • Localisation
      • Encryption
      • Indexer
      • File Store
      • Collection
      • DSS Ingest
      • HRMS
      • National Dashboard Ingest
      • WhatsApp Chatbot
      • Master Data Management
      • ID Generation
      • URL Shortner
      • Workflow Service
      • Workflow v2
      • Document Uploader Service
      • OTP Service
      • Reporting Service
      • PDF Generation Service
      • Payment Gateway Service
    • 🔐Data Protection & Privacy
      • Data Protection & Privacy Definitions
      • Legal Obligations For Privacy - eGov
      • Data Protection & Privacy - Global Best Practices
      • Guidelines
        • Platform Owner Guidelines
        • Implementing Agencies Guidelines
        • Admin Guidelines
        • Program Owner Guidelines
        • Data Security and Data Privacy
      • Data Privacy Policy Templates
        • eGov Data Privacy Policy
        • Implementing Agency Privacy Policy
        • Admin & Program Owner Privacy Policy
        • Supporting Agency Privacy Policy
      • Global Standards For All Roles
    • ▶️Get Started
      • Install DIGIT
      • Access DIGIT
      • Sandbox
      • Training and Certification
        • Training Resources
    • ⚒️Integrations
      • Payment
      • Notification
      • Transaction
      • Verification
      • View
      • Calculation
    • 🛣️Roadmap
    • 🎬Open Events
    • 👩‍💻Source Code
    • 👁️Project Plan
    • 📋Discussion Board
    • 🤝Contribute
  • Guides
    • 📓Installation Guide
      • DIGIT Deployment
      • Quick Setup
        • DIGIT Installation on Azure
        • DIGIT Installation on AWS
      • Production Setup
        • AWS
          • 1. Pre-requisites
          • 2. Understanding EKS
          • 3. Setup AWS Account
          • 4. Provisioning Infra Using Terraform
          • 5. Prepare Deployment Config
          • 6. Deploy DIGIT
          • 7. Bootstrap DIGIT
          • 8. Productionize DIGIT
          • FAQ
        • Azure
          • 1. Azure Pre-requisites
          • 2. Understanding AKS
          • 3. Infra-as-code (Terraform)
        • SDC
          • 1. SDC Pre-requisites
          • 2. Infra-as-code (Kubespray)
          • CI/CD Setup On SDC
        • CI/CD Set Up
          • CI/CD Build Job Pipeline Setup
        • Prepare Helm Release Chart
        • Deployment - Key Concepts
          • Security Practices
          • Readiness & Liveness
          • Resource Requests & Limits
          • Deploying DIGIT Services
          • Deployment Architecture
          • Routing Traffic
          • Backbone Deployment
    • 💽Data Setup Guide
      • User Module
      • Localisation Module
      • Location Module
    • 🚥Design Guide
      • Model Requirements
      • Design Services
      • Design User Interface
      • Checklists
    • ⚒️Developer Guide
      • Pre-requisites Training Resources
      • Backend Developer Guide
        • Section 0: Prep
          • Development Pre-requisites
          • Design Inputs
            • High Level Design
            • Low Level Design
          • Development Environment Setup
        • Section 1: Create Project
          • Generate Project Using API Specs
          • Create Database
          • Configure Application Properties
          • Import Core Models
          • Implement Repository Layer
          • Create Validation & Enrichment Layers
          • Implement Service Layer
          • Build The Web Layer
        • Section 2: Integrate Persister & Kafka
          • Add Kafka Configuration
          • Implement Kafka Producer & Consumer
          • Add Persister Configuration
          • Enable Signed Audit
          • Run Application
        • Section 3: Integrate Microservices
          • Integrate IDGen Service
          • Integrate User Service
          • Add MDMS Configuration
          • Integrate MDMS Service
          • Add Workflow Configuration
          • Integrate Workflow Service
          • Integrate URL Shortener Service
        • Section 4: Integrate Billing & Payment
          • Custom Calculator Service
          • Integrate Calculator Service
          • Payment Back Update
        • Section 5: Other Advanced Integrations
          • Add Indexer Configuration
          • Certificate Generation
        • Section 6: Run Final Application
        • Section 7: Build & Deploy Instructions
        • FAQs
      • Flutter UI Developer Guide
        • Introduction to Flutter
          • Flutter - Key Features
          • Flutter Architecture & Approach
          • Flutter Pre-Requisites
        • Setup Development Environment
          • Flutter Installation & Setup Guide
          • Setup Device Emulators/Simulators
          • Run Application
        • Build User Interfaces
          • Create Form Screen
        • Build Deploy & Publish
          • Build & Deploy Flutter Web Application
          • Generate Android APKs & App Bundles
          • Publishing App Bundle To Play Store
        • State Management With Provider & Bloc
          • Provider State Management
          • BloC State Management
        • Best Practices & Tips
        • Troubleshooting
      • UI Developer Guide
        • DIGIT-UI
        • Android Web View & How To Generate APK
        • DIGIT UI Development Pre-requisites
        • UI Configuration (DevOps)
        • Local Development Setup
        • Run Application
        • Create New Screen In DIGIT-UI
          • Create Screen (FormComposer)
          • Inbox/Search Screen
