Unit 2.2. Institutional design of gender-responsive e-service delivery

System reform through e-government is unlikely to produce good governance outcomes for all citizens, if conceptualised as a gender-neutral exercise. Explicitly accounting for gender as a key axis of socio-economic marginalisation is the first step to catalyse transformational outcomes for women’s empowerment and gender equality (see Module 1). Conversely, gender-targeted and gender-integrated e-services are also effective only when backed by institutional design that furthers transparency, accountability and inclusiveness. This module discusses three key ingredients of gender-responsive e-service delivery systems:

2.2.1. Citizen Charters

Citizen charters are framework documents/guidelines underpinning service delivery arrangements, that delineate the entitlements that citizens have, as users of public services. Citizen charters specify public service standards – including time-frame and minimum quality thresholds for service delivery; and the remedies available to citizens for service providers’ non-adherence to standards. In addition, they also lay out the procedures, costs and charges of accessing various public services (World Bank 2013)20.

Citizen charters gained ascendancy in the late 1980s and 1990s, when the coalescing of multiple factors led to a major restructuring of the public sector in the USA and UK – the politics of austerity ushered in by ‘Reganomics’ and ‘Thatcherism’, the push by international development institutions for the adoption of information technologies, management logic in public administration systems, and citizen demand for better quality of service delivery. A new line of thinking, termed New Public Service model, accorded a lot of importance to efficiency and productivity, whilst recognising that such values should be rooted in “the larger context of democracy, community and public interest” (Denhardt and Denhardt 2007, cited in Nigussa 2013). Citizen charters can therefore be seen to encompass both the technical dimensions of administrative simplification and the aspects of promoting transparent and accountable institutions in a democracy. In the formulation of citizen charters, the UK government led the way, with its Citizen Charter of 1991. Since then, many countries in Europe, the Commonwealth, OECD as well as Asia-Pacific region have followed suit (Saguin 2012).

In the shift to digitalised service delivery , re-articulating citizen rights and guarantees through citizen charters can restore confidence, reducing uncertainties for citizens that arise in such times of transition. For example, the 10 countries that topped the UN e-government development index in 2016 have enacted and implemented citizen charters/ service delivery guarantee legislation. As the World Public Service Sector Report 2015 has pointed out, citizen charters are meaningful only when backed by efforts to enhance the “inward aspects of public service delivery” (UNDESA 2015)21. Norms, rules, procedures and service provider etiquette are important for progress towards installing responsive and accountable governance cultures.

Amongst e-government leaders with robust citizen charters, the Netherlands deserves special mention for its forward-looking e-Citizen charter/ Burger Service Code (2008). The Charter succeeds in clarifying “what citizens may reasonably expect when interacting digitally with the public sector (agency) providing digital public services online” (Lonero 2017)22. This charter has been influential in shaping the policies of other countries who are e-government leaders, as well as the regional EU strategy. At the moment, more than a decade after the adoption of the e-Citizen charter in the Netherlands, the European Union is contemplating the creation of a Government for Citizens Charter, modelled along similar lines, for promoting the development of borderless, personalised, user friendly, end-to-end digital public services by member-states (ibid). A quick perusal of the key features of the Netherlands e-Citizen charter provides some valuable insights into how we can effectively deploy e-Citizen charters as instruments for promoting gender-responsive e-service delivery.

Table 1. Insights from the Netherlands experience, on how eCitizen charters can contribute to gender responsive e-service delivery

Feature of the Netherlands eCitizen Charter

Description

How adoption of this feature can contribute to gender-responsive service delivery

1. Choice of Channel/ Modality of service

Citizens should be free to choose for themselves the channel through which they will interact with service delivery providers.

Freedom of choice of service delivery channels enables greater inclusion with respect to gender considerations. Socio-structural location may pose a barrier to women’s online access. For example, women from rural and remote communities with limited connectivity, women with limited levels of education and ICT capabilities, older women etc. At the same time, women with physical disability /visual impairment are likely to benefit from online portals, particularly with special assistance through facilities like call centres.

