Page 55 - Building digital public infrastructure for cities and communities
P. 55
structured navigation and simplified user interfaces. However, implementation remains uneven,
especially in low-resource settings where capacity and institutional support are limited.
The United Nations Convention on the Rights of Persons with Disabilities (United Nations,
2006) obligates signatory governments to align public services with universal design principles.
Nonetheless, enforcement mechanisms remain weak, particularly in the absence of binding
international compliance instruments. Embedding accessibility standards into public procurement
processes can help bridge this gap, transforming accessibility from a discretionary feature into
a non-negotiable contractual obligation, enforced through usability testing and verification by
diverse user groups.
Inclusive DPI design must go beyond technical compliance to embrace participatory co-creation
with marginalized communities (UNDP, 2023). By grounding design processes in lived experience
rather than abstract assumptions, cities can ensure that digital services evolve in ways that are
genuinely responsive to the needs of all users.
7.5 Trust and security mechanisms to prevent misuse
Public trust in DPI hinges on robust security architecture and transparent institutional stewardship.
International standards for information security management and for business continuity (e.g., ITU-T
Y.4810, ITU-T Y.4806, ITU-T Y.4500.3, ITU-T X.2050, ISO/IEC 27001, ISO 22301) provide foundational
frameworks for structured risk management. These include provisions for regular penetration
testing, incident response planning and continuity protocols essential for maintaining the reliability
of critical public services.
Beyond conventional threats, policymakers must also address the risks associated with adversarial
interoperability, where external systems are forcibly integrated without authorization or consent.
To mitigate such vulnerabilities, it is essential to mandate strong encryption standards alongside
audit protocols that regulate and monitor third-party system access.
Identity federation mechanisms, including protocols like Security Assertion Markup Language
(SAML), OpenID Connect and regional frameworks such as Europe’s eIDAS, play a crucial role
in enhancing security and usability. These systems enable secure, cross-platform authentication,
facilitating seamless access to digital services across institutions and jurisdictions. Moreover,
public procurement contracts must embed explicit security requirements. These should include
mandatory independent security audits, continuous compliance monitoring and enforceable
breach notification protocols. Such measures not only fortify technical resilience but also enhance
transparency and public accountability, both of which are essential for sustaining citizen trust in
the digital transformation of public services.
42