          • Workflow Component
        • Customisation
          • Integrate External Web Application/UI With DIGIT UI
          • Utility - Pre-Process MDMS Configuration
          • CSS Customisation
        • Citizen Module Setup
          • Sample screenshots
          • Project Structure
          • Install Dependency
          • Import Required Components
          • Write Citizen Module Code
          • Citizen Landing Screen
        • Employee Module Setup
          • Write Employee Module Code
        • Build & Deploy
        • Setup Monitoring Tools
        • FAQs
          • Troubleshoot Using Browser Network Tab
          • Debug Android App Using Chrome Browser
    • 🔄Operations Guide
      • DIGIT - Infra Overview
      • Setup Central Instance Infra
      • Central Monitoring Dashboard Setup
      • Kubernetes
        • RBAC Management
        • DB Dump - Playground
      • Setup Jenkins - Docker way
      • GitOps
        • Git Client installation
        • GitHub organization creation
        • Adding new SSH key to it
        • GitHub repo creation
        • GitHub Team creation
        • Enabling Branch protection:
        • CODEOWNER Reviewers
        • Adding Users to the Git
        • Setting up an OAuth with GitHub
        • Fork (Fork the mdms,config repo with a tenant-specific branch)
      • Working with Kubernetes
        • Installation of Kubectl
      • Containerizing application using Docker
        • Creation of Dockerhub account
      • Infra provisioning using Terraform
        • Installation of Terraform
      • Customization of existing tf templates
      • Cert-Manager
        • Obtaining SSL certificates with the help of cluster-issuer
      • Moving Docker Images
      • Pre and post deployment checklist
      • Multi-tenancy Setup
      • Availability
        • Infrastructure
        • Backbone services
          • Database
          • Kafka
          • Kafka Connect
          • Elastic search
            • ElasticSearch Direct Upgrade
            • Elastic Search Rolling Upgrade
        • Core services
        • DIGIT apps
        • DSS dashboard
      • Observability
        • ES-Curator to clear old logs/indices
        • Monitoring
        • Tracing
        • Jaeger Tracing Setup
        • Logging
        • eGov Monitoring & Alerting Setup
        • eGov Logging Setup
      • Performance
        • What to monitor?
          • Infrastructure
          • Backbone services
          • Core services
        • Identifying bottlenecks
        • Solutions
      • Handling errors
      • Security
      • Reliability and disaster recovery
      • Privacy
      • Skillsets/hiring
      • Incident management processes
      • Kafka Troubleshooting Guide
        • How to clean up Kafka logs
        • How to change or reset consumer offset in Kafka?
      • SRE Rituals
      • FAQs
        • I am unable to login to the citizen or employee portal. The UI shows a spinner.
        • My DSS dashboard is not reflecting accurate numbers? What can I do?
      • Deployment using helm
        • Helm installation:
        • Helm chart creation
        • Helm chart customization
      • How to Dump Elasticsearch Indexes
      • Deploy Nginx-Ingress-Controller
      • Deployment Job Pipeline Setup
      • OAuth2-Proxy Setup
      • Jira Ticket Creation
  • Reference
    • 👉Setup Basics
      • Setup Requirements
        • Tech Enablement Training - Essential Skills and Pre-requisites
        • Tech Enablement Training (eDCR) - Essential Skills and Prerequisites
          • Development Control Rules (Digit-DCR)
          • eDCR Approach Guide
        • DIGIT Rollout Program Governance
        • DevOps Skills Requirements
        • Infra Requirements
        • Team Composition for DIGIT Implementation
        • Infra Best Practices
        • Operational Best Practices
        • Why Kubernetes For DIGIT
      • Supported Clouds
        • Google Cloud
        • Azure
        • AWS
        • VSphere
        • SDC
      • Deployment - Key Concepts
        • Security Practices
        • CI/CD
        • Readiness & Liveness
        • Resource Requests & Limits
      • Understanding ERP Stack
        • ERP Monolithic Architecture
        • ERP Hybrid Architecture
        • ERP Coexistence Architecture
        • APMDP-HYBRID-INFRA ARCHITECTURE
        • eGov SmartCity eGovernance Suite
        • ERP Deployment Process
        • ERP Release Process
        • ERP User Guide
      • Deploying DIGIT Services
        • Deployment Architecture
        • Routing Traffic
        • Backbone Deployment
      • Troubleshooting
        • Distributed Tracing
        • Logging
        • Monitoring & Alerts
    • 📥Reference Reads
      • Analytics
      • DevSecOps
      • Low Code No Code
        • Application Specification
      • Beneficiary Eligibility
      • Government and Open Digital Platforms
      • Microservices and Low Code No Code
      • Registries
      • Platform Orientation - Overview
    • 🔏Data Security
      • Signed Data Audit
      • Encryption Techniques
      • Approaches to handle Encrypted Data
    • ❕Privacy
    • 🕹️DevOps
      • 1. How DNS works
      • 2. Load Balancer
      • 3. SSL/Cert-manager
      • 4.Ingress,WAF
      • 5.VPC
      • 6.Subnets
      • 7.EKS
      • 8.Worker Node Group
      • 9.RDS
      • 10.NAT
      • 11.Internet Gateway
      • 12.Block Storage (EBS Volumes)
      • 13.Object Storage (S3)
      • 14. Telemetry
Powered by GitBook