2. No “Wrong Doors”

The government should act as a single entity, and citizens should not be turned away because they approached the wrong agency. The onus should be on public service providers to connect citizens to the appropriate agency that can process their service requests.

For effective inclusion of marginalised women, roll-out strategies that guarantee a seamless, convergent experience of service delivery are important. Navigating departmental silos, and knocking on one departmental door after another can be an added burden, especially for poor women with huge time burdens. In times of e-government, a “no wrong-door” policy can be easily accomplished through online portals. To be gender responsive, the policy can also include gender help desks in local government offices and the  establishment of gender-inclusive one-stop-shop kiosks. More details in Unit 2.1, Section 2.1.3, Point 1.

3. Right to information on service entitlements

Government agencies should ensure that citizens receive periodic and appropriate information updates about their service entitlement.

For their effective inclusion in emerging e-service delivery systems, it is vital that women and girls receive accurate and timely information about the services that are available to support their needs at different stages of their life cycle, and the procedures and protocols for accessing them. More details in Unit 2.1, Section 2.1.2, 2a.

4. Trust and Reliability

Government agencies should be able to convince citizens that the work flows in e-service delivery systems are reliable and fool-proof, and facilitate citizen monitoring and grievance redress.

Enabling citizen tracking of service delivery requests and setting clear time limits for processing different types of service requests builds confidence of vulnerable groups in e-government. Ensuring easy access to both individualised and collective forms of grievance redress is imperative for gender-inclusive e-service delivery. Grievances of women from marginalised social groups – sexual minorities, indigenous communities etc. - should be addressed as issues/challenges faced by a particular social group rather than as individual complaints. More details in Module 3.

5. Data security

Service providers should guarantee secure identity management and storage of personal data.

Sensitive personal information such as details of marital status, domestic/ gender-based violence, reproductive health etc. should be collected by service provider agencies only with informed consent of women beneficiaries for particular use cases. Storage, reuse and processing of such data should be undertaken as laid down in the law for data protection and/ or in ways that guarantee complete confidentiality and informational privacy. More details in the next subsection on Ingredient 2.

6. Citizen involvement and empowerment

Citizen feedback should be welcomed and regularly solicited, to improve public service delivery. E-service delivery design processes should make room for citizen consultation.

Gender-responsive e-service design requires consultations with women, who constitute the key target group of the planned intervention, to accurately assess their service needs and priorities. Consultations should be an ongoing exercise – with provision for feedback on implementation and policy redefinition, so that gender-responsiveness of e-services is always seen as work-in-progress. More details in Module 3.

2.2.2. Technical Design

For accessible, reliable and secure e-service delivery  a ‘whole of government approach’ (UNDESA 2016)23 can be extremely effective. Such an approach focuses on creating a seamless experience of accessing e-services for end-users, through comprehensive one-stop-shop web portals. These portals, as explained in Unit 2.1, are extremely useful in addressing women’s needs and priorities at different stages in their life cycle. But in order to be successful, they should be underpinned by an effective techno-architecture for back-end integration of work flows and administrative systems of different wings/ agencies of government. In this section, we focus on the technical protocols that form the building blocks of an integrated and gender-inclusive e-service delivery architecture:

1. Interoperability

There are three kinds of interoperability protocols associated with e-service delivery – organisational, semantic and technical (UNPAN 2008)24.

1.a. Organisational interoperability is concerned with the need to ensure alignment between business processes and information architectures of different departments/agencies for better collaboration and inter-agency coordination in service delivery (UNPAN 2008)25. The case of the Philippines illustrates how this becomes crucial to gender-inclusive e-service delivery. The Implementing Rules and Regulations of the Magna Carta for Women 2009 emphasise the alignment of all gender mainstreaming efforts undertaken by different government agencies, including in the domain of e-service delivery. The coordination and collaboration between government agencies at national and local levels has been made possible, through continuous investment in organisational interoperability and by overcoming traditional silos. This has been recognised in the Philippine Digital Strategy (2011-16) and the e-government Master Plan (2011-16). For more details, see Macapagal 2016.

