Practical Insights on Responsible Data

Introducing the NetHope Data Governance Toolkit

Introducing the NetHope Data Governance Toolkit

Published on: Aug 24 2022 by Wayan Vota - Comments Off on Introducing the NetHope Data Governance Toolkit
Organizations are relying more and more on data analytics to help optimize their internal operations and process as well as make data driven decisions across all...
USAID Artificial Intelligence Action Plan: Responsible AI in Development

USAID Artificial Intelligence Action Plan: Responsible AI in Development

Published on: Jun 01 2022 by Guest Writer - 1 Comment
Artificial intelligence (AI) technologies are increasingly prevalent in our lives—from digital voice assistants to personalized advertising and entertainment...
Where is Data Justice for the Next Billion Users in Digital Development?

Where is Data Justice for the Next Billion Users in Digital Development?

Published on: Apr 26 2022 by Guest Writer - Comments Off on Where is Data Justice for the Next Billion Users in Digital Development?
In 2017, the Unique Identification Authority of India (UIDAI) revealed that 210 government websites had accidentally exposed the private information of more than...
Who Owns the Data in Global Public Health Programming?

Who Owns the Data in Global Public Health Programming?

Published on: Apr 20 2022 by Guest Writer - 7 Comments
A couple of years ago I attended the Global Digital Health Forum, where a speaker by the name of Jeff Street said something that has stuck with me ever since: “Whoever...
Give Your Comments on USAID Digital Front Door Initiative

Give Your Comments on USAID Digital Front Door Initiative

Published on: Feb 02 2022 by Wayan Vota - Comments Off on Give Your Comments on USAID Digital Front Door Initiative
USAID is proposing to amend its Acquisition Regulation (AIDAR) to implement policy and procedures to clarify and streamline contractor reporting requirements related...
ICRC Cyber Attack is Our Constituent Data Management Nightmare

ICRC Cyber Attack is Our Constituent Data Management Nightmare

Published on: Jan 26 2022 by Wayan Vota - 1 Comment
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
A Six-Step Playbook for Doing Data Science & AI for Good

A Six-Step Playbook for Doing Data Science & AI for Good

Published on: Dec 22 2021 by Guest Writer - 2 Comments
The Data Science and AI for Good landscape has exploded, with more organizations doing data for good work than ever before. At the same time, there’s an abundance...
US Global Food Security Strategy Gets A Digital Development Upgrade!

US Global Food Security Strategy Gets A Digital Development Upgrade!

Published on: Dec 15 2021 by Josh Woodard - Comments Off on US Global Food Security Strategy Gets A Digital Development Upgrade!
The new U.S. Government Global Food Security Strategy (GFSS), from 2022-2026, has recently launched with some notable changes when it comes to digital development....
We Need Strong Information Security Practices in Afghanistan Right Now

We Need Strong Information Security Practices in Afghanistan Right Now

Published on: Aug 20 2021 by Mike Dawson - 3 Comments
The situation in Afghanistan is heartbreaking for everyone. Those who are there, those with family there, and those with friends, colleagues, and care for our fellow...
Ethical Considerations When Using Call Detail Records for Better Targeting

Ethical Considerations When Using Call Detail Records for Better Targeting

Published on: Jun 09 2021 by Linda Raftree - Comments Off on Ethical Considerations When Using Call Detail Records for Better Targeting
While countries adopted various COVID-19 response approaches, the need for short- and long-term Cash and Voucher Assistance (CVA) quickly became clear at an unprecedented...