All content on this page by eGov Foundation is licensed under a Creative Commons Attribution 4.0 International License.

On this page
  • Scope
  • Implementation Stages
  • B.1 Stage 0 - Program Setup
  • B.2. Stage 1 - Program Kickoff
  • B.3 Stage 2 - Solution Design
  • B.4 Stage 3 - Customization & Configuration
  • B.5 Stage 4 - UAT & Go-Live
  • B.6 Stage 5 - Statewide/ULB-wide Rollout
  • B.7. Stage 6- Sustenance & Ongoing Improvement

Was this helpful?

  1. Platform
  2. Data Protection & Privacy
  3. Guidelines

Implementing Agencies Guidelines

Data protection and privacy guidelines for DIGIT implementations for implementing agencies

Scope

DIGIT, an open-source platform, enables governments and service providers to provide interdepartmental coordination and citizen-facing service delivery systems - currently, in urban governance, sanitation, health, and public finance management.

As citizen data is collected and used for such governance services, data privacy and protection measures are required to ensure this data is managed responsibly and safely.

This document is created to be an online guide, providing guidelines for Implementing agencies to maintain data privacy and protect individuals’ data.

  • Readers can use this to identify the steps they must take, in their capacity as implementing agencies, to ensure data privacy and protection in the context of a DIGIT or DIGIT-like implementation.

  • It can also provide source material for privacy policies, which should be included in each portal & application.