1.b. Semantic interoperability is concerned with enabling the exchange, pooling and re-combining of data sets held by different service provider agencies, for meaningful information processing to support public decision making. Therefore, it is mainly concerned with providing a “common methodology, definition, and structure of information, along with shared services for retrieval” (UNPAN 2008)26. In the design and roll-out of women-directed services, data taxonomies become very important to avoid exclusions in targeting. For example, in a particular country-context, single women may be specifically targeted by different departments/agencies as part of their service delivery efforts. The Department of Social Welfare may have a pensions scheme directed at single women, the Department of Housing may offer them additional housing subsidies, and the Department of Small Industries may have a specific income generation programme directed at them. For better targeting, the government may decide to build a convergent database to coordinate service delivery efforts across these departments. However, this will be effective only if all departments are using the same definition of ‘single women’, and are collecting data in the same formats. Information privacy principles also call for ensuring that the structures of information are modelled for respecting privacy. Interoperability can undermine privacy, unless data governance protocols for de-identification are intrinsic to exchange, pooling and recombining of data sets. De-identification refers to the process of preventing a person’s identity from being connected to her information – and it includes not just anonymisation but the removal of other personal identifiers such as citizen ID numbers, and potential identifiers such as zip code or date of birth.

1.c. Technical interoperability is about setting standards and specifications that enable the effective exchange of information across computer systems. It covers the following categories (UNPAN 2008)27:

  1. Interconnection: standards related to networks and systems development
  2. Data integration: standards for description of data that enables data exchange across systems
  3. Information access and presentation: design of user interfaces
  4. Content management and metadata: standards for managing government information
  5. Security aspects, cutting across all the above-mentioned layers

The selection of standards is not only an exercise in technical efficiency, but equally an exercise in ensuring inclusive access to e-services.

Standards adopted in e-governance should be open, and not proprietary/ vendor-controlled, in order to maximise end-user choice and ensure that those who cannot afford proprietary tools are not disadvantaged. Governance systems can also maximise reach if they adopt open standards, instead of proprietary artifacts and tools. This will release scarce resources for programmes to reach remote and underserved locations.

Technological advancements in e-government also necessitate a revisiting of data integration and interconnection standards. For example, new data solutions such as ‘whole government API’ enables the integration of disparate datasets held by different agencies through a separate “engagement” layer without melding them together, whilst at the same time facilitating the creation of a common interface. For example, see https://www.techinasia.com/singapore-government-api. Standards need to be regularly revisited to keep pace with these advancements.

Standards for user interface development should incorporate accessibility standards developed by W3C consortium to enable uptake of e-services by women with visual and auditory disabilities. These accessibility standards stress upon the following aspects:

  • User interface is presented in textual and non-textual formats.
  • User interface is navigable by mouse and keyboard, and allows users enough time to read and process the content
  • Navigation and search features aid users who are completely dependent on textual interfaces as well as those who completely rely on text-to-speech options (using audio/ read-aloud software).
  • Content appears and operates in predictable ways.

For more details, see https://www.w3.org/WAI/intro/people-use-web/principles

Content management is another area for standards development. A gender perspective should be infused into e-government data architectures right at the stage of initial design (See example of e-Kasih in Unit 2.1, Section 2.1.3, point 3). The importance of developing gendered data taxonomies is vital – as the non-availability of gendered datasets is a global problem that adversely impacts evidence-based planning. Estimates suggest that currently national data sets are available for less than one-quarter of key gender indicators across the SDGs – and this is a major impediment to the creation of effective gender and development plans at the national level (Data 2x 2016)28.

Data security protocols in e-government also need an overhaul in the context of the widespread adoption of cloud computing solutions, such as in the creation of citizen digital lockers, to enable easy storage of welfare applications and other service-related documents. While it is important for government agencies to gain the trust of all citizen-users, this is particularly important in the case of women. The most disadvantaged women are yet to go online. E-government transactions need to be secure to be rewarding for women. Cloud computing and storage needs to be determined by a cloud security architecture with clear rules and protocols so that public agencies account for these concerns.

