Basic Information

Solution Name

Giving mothers control over their childrens and own data.

Add a comment

Read comments
No comments to show.

Tagline:

How do we give mothers ability to see who has access to their data  and that of their children's?

Add a comment

Read comments
No comments to show.

Pitch:

Article 12 of the Universal Declaration of Human Rights states that ”No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”

Mothers, especially those in very remote areas have no control over their data and that of their children, their personal data can be accessed by state and non-state actors without consent. With proper legal and institutional frameworks in place, this can be changed to give mothers control over that data.

By enabling data protection laws that protect user’s data from misuse and has transparency over who has access, then mothers can be empowered to opt in when whenever their data is accessed. With proper mechanisms in place to ensure that a user is notified in cases where data is accessed by the state and the oversight authority has to notify the user on why data was accessed within a fourteen days’ timeframe or face legal consequences.

Add a comment

Read comments
No comments to show.

Solution location:

Nairobi, Kenya
Add a comment

Read comments
No comments to show.

Solution's stage of development:

Idea
Add a comment

Read comments
No comments to show.
About Your Solution

What makes the solution innovative:

This is a new process of solving the challenge.By implementing legal frameworks that have a data protection laws in place, then technology needed for implementaion is applied taking into account that most mothers in remote areas are not tech-savvy and have minimal access to the internet.

Add a comment

Read comments
No comments to show.

How the solution demonstrates 'privacy by design':

Traceable authentication, this ensures that even if the system is tamper proof, security audits done will show the type of data that was acessed and by whom. 

Add a comment

Read comments
No comments to show.

How the solution can be incorporated into digital identification systems:

Poverty and poor internet connectivity remain key barriers to most developing countries. With proper legislation in place, these countries can ensure that digital identification systems are implemented using technology that takes into account that network connectivity is a key challenge therefore consider alternative accesible technology that guarantees control over private data.

Add a comment

Read comments
No comments to show.

How the solution is 'user-friendly':

My solution proposes implementing the project by use of USSD technology,since this is session based and provides interactive menus and notifications, linking it to a digital identification system would proof to be more intuitive.

Add a comment

Read comments
No comments to show.

How the solution ensures interoperability:

By using session based solutions,the technology solution can be sscaled across organizational boundaries to facilitate data exchange among stakeholders.

Add a comment

Read comments
No comments to show.

How the solution accounts for low connectivity environments and for users with low literacy and numeracy levels:

By implementing scalable technology solutions that notifies mothers who are the primary users via (Short Messanging Service)SMS, and uses USSD technology to opt in whenever requests are made about their persoanl  data to grant authorization. 

Add a comment

Read comments
No comments to show.

Vision over the next three to five years to implement or grow the solution to affect the lives of more people:

In the next three to five years, I hope to develop web and mobile based application solutions that would also cater for mothers who are more tech-savvy and not limited by network connectivity.

Add a comment

Read comments
No comments to show.
About Your Team

How the solution team is organized:

Not Registered as Any Organization
Add a comment

Read comments
No comments to show.

Solution lead:

Employee of a company but submitting my solution independently
Add a comment

Read comments
No comments to show.

How many people work on the solution:

1-5
Add a comment

Read comments
No comments to show.

Solution age:

Less than 1 year
Add a comment

Read comments
No comments to show.

Applicant skills that can attract the different resources needed to succeed and make an impact:

Policy development,research and software development.

Add a comment

Read comments
No comments to show.

Revenue model:

State and or donor funding.

When implemented, this solution can funded under a country's annual budget under the respective departments such as the civil registry.

Add a comment

Read comments
No comments to show.
Partnership Potential

Reason for applying to the Mission Billion Challenge:

I am applying to Mission Billion Challenge to give control over personal data back to the users especially mothers.

Partcipation will enable me to gain more insights on ways to prevent unwarranted surveillance and prevent misuse of personal data. 

Add a comment

Read comments
No comments to show.

Key barriers to the solution:

Funding.

Regal frameworks and legislations that provide for data protection.

Add a comment

Read comments
No comments to show.

Solution Team

 
    Back
to Top