  • This is not a technical reference or documentation. It serves as a policy guideline.

References made to DIGIT are also applicable to other platforms similar to DIGIT. Not all parts of the guidelines or featured content may match the reader's platform or context, hence this document is open to be referred to in parts as needed.

These guidelines are to be read through the eyes of roles that are part of the Implementation Agencies (IA) offices in the journey of adopting a DIGIT-based system or platforms similar to DIGIT in a government entity/ies.

As per the (DPDP Act) an IA would be a data processor. If the IA gets involved in deciding the purpose and means of the data processing, then it would become a . The guidelines below cover measures to be in compliance with the DPDP Act.

If a government authority adopts DIGIT as a citizen service platform, then these guidelines are apt. Some points in the guidelines may not be relevant to platforms other than DIGIT in the governance ecosystem. Hence these guidelines have to be read as advisory.

The previous document in this series covered the guidelines for platform owners (PO), and administering authorities (AA).

For this document to understand what each program owner should do to safeguard data privacy and protection (DPP), it is important to understand what IA does at each phase of the implementation of DIGIT.

Implementation Stages

B.1 Stage 0 - Program Setup

What is a program?

A program can be a delivery of any government service/s which the AA is mandated to provide to citizens for which it requires a platform. Defining the scope of the program is within the power of an AA.

B.1.1 What happens at this stage?

  • A Memorandum of Understanding is signed between the AA and the platform owners. A Prog can also be a party to the MoU or maybe an equal power holding or subordinate entity of the AA (which signs the MOU).

  • The AA appoints a State Program Head/Nodal Officer

  • Resources and funding for the program are identified.

  • The program-specific procurement process is defined.

  • IA team onboarding is initiated.

B.1.2 IA’s role at Stage 0:

  • At this stage, the IA becomes a part of the program.

  • An official MoU or contract is entered into detailing the terms and conditions between the IA and the AA or Prog

  • IA begins to understand the needs of the program

  • IA begins making an implementation plan, that shall be published in the next stage

B.1.3 To-Do’s

Must-haves:

  • IA presents its own data management and privacy policy to the AA or Prog. This would make the IA’s stand on DPP very clear and easier for the AA or Prog to design a data sharing/access agreement with the IA

  • The clauses and language in the MoU/ data access/sharing agreement with the AA or Prog must include:

  • Data will always be controlled by the AA or the Prog, and IA will never have data-controlling power (IA must not decide the purpose and means of the processing of the data)

  • IA will be restricted from third-party data sharing without authorization from the AA or Prog

  • IA will not collect personal identifying information (PII) from citizens directly or indirectly without written permission by the AA or Prog

  • Access to PII by the IA team should be role-based, through strict logins audited and reported to the AA or Prog

  • IA will access PII only for purposes specified and authorized by the AA or Prog

  • IA will not keep any PII backup or secondary copy of such data

  • Data breach consequences - who holds accountability for data breaches

  • In the implementation plan, the IA must push for maintaining the data safely and securely from the beginning of the program life cycle to avoid any data or confidential breach. For example - the IA can detail a data-sharing mechanism that masks direct PII from being visible to IA representatives

  • The IA should make clear the access, processing and sharing of data in the implementation plan to avoid future confusion on data accountability

  • At every step of the implementation plan, the IA must reduce or eliminate its access to PII

  • Privacy enhancing features like encryption, privacy by default steps including purposeful processing of data, data deletion post use and strictly restricted access to PII must find a big space in the implementation plan

Preferable practices:

  • Assist/advise the AA/Prog in mapping out resources and funding needs for maintaining safe data protection and security structures ( hardware and software)

  • Embedding DPP practices in the implementation plan. For example, in the processes of data migration and data processing, the system does not permit sensitive data to be visible to unauthorized roles, strict logins are maintained, and IA employees are trained in safe data handling.

  • Help the AA or Prog make a program-specific data privacy policy (if they don’t have one made already for the specific program).