2. Effective data governance frameworks

Data-supported decision-making holds enormous potential for ensuring accountable and responsive service delivery to women. Maintaining beneficiary databases can help government agencies in streamlining the roll-out of welfare schemes and services, and reducing errors in targeting. Digitalisation opens up new possibilities with respect to integrating beneficiary databases that were previously scattered amongst different departments. It enables the creation of a new, comprehensive data backbone that supports a life-cycle approach to the design and roll-out of services for women. The creation of such integrated data-bases opens up new questions about accountability in state-citizen relations, such as:

  • To what extent should personal information about citizens be visible to government agencies? Should all service provider agencies/wings of government have access to the entire set of personal records of citizens that are spread across different agencies? For example, should the reproductive history of a woman that is available with the department administering health and nutrition programmes also be available to a department supporting women’s enterprise?
  • How can we ensure that citizens have some control over the types of personal information collected by government departments/agencies, and the uses to which this information is put?
  • How can citizens cross-check government agencies’ claims about fulfillment of service delivery obligations, and inspect the accuracy of governmental data-sets related to entitlements provisioning?

Such questions can be tackled only through robust data governance frameworks that effectively balance citizens’ right to privacy and personal data protection, with transparency and right to information. Moreover, the architects of these frameworks should recognise that a gender lens becomes very important in defining the limits of what is ‘private’ data and what is ‘public’ data. For example, a government-initiated women’s crisis support helpline should be legally obligated to collect and publicise aggregate data about the different types of gender based violence cases that have come to its notice. This is because it is vital to problematise gender based violence as a ‘public’ issue, and not treat it as a ‘private problem’ faced by a few victims. At the same time, it is important to respect survivor confidentiality and not release individual case details that may enhance the risk of identification. Similarly, it is important to make available aggregate data about the extent to which different groups of vulnerable women are being covered under social safety nets of the government – so that committed citizen groups and other collectives can pro-actively partner with government agencies for strengthening gender-inclusive service delivery. However, details of individual women who are part of these groups – such as name, address etc.-- should not be opened up to the public, as it heightens their vulnerability. This task of accurately calibrating what is ‘private’ and what is ‘public’, should be dealt with when designing the two main aspects of data governance frameworks – (a) Data protection legislation that safeguards women’s right to privacy (b) Gender-responsive open data frameworks .

The Asia-Pacific region has a very uneven record as far as the development of data governance frameworks is concerned. Countries in East Asia score very high on scorecards that assess the maturity of data protection and open data frameworks, and their performance is almost on par with European countries that are global leaders in these areas (Hogan Lovells 2017; Open Data for Development & WWW Foundation 2015)29. For example, Hong Kong, Philippines, Japan and Australia have recently updated their domestic legal frameworks on data protection, so that they correspond to European standards (Hogan Lovells 2017)30. In the Open Data domain, the Republic of Korea and Philippines have emerged as new challengers to traditional leaders in this space such as UK, USA, France and Canada (Open Data for Development & WWW Foundation 2015)31. However, in both areas, countries in South Asia still have a long distance to travel.

Against this backdrop, this section offers key pointers for the development of effective policy frameworks for data protection and open data that safeguard vulnerable women’s right to privacy and further their capabilities to demand accountability from service providers:

2.a. Designing data protection frameworks that safeguard women’s right to privacy

The following data management protocols become critical to protecting privacy and confidentiality of women citizens32:

  1. Notice for collection of data and breaches: When personal information is collected by government agencies, citizens should receive intimation about the reasons for which such information is being collected, and the purposes for which this information will be used. And if there are inadvertent data breaches, citizens should be immediately notified. The following illustration demonstrates how this protocol is critical, from a gender sensitivity standpoint. A government may launch schemes to support sex workers shift to alternative employment, or offer a higher education scholarship for children of sex workers. In the transition to digitalised service delivery systems, it is important that data sets about sex workers and their families that are collected by government agencies involved in the implementation of these schemes are not freely shared with other agencies, while working towards convergent service delivery. The identity of being a ‘sex worker’ usually carries with it social stigma that women may seek to avoid by keeping information about their work confidential. Data collection principles should be based on a need-to-know policy, and information collected for particular uses should not be redeployed without consent. Similarly, data breaches/leakages of identity information can increase vulnerability of women in the communities they live in – and therefore, if any such lapse occurs, women should be immediately notified.

