Giving mothers control over their childrens and own data.
How do we give mothers ability to see who has access to their data and that of their children's?
Article 12 of the Universal Declaration of Human Rights states that ”No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”
Mothers, especially those in very remote areas have no control over their data and that of their children, their personal data can be accessed by state and non-state actors without consent. With proper legal and institutional frameworks in place, this can be changed to give mothers control over that data.
By enabling data protection laws that protect user’s data from misuse and has transparency over who has access, then mothers can be empowered to opt in when whenever their data is accessed. With proper mechanisms in place to ensure that a user is notified in cases where data is accessed by the state and the oversight authority has to notify the user on why data was accessed within a fourteen days’ timeframe or face legal consequences.
Solution location:Nairobi, Kenya
Solution's stage of development:Idea
What makes the solution innovative:
This is a new process of solving the challenge.By implementing legal frameworks that have a data protection laws in place, then technology needed for implementaion is applied taking into account that most mothers in remote areas are not tech-savvy and have minimal access to the internet.
How the solution demonstrates 'privacy by design':
Traceable authentication, this ensures that even if the system is tamper proof, security audits done will show the type of data that was acessed and by whom.
How the solution can be incorporated into digital identification systems:
Poverty and poor internet connectivity remain key barriers to most developing countries. With proper legislation in place, these countries can ensure that digital identification systems are implemented using technology that takes into account that network connectivity is a key challenge therefore consider alternative accesible technology that guarantees control over private data.
How the solution is 'user-friendly':
My solution proposes implementing the project by use of USSD technology,since this is session based and provides interactive menus and notifications, linking it to a digital identification system would proof to be more intuitive.
How the solution ensures interoperability:
By using session based solutions,the technology solution can be sscaled across organizational boundaries to facilitate data exchange among stakeholders.
How the solution accounts for low connectivity environments and for users with low literacy and numeracy levels:
By implementing scalable technology solutions that notifies mothers who are the primary users via (Short Messanging Service)SMS, and uses USSD technology to opt in whenever requests are made about their persoanl data to grant authorization.
Vision over the next three to five years to implement or grow the solution to affect the lives of more people:
In the next three to five years, I hope to develop web and mobile based application solutions that would also cater for mothers who are more tech-savvy and not limited by network connectivity.
How the solution team is organized:Not Registered as Any Organization
Solution lead:Employee of a company but submitting my solution independently
How many people work on the solution:1-5
Solution age:Less than 1 year
Applicant skills that can attract the different resources needed to succeed and make an impact:
Policy development,research and software development.
State and or donor funding.
When implemented, this solution can funded under a country's annual budget under the respective departments such as the civil registry.
Reason for applying to the Mission Billion Challenge:
I am applying to Mission Billion Challenge to give control over personal data back to the users especially mothers.
Partcipation will enable me to gain more insights on ways to prevent unwarranted surveillance and prevent misuse of personal data.
Key barriers to the solution:
Regal frameworks and legislations that provide for data protection.