B.2. Stage 1 - Program Kickoff

B.2.1 What happens in Stage 1

  • Publishing of the program charter and implementation plan.

  • Master data collection begins in Pilot (selected) ULBs (Urban Local Body)

  • Cloud Infrastructure is procured

  • Program branding is done (name, logo, tagline etc.)

B.2.2 What does the IA team do in Stage 1

  • Here data starts to be shared with the IA for the deployment of the modules

  • The IA and the AA/Prog publish the implementation plan

  • IA team begins looking for resources for the deployment of the modules

B.2.3 To-Dos

Must-haves

  • The IA restricts or disallows any direct PII from being sent to it. The IA intimates the AA/Prog representatives to mask or encrypt the data in the manner

  • IA trains AA and its own employees in data best practices like purpose-based data access, strict password controls and data sharing hygiene and makes all aware of the legal consequences of .

  • To follow the DPDP Act :

    • the IA maintains an audit log of the data ( to provide a summary of personal data processed to the data fiduciary)

  • Maintain the completeness, accuracy, and consistency of personal data [ Section 8(3)]

  • Implement appropriate technical and organizational measures to implement the Act [Sec 8(4)]

  • Intimate the data fiduciary on any personal data breach [so that the data fiduciary can inform the Board and data principal about such a breach - Sec 8(6)]

Preferable/Good practices

  • IA encourages AA or Prog to:

  • Collect data only if it is needed for a specific legitimate reason and defined purpose (, ).

  • Proactively inform the citizens about the legal basis and reason/purpose for their data being collected (when collected directly from the resident)

  • Data is encrypted or masked when data is being migrated from paper to digital or old or new digital systems

  • Strategies for safe storage of data (on paper or digitally) are set.

  • Paper-based data is destroyed after a defined migration period (AA or Prog to define a data deletion period post-migration).

  • Create a data dashboard to show the nature of data collected and their corresponding purposes and uses (for transparency and awareness of citizens).

  • IA onboards a team with appropriate Data privacy and protection safeguarding skill sets

  • The implementation kickoff workshops include training on purposeful master data collection (for the next stage) in an informed and transparent manner (letting the resident know why they are collecting the data).

B.3 Stage 2 - Solution Design

B.3.1 What happens in Stage 2

  • Standardized ontologies (uniform terminology for easier understanding), processes and workflows are created.

  • Master data collected in the desired format.

  • Agreement on program-specific product customisations is required.

  • A detailed program plan is made and the tracking mechanism is finalized.

B.3.2 What does the IA do at stage 2

  • Product specifications with AA are finalized

  • IA begins the process of adopting the ontologies, designing/re-designing modules and workflow creations as per the needs of AA or Program.

B.3.3 To-Dos

Must-haves

In workflows and processes-

  • PII is kept in an encrypted/ masked manner through the workflows.

  • Strict data access requirements are in place (audit logs, restricted access points)

  • Data is maintained in secure storage

  • Data sharing is restricted through permitted devices, channels and to selected roles

Preferable/Good practices

  • IA conducts a risk assessment of the customizations asked for by the AA or Prog checking () risks and harms that may cause a breach of data privacy and confidentiality. will take into consideration the impact that data use may have on an individual(s) and/or group(s) of individuals, whether known or unknown at the time of data use[8].

  • Include security checks at each level of implementation of the platform for data to be kept secure and safe.

B.4 Stage 3 - Customization & Configuration

B.4.1 What happens in this stage

  • A configured/customized product is created that is ready for UAT.

  • Monitoring Reports and Dashboards are ready (to understand the rollout of modules).

  • Product artefacts like user guides are created.

  • Identification of participants for the UAT session.

B.4.2 What does the IA do in Stage 3

  • Delivers the product to the relevant team of the Pilot for User acceptance testing (UAT)

  • Helps the AA/Prog team deploy the product module/s in the ULB for testing

  • Assists in creating user guides for the Prog team to implement the product

B.4.3 To-Dos

Must-haves

  • Make the privacy policy visible on the product webpage

  • Ensure the above data safety and privacy enabling measures are incorporated in the implementation of the product

  • If the AA instructs, be ready to delete data that no longer serves any purpose [as per Section 8(7)]

Preferable/Good practices

  • Guides the nodal officers in data privacy and protection practices. Makes them aware of the importance of data privacy and protection and the legal consequences of breach.