  2. Informed Consent: Any information collected from citizens should be based on informed consent. For example, in a  benefits scheme intended for single women, the service provider may collect details of marital status (i.e., widowed/divorced/separated/abandoned by spouse etc.).It is important to ensure that the beneficiary consents to share this information, after understanding why this is essential to receive benefits under this scheme. Consent is bound by ‘purpose limitation’, meaning that if a woman shares information about her marital status to avail benefits under one scheme offered by a particular agency, it cannot be automatically assumed that this information can be used for targeted delivery of other schemes. If such information is to be shared with other departments/agencies as part of strengthening integrated service delivery under a life-cycle approach, at the point of collection, the informed consent of the beneficiary should be obtained for such sharing.

  3. Citizen access and right to seek corrections to personal information: All citizens have the right to view personal information about them that is being held by government agencies, and verify and correct this information, in case of errors. Oftentimes, data about women who may be physically disabled/ older or from highly restrictive cultural contexts is provided by other family members or recorded by intermediaries. Having access to online mechanisms for data verification is useful so that they can verify and make changes they deem important.

  4. Disclosure of information: Government agencies shall not disclose any personal information to third parties, except for law enforcement purposes. This applies even to the release of databases to the public as part of open data measures for transparency and accountability. For example, in Karnataka state, India, in 2015, the state government had released disaggregated datasets from the socio-economic census on the status of single women into the online public domain, as part of its open data efforts. The High Court ordered these datasets to be taken down, as it compromised the privacy of women who are already vulnerable.

    In such cases where release of disaggregated data sets is being contemplated, it is important that they are de-identified. De-identification does not refer merely to removal of names, but also other personal identifiers such as date of birth, social security/ citizen ID number, and even mobile phone number, and postal zip code. In the digital context, where most datasets are multi-dimensional, it is fairly easy to interlink disaggregated, anonymised data sets with other data sets available online, and reidentify individuals, if such other identifiers are not removed.

    This issue becomes tricky when sensitive personal information is core to the design of the service – such as GBV support services or creation of a directory of sex offenders. Here, lines may need to be drawn differently, with respect to the release of data. While the identity of a GBV victim may be known to her immediate community when she approaches a support service, it may be useful to take a decision that as part of open data disclosures for accountability, only aggregate data about complaints received and processed will be released online, and individual names of complainants will not be disclosed. However, individualised monitoring of complaints by victims themselves may be enabled, through introducing systems such as mobile-based tracking of complaints/specific cases.

    Similarly, with respect to the development of a sex offender directory, the Republic of Korea has developed a system that effectively balances public interest concerns (of alerting citizens about sex offenders who pose a risk in their neighbourhoods), with survivor-confidentiality and the right to privacy of sex offenders (to offer them a fair chance of rehabilitation).Individuals have to register online and go through an online ID authentication process before they can access information about known sex offenders. Also, there are legal restrictions on release of information about sex offenders to media, and software safeguards that prevent copying/saving of content accessed from the portal.

