Implementing Agencies Guidelines

Data protection and privacy guidelines for DIGIT implementations for implementing agencies

Scope

DIGIT, an open-source platform, enables governments and service providers to provide interdepartmental coordination and citizen-facing service delivery systems - currently, in urban governance, sanitation, health, and public finance management.

As citizen data is collected and used for such governance services, data privacy and protection measures are required to ensure this data is managed responsibly and safely.

This document is created to be an online guide, providing guidelines for Implementing agencies to maintain data privacy and protect individuals’ data.

  • Readers can use this to identify the steps they must take, in their capacity as implementing agencies, to ensure data privacy and protection in the context of a DIGIT or DIGIT-like implementation.

  • It can also provide source material for privacy policies, which should be included in each portal & application.

  • This is not a technical reference or documentation. It serves as a policy guideline.

References made to DIGIT are also applicable to other platforms similar to DIGIT. Not all parts of the guidelines or featured content may match the reader's platform or context, hence this document is open to be referred to in parts as needed.

These guidelines are to be read through the eyes of roles that are part of the Implementation Agencies (IA) offices in the journey of adopting a DIGIT-based system or platforms similar to DIGIT in a government entity/ies.

As per the (DPDP Act) an IA would be a data processor. If the IA gets involved in deciding the purpose and means of the data processing, then it would become a . The guidelines below cover measures to be in compliance with the DPDP Act.

If a government authority adopts DIGIT as a citizen service platform, then these guidelines are apt. Some points in the guidelines may not be relevant to platforms other than DIGIT in the governance ecosystem. Hence these guidelines have to be read as advisory.

The previous document in this series covered the guidelines for platform owners (PO), and administering authorities (AA).

For this document to understand what each program owner should do to safeguard data privacy and protection (DPP), it is important to understand what IA does at each phase of the implementation of DIGIT.

Implementation Stages

B.1 Stage 0 - Program Setup

What is a program?

A program can be a delivery of any government service/s which the AA is mandated to provide to citizens for which it requires a platform. Defining the scope of the program is within the power of an AA.

B.1.1 What happens at this stage?

  • A Memorandum of Understanding is signed between the AA and the platform owners. A Prog can also be a party to the MoU or maybe an equal power holding or subordinate entity of the AA (which signs the MOU).

  • The AA appoints a State Program Head/Nodal Officer

  • Resources and funding for the program are identified.

  • The program-specific procurement process is defined.

  • IA team onboarding is initiated.

B.1.2 IA’s role at Stage 0:

  • At this stage, the IA becomes a part of the program.

  • An official MoU or contract is entered into detailing the terms and conditions between the IA and the AA or Prog

  • IA begins to understand the needs of the program

  • IA begins making an implementation plan, that shall be published in the next stage

B.1.3 To-Do’s

Must-haves:

  • IA must ensure there is an authorization document/proof/contract (MoU) - validating and authorizing the IA’s access to future data and its related compliances ( in compliance with Sec 8 of the Digital Personal Data Protection Act,2023)

  • IA presents its own data management and privacy policy to the AA or Prog. This would make the IA’s stand on DPP very clear and easier for the AA or Prog to design a data sharing/access agreement with the IA

  • The clauses and language in the MoU/ data access/sharing agreement with the AA or Prog must include:

  • Data will always be controlled by the AA or the Prog, and IA will never have data-controlling power (IA must not decide the purpose and means of the processing of the data)

  • IA will be restricted from third-party data sharing without authorization from the AA or Prog

  • IA will not collect personal identifying information (PII) from citizens directly or indirectly without written permission by the AA or Prog

  • Access to PII by the IA team should be role-based, through strict logins audited and reported to the AA or Prog

  • IA will access PII only for purposes specified and authorized by the AA or Prog

  • IA will not keep any PII backup or secondary copy of such data

  • Data breach consequences - who holds accountability for data breaches

  • In the implementation plan, the IA must push for maintaining the data safely and securely from the beginning of the program life cycle to avoid any data or confidential breach. For example - the IA can detail a data-sharing mechanism that masks direct PII from being visible to IA representatives

  • The IA should make clear the access, processing and sharing of data in the implementation plan to avoid future confusion on data accountability

  • At every step of the implementation plan, the IA must reduce or eliminate its access to PII

  • Privacy enhancing features like encryption, privacy by default steps including purposeful processing of data, data deletion post use and strictly restricted access to PII must find a big space in the implementation plan

Preferable practices:

  • Assist/advise the AA/Prog in mapping out resources and funding needs for maintaining safe data protection and security structures ( hardware and software)

  • Embedding DPP practices in the implementation plan. For example, in the processes of data migration and data processing, the system does not permit sensitive data to be visible to unauthorized roles, strict logins are maintained, and IA employees are trained in safe data handling.