B.5 Stage 4 - UAT & Go-Live

B.5.1 What happens in Stage 4

  • The user acceptance test is conducted, a sign-off and go-live permission is given for identified Pilot ULBs.

  • Setup of review & monitoring cadence.

B.5.2 What does the IA team do in Stage 4

Assists the AA/Prog in conducting the UAT

  • Helps the prog in organizing employee training workshops

  • Implements review and monitoring processes

B.5.3. To-Dos

Must-haves

  • Conduct data breach and security checks before the AA/Prog signs off on the UAT.

A data security checklist should include-

  • Personally identifying information (PII) data is encrypted/masked when shared

  • Data is stored in safe databases

  • Employees don’t openly share access logins

  • Limited - documented roles have access to PII,

  • Employees trained in incident reporting,

  • Data protection policy for hardware protection, external media devices

  • The monitoring and evaluation cadence has data privacy and protection as a threshold for security checks. A report is submitted to Prog as part of the review and monitoring cadence for DPP.

  • The privacy policy is uploaded and displayed/

  • The privacy policy clearly states who is responsible for the personal data and how that official can be contacted.

  • Assessments for data breaches and security checks are planned to be regularly performed.

  • Data processing and sharing agreements have been established with all third parties that will process personal data.

  • The software and infrastructure regularly undergo security risk and threat analysis.

  • The program has privacy education/awareness training.

  • SOP for security incidents affecting personal data is established.

  • The amount of personal data that can be collected has been minimized.

  • The purpose of data collection has been defined to be as specific as possible.

  • The data is retained only till there is a need for it.

  • There are checks on data sharing, with verification that sharing is legally authorised and approved by the appropriate official.

Preferable practices

  • IA continues to check for any issues in the data governance of the modules.

B.6 Stage 5 - Statewide/ULB-wide Rollout

B.6.1 What happens in Stage 5

  • Statewide Rollout in batches

  • Help desk effectiveness assured

  • Critical bugs fixed

  • Program success metrics tracking kick-started

B.6.2 What does the IA do in Stage 5

  • The IA finishes their implementation function and starts transitioning out of the program

  • Begins handovers and closing gaps if any

B.6.3 To-Dos

Must-haves

  • Hand over all data they hold, without making a second copy

  • Provides an authorized letter to the Prog of such handover for credibility

  • Employees of IA begin surrendering logins and role controls

  • IA leaves no endpoint access for itself ( unless permitted by the AA or Prog)

Preferable/Good practices

  • Avoids allowing its employees to see PII even while helping AA/Prog employees.

B.7. Stage 6- Sustenance & Ongoing Improvement

B.7.1. What happens in Stage 6

  • The first batch of ULBs have been made live after the Pilot.

  • There is the adoption of the platform in the program’s jurisdictional zone and amongst its ULB employees and citizens.

B.7.2 What does the IA do in this stage

  • IA implements and leaves the program

B.7.3 To-Dos

Must-haves

  • IA completely detaches itself from the program system ( no backdoor entry/logins, no roles accessing PII, no backup of data).

Preferable/Good practices

IA documents how it enables privacy-preserving implementation modules and makes them available for other players in the implementation ecosystem to pick from.

PreviousPlatform Owner GuidelinesNextAdmin Guidelines

Last updated 1 year ago

Was this helpful?

IA must ensure there is an authorization document/proof/contract (MoU) - validating and authorizing the IA’s access to future data and its related compliances ( in compliance with Sec 8 of the )

Check for feedback from employees on access mechanisms and delivering services with proposed levels of data access, masking, etc (Use this as an activity to assess how they are ensuring the privacy rights of residents).

🔐
Digital Personal Data Protection Act,2023
sheet