  5. Secure Storage: Government agencies should institute reasonable security safeguards against unauthorized access, processing and modification of citizen datasets stored by them, and guard against data breaches/leakages. For gender sensitivity, these protocols become non-negotiable. The 2014 Report of the World Economic Forum offers some concrete suggestions on data storage protocols in e-service delivery, which can enhance security:

    • Data should be stored in a distributed manner, with regional custodians from different government agencies appointed for different data sets. This will ensure that no one can combine data types without authentic authorization.
    • Decentralised data storage becomes even more important in the context of biometric based authentication mechanisms in service delivery, which have been introduced in some countries such as India. Research reveals that for biometric authentication, decentralised storage of biometric templates and personal information as encrypted data in microchips in smart cards may be more secure than the creation of a centralised biometric template database of all citizens. This system may also be more fool-proof and less susceptible to technical failures, as service providers performing identity authentication have to compare live biometric templates against the information encoded in the smart card carried by the citizens; rather than query a remote, online server. In this system, the chances of identity theft are also reduced (Smart Card Alliance 2011)33.
    • Data sharing across departments should be SQL/query-based (which allows sharing of specific fields rather than the entire data set). This minimises chances of accidental and deliberate leakages.
  6. Accountability: As has been recommended by the EU General Data Protection Regulation, accidental data leakages should be penalised as well as wilful data breaches, to ensure accountability for violations of citizen privacy.

  7. Effective governance of Big Data partnerships: The Independent UN Expert Advisory Group on the Data Revolution for Sustainable Development has called for accelerating evidence-based policy making towards the progress of Agenda 2030. It has recommended that national governments explore Big Data partnerships with private sector collaborators to fill in gaps in national statistical systems (IAEG 2014)34. However, such arrangements should not violate privacy and confidentiality of citizens whose data is implicated. Governments may enter into collaborations with mobile telecommunication operators to use Call Detail Records in order to enhance their emergency responses. But research shows how in certain countries in the African context, health response systems end up tracking personally sensitive information without consent, towards efficient management of epidemics like ebola. There is a risk here of extra-legal or unauthorised surveillance (Taylor, 2016)35.

2.b. Developing gender-responsive Open Data strategies

As the UN E-government Survey 2016 observes, Open Data policies hold a lot of promise for enhancing vulnerable groups’ access to the benefits of development. For example, as the Survey observes, “data about location of health services and water points near slums or disadvantaged areas can help improve communities’ access to essential social and economic resources. Support can also be provided to help relevant non-governmental organizations to analyze and use Open Data for improving the situation of the poorest and most vulnerable”. However, if Open Data strategies are to aid efforts that seek to address women’s marginalisation, the following aspects should be addressed:

  • Investing in the development of Open Data Sets that specifically focus on the development attainments of girls and women, and gaps to be addressed. The Girl Impact Map Platform, Rwanda offers a suitable exemplar. This platform provides a geo-spatial representation of the differences in girls’ development attainments and access to government support services across different geographic regions of the country. It also permits users to overlay this map with data about governmental budgetary allocation for girls.
  • Building a gender budget into Open Data policies and programmes, to support civil society efforts to mine existing official statistics to raise awareness about gender-based discrimination and women’s low status.. Efforts such as the Femicide Dossier (Brazil), which has created an open map for recording deaths from gender based violence; the Jump Start Georgia initiative that uses official data from the government of Georgia on wages, wealth and labor to raise awareness about gender-based discrimination in the workplace; and the Khabar Lahariya initiative in India that has supported women community journalists in using open data sets from the Census of India to analyse the livelihoods crisis of women farmers, are suitable exemplars.

2.2.3. Governance of public private partnerships in e-service delivery

To address knowledge and expertise gaps in designing and implementing e-government, government agencies often enter into partnerships with private sector agencies and civil society organisations. Such new service delivery arrangements tend to concern areas in which norms are still evolving. However, it is vital that agreements with private partners keep pace with the changing context of governance, so that accountability is not undermined (UNESCAP 2016)36.

PPP agreements in such cases should take the following into consideration:

1. Ensure that accountability lines are not blurred

When e-services management or last mile delivery is privatised, the roles and responsibilities of the state agencies and private actors involved in these arrangements with respect to fulfilling service delivery guarantees should be clearly delineated. Citizen rights should not take a beating due to lack of clarity in spelling out accountability arrangements. For example, in India, the privatization of one-stop-shop centres for last mile service delivery – the Common Service Centres – has led to the shortchanging of the service needs of vulnerable women, as contracts between the government and the private franchisees running these centres do not have clearly actionable service level guarantees with respect to inclusive service provisioning (Kurian et.al. 2009)37.