  • Help the AA or Prog make a program-specific data privacy policy (if they don’t have one made already for the specific program).

B.2. Stage 1 - Program Kickoff

B.2.1 What happens in Stage 1

  • Publishing of the program charter and implementation plan.

  • Master data collection begins in Pilot (selected) ULBs (Urban Local Body)

  • Cloud Infrastructure is procured

  • Program branding is done (name, logo, tagline etc.)

B.2.2 What does the IA team do in Stage 1

  • Here data starts to be shared with the IA for the deployment of the modules

  • The IA and the AA/Prog publish the implementation plan

  • IA team begins looking for resources for the deployment of the modules

B.2.3 To-Dos

Must-haves

  • The IA restricts or disallows any direct PII from being sent to it. The IA intimates the AA/Prog representatives to mask or encrypt the data in the manner

  • IA trains AA and its own employees in data best practices like purpose-based data access, strict password controls and data sharing hygiene and makes all aware of the legal consequences of .

  • To follow the DPDP Act :

    • the IA maintains an audit log of the data ( to provide a summary of personal data processed to the data fiduciary)

  • Maintain the completeness, accuracy, and consistency of personal data [ Section 8(3)]

  • Implement appropriate technical and organizational measures to implement the Act [Sec 8(4)]

  • Intimate the data fiduciary on any personal data breach [so that the data fiduciary can inform the Board and data principal about such a breach - Sec 8(6)]

Preferable/Good practices

  • IA encourages AA or Prog to:

  • Collect data only if it is needed for a specific legitimate reason and defined purpose (, ).

  • Proactively inform the citizens about the legal basis and reason/purpose for their data being collected (when collected directly from the resident)

  • Data is encrypted or masked when data is being migrated from paper to digital or old or new digital systems

  • Strategies for safe storage of data (on paper or digitally) are set.

  • Paper-based data is destroyed after a defined migration period (AA or Prog to define a data deletion period post-migration).

  • Create a data dashboard to show the nature of data collected and their corresponding purposes and uses (for transparency and awareness of citizens).

  • IA onboards a team with appropriate Data privacy and protection safeguarding skill sets

  • The implementation kickoff workshops include training on purposeful master data collection (for the next stage) in an informed and transparent manner (letting the resident know why they are collecting the data).

B.3 Stage 2 - Solution Design

B.3.1 What happens in Stage 2

  • Standardized ontologies (uniform terminology for easier understanding), processes and workflows are created.

  • Master data collected in the desired format.

  • Agreement on program-specific product customisations is required.

  • A detailed program plan is made and the tracking mechanism is finalized.

B.3.2 What does the IA do at stage 2

  • Product specifications with AA are finalized

  • IA begins the process of adopting the ontologies, designing/re-designing modules and workflow creations as per the needs of AA or Program.

B.3.3 To-Dos

Must-haves

In workflows and processes-

  • PII is kept in an encrypted/ masked manner through the workflows.

  • Strict data access requirements are in place (audit logs, restricted access points)

  • Data is maintained in secure storage

  • Data sharing is restricted through permitted devices, channels and to selected roles

Preferable/Good practices

  • IA conducts a risk assessment of the customizations asked for by the AA or Prog checking () risks and harms that may cause a breach of data privacy and confidentiality. will take into consideration the impact that data use may have on an individual(s) and/or group(s) of individuals, whether known or unknown at the time of data use[8].

  • Include security checks at each level of implementation of the platform for data to be kept secure and safe.

B.4 Stage 3 - Customization & Configuration

B.4.1 What happens in this stage

  • A configured/customized product is created that is ready for UAT.

  • Monitoring Reports and Dashboards are ready (to understand the rollout of modules).