2. Have clarity on expertise gaps that are sought to be filled

It is important for government agencies to have full clarity on the expertise gaps that they are seeking to fill, when entering into PPPs for e-government. For instance, an agency with technical expertise in digital technologies cannot also fill in domain expertise gaps. The Cybermentoring initiative of the Republic of Korea provides a web-based space for one-on-one career mentoring, where women who are beginning heir careers can seek advice and guidance from senior women professionals. Initially, the government contracted a single agency, with IT expertise, to manage the portal. But soon it became evident that for effective strategy development and roll-out of a women-directed service, gender expertise is vital. Therefore, the government modified its PPP arrangement. A women’s agency with domain expertise has been made responsible for the initiative in its entirety, and this agency subcontracts a technical IT agency for maintenance of the portal.

3. Create guidelines for private management of citizen data

Guidelines for the management of data backbones are part of e-service delivery PPPs. However, unless underpinned by data governance arrangements, these can entail some risks. For example, in the Indian state of Andhra Pradesh, the Management Information System (MIS) of the state’s rural wage employment programme availed by the poorest women has been set up in partnership with a private sector company, who continues to handle its maintenance. In the absence of data governance guidelines, there have been delays, and inaccuracies in reporting, from the private partner. This has proved a hindrance to the timely payment of wages to the poor (Chami 2016). Similarly, in South Africa, a private company contracted by the state welfare agency to disburse welfare payments to the poor misused the beneficiary bank account database that it had access to, to make illegal debit deductions for loans and other financial instruments held by its sister concerns. When this malpractice was deducted, the state welfare agency attempted to terminate the agreement – but the contractor held it to ransom by threatening to walk away with the entire database of welfare disbursements, without a proper handover, posing a serious governance crisis (IT for Change 2017).

Unit Summary

  1. Gender-responsive institutional design of e-services is about devoting attention to three main ingredients: e-citizen charters, technical design, and governance frameworks for public private partnership arrangements in e-service delivery.
  2. To contribute to women’s inclusion in e-service delivery arrangements, e-citizen charters should contain the following provisions:
    • Freedom of choice of service delivery channels/ modes. Women should be able to opt for either online/ offline channels based on their circumstances.
    • A “No-Wrong-Door” policy, which ensures that navigating departmental silos, and knocking on one departmental door after another, does not become an added burden for poor women.
    • Right to information on service entitlements. Women should receive accurate and timely information updates about services that may be relevant, at each stage in their life cycle.
    • Support for tracking of applications, and redress of individual and collective grievances with respect to e-service delivery. Experiences of  women from marginalised social groups – sexual minorities, indigenous communities etc – should be addressed systemically rather than as individual complaints.
    • Secure identity management and storage of personal data in e-service delivery systems.
    • Responsive e-service design, based on ongoing consultations to assess women’s service needs and priorities accurately.
  3. Robust technical design is about creating effective interoperability protocols and data governance frameworks for integrated and gender-inclusive e-service delivery. This includes:
    • Organisational, semantic and technical interoperability. Organisational interoperability is the need to ensure alignment between business processes and information architectures of different departments/agencies for better coordination in service delivery. This is particularly important in streamlining gender-mainstreaming efforts of various wings of government. Semantic interoperability involves building data architectures that support meaningful information processing for public decision-making. The design of data taxonomies becomes pertinent in women-directed services, with respect to avoiding inadvertent exclusions in targeting. Technical interoperability is about setting standards and specifications that enable the effective exchange of information across computer systems. It is preferable to invest in non-proprietary, open standards and tools, to ensure accessible and cost-effective service delivery.
    • Data protection legislation that effectively safeguards women’s right to privacy, and the development of gender-responsive open data policies and programmes.
  4. Public-Private-Partnership arrangements should ensure that accountability in e-service delivery systems is safeguarded, by:
    • delineating respective roles and responsibilities of state agencies and private sector partners in terms of fulfilling service delivery guarantees to vulnerable women.
    • clearly identifying expertise gaps that are sought to be filled, and recognising that gender expertise is as vital as technical expertise.
    • laying down guidelines on management of data backbones.

 

 


  1. 20 World Bank. (2013). Social Accountability E-guide. Retrieved from https://saeguide.worldbank.org/sites/worldbank.org.saeguide/files/documents/2_Citizens'%20Charter.pdf. 5 September 2017
  2. 21 UNDESA. (2015). Reponsive and Accountable Public Governance. Retrieved from http://workspace.unpan.org/sites/Internet/Documents/UNPAN95253.pdf, 5 Spetember 2017
  3. 22 Lonero, G. (2017). Action 24: Digital Government for Citizens Charter (May 2017). Retrieved from https://ec.europa.eu/futurium/en/content/action-24-digital-government-citizens-charter-new-may-2017, 5 September 2017
  4. 23 UNDESA. (2016), op.cit.
  5. 24 UNPAN. (2008). e-Government Interoperability. Retrieved from http://unpan1.un.org/intradoc/groups/public/documents/UN-OTHER/UNPAN032094.pdf, 5 September 2017
  6. 25 Ibid
  7. 26 Ibid
  8. 27 Ibid
  9. 28 Data 2X. (2015). Data and Gender Monitoring. Retrieved from http://data2x.org/partnerships/gender-data-sdg-monitoring/, 5 September 2017
  10. 29 Hogen Lovells. (2017). Retrieved from https://f.datasrvr.com/fr1/017/36473/Hogan_Lovells_Asia_Pacific_Data_Protection_and_Cybersecurity_Guide_2017.PDF, 5 September 2017; Open Data for Development & WWW Foundation. (2015). Open Data Barometer-Global Report. Retrieved from http://opendatabarometer.org/3rdedition/report/, 5 September 2017
  11. 30 Hogen Lovells. (2017), op.cit.
  12. 31 Open Data for Development & WWW Foundation. (2015), op.cit.
  13. 32 In distilling these facets, this module builds upon the guidelines recommended by  the Report of the Group of Experts on Privacy, Government of India (2012)
  14. 33 Smart Card Alliance. (2011). Smart Cards and Biometrics. Retrieved from https://www.securetechalliance.org/resources/pdf/Smart_Cards_and_Biometrics_030111.pdf, 5 September 2017
  15. 34 AEG. (2014), Data Revolution Report. Retrieved from http://www.undatarevolution.org/report/, 5 September 2017
  16. 35 Taylor,L. (2016). Mobile Data Sharing in Emergencies – Consent, Care & Control. Retrieved from https://linnettaylor.wordpress.com/2016/03/15/mobile-dat, 5 September 2017
  17. 36 UNESCAP, (2016),op.cit.
  18. 37 Kurian,R., & Ray,I. (2009), op.cit.

Glossary Text for Tooltips

Gender-targeted and gender-integrated

 

Use cases

 

Techno-architecture

The technical architecture (connectivity infrastructure, software, protocols and standards) that underpins digitalised governance systems.

technical Protocols

Protocols for interoperability and data governance that form the bedrock of a robust, effective and inclusive e-service delivery system.

Interoperability

This is the technical precondition for interdepartmental coordination in e-service delivery. It involves working on alignments of three different kinds: (a) alignments between business processes and information architectures of different departments/agencies for better collaboration and inter-agency coordination in service delivery (organisational interoperability) (b) alignments between data taxonomies of different departments and agencies to enable meaningful public information processing that supports decision-making. (c) alignments between interconnection, content management, metadata and security standards of different departments and agencies to enable networked sharing of information within government.

De-identification

This refers to the process of preventing a person’s identity from being connected to her personal information, in digitalised data sets. This includes not just anonymisation or removing the name of the person from data sets, but also the removal of other personal identifiers such as citizen ID number, zip code or date of birth, comprising any data point that allows tracing the identity of the person.

Proprietary tools

 

Whole government API