  • Product artefacts like user guides are created.

  • Identification of participants for the UAT session.

B.4.2 What does the IA do in Stage 3

  • Delivers the product to the relevant team of the Pilot for User acceptance testing (UAT)

  • Helps the AA/Prog team deploy the product module/s in the ULB for testing

  • Assists in creating user guides for the Prog team to implement the product

B.4.3 To-Dos

Must-haves

  • Make the privacy policy visible on the product webpage

  • Ensure the above data safety and privacy enabling measures are incorporated in the implementation of the product

  • If the AA instructs, be ready to delete data that no longer serves any purpose [as per Section 8(7)]

Preferable/Good practices

  • Guides the nodal officers in data privacy and protection practices. Makes them aware of the importance of data privacy and protection and the legal consequences of breach.

  • Check for feedback from employees on access mechanisms and delivering services with proposed levels of data access, masking, etc (Use this sheet as an activity to assess how they are ensuring the privacy rights of residents).

B.5 Stage 4 - UAT & Go-Live

B.5.1 What happens in Stage 4

  • The user acceptance test is conducted, a sign-off and go-live permission is given for identified Pilot ULBs.

  • Setup of review & monitoring cadence.

B.5.2 What does the IA team do in Stage 4

Assists the AA/Prog in conducting the UAT

  • Helps the prog in organizing employee training workshops

  • Implements review and monitoring processes

B.5.3. To-Dos

Must-haves

  • Conduct data breach and security checks before the AA/Prog signs off on the UAT.

A data security checklist should include-

  • Personally identifying information (PII) data is encrypted/masked when shared

  • Data is stored in safe databases

  • Employees don’t openly share access logins

  • Limited - documented roles have access to PII,

  • Employees trained in incident reporting,

  • Data protection policy for hardware protection, external media devices

  • The monitoring and evaluation cadence has data privacy and protection as a threshold for security checks. A report is submitted to Prog as part of the review and monitoring cadence for DPP.

  • The privacy policy is uploaded and displayed/

  • The privacy policy clearly states who is responsible for the personal data and how that official can be contacted.

  • Assessments for data breaches and security checks are planned to be regularly performed.

  • Data processing and sharing agreements have been established with all third parties that will process personal data.

  • The software and infrastructure regularly undergo security risk and threat analysis.

  • The program has privacy education/awareness training.

  • SOP for security incidents affecting personal data is established.

  • The amount of personal data that can be collected has been minimized.

  • The purpose of data collection has been defined to be as specific as possible.

  • The data is retained only till there is a need for it.

  • There are checks on data sharing, with verification that sharing is legally authorised and approved by the appropriate official.

Preferable practices

  • IA continues to check for any issues in the data governance of the modules.

B.6 Stage 5 - Statewide/ULB-wide Rollout

B.6.1 What happens in Stage 5

  • Statewide Rollout in batches

  • Help desk effectiveness assured

  • Critical bugs fixed

  • Program success metrics tracking kick-started

B.6.2 What does the IA do in Stage 5

  • The IA finishes their implementation function and starts transitioning out of the program

  • Begins handovers and closing gaps if any

B.6.3 To-Dos

Must-haves

  • Hand over all data they hold, without making a second copy

  • Provides an authorized letter to the Prog of such handover for credibility

  • Employees of IA begin surrendering logins and role controls

  • IA leaves no endpoint access for itself ( unless permitted by the AA or Prog)

Preferable/Good practices

  • Avoids allowing its employees to see PII even while helping AA/Prog employees.

B.7. Stage 6- Sustenance & Ongoing Improvement

B.7.1. What happens in Stage 6

  • The first batch of ULBs have been made live after the Pilot.

  • There is the adoption of the platform in the program’s jurisdictional zone and amongst its ULB employees and citizens.

B.7.2 What does the IA do in this stage

  • IA implements and leaves the program

B.7.3 To-Dos

Must-haves

  • IA completely detaches itself from the program system ( no backdoor entry/logins, no roles accessing PII, no backup of data).

Preferable/Good practices

IA documents how it enables privacy-preserving implementation modules and makes them available for other players in the implementation ecosystem to pick from.

All content on this page by eGov Foundation is licensed under a Creative Commons Attribution 4.0 International License.