Examining Civil Society Legitimacy


Saskia Brechenmacher and Thomas Carothers at Carnegie Endowment for International Peace: “Civil society is under stress globally as dozens of governments across multiple regions are reducing space for independent civil society organizations, restricting or prohibiting international support for civic groups, and propagating government-controlled nongovernmental organizations. Although civic activists in most places are no strangers to repression, this wave of anti–civil society actions and attitudes is the widest and deepest in decades. It is an integral part of two broader global shifts that raise concerns about the overall health of the international liberal order: the stagnation of democracy worldwide and the rekindling of nationalistic sovereignty, often with authoritarian features.

Attacks on civil society take myriad forms, from legal and regulatory measures to physical harassment, and usually include efforts to delegitimize civil society. Governments engaged in closing civil society spaces not only target specific civic groups but also spread doubt about the legitimacy of the very idea of an autonomous civic sphere that can activate and channel citizens’ interests and demands. These legitimacy attacks typically revolve around four arguments or accusations:

  • That civil society organizations are self-appointed rather than elected, and thus do not represent the popular will. For example, the Hungarian government justified new restrictions on foreign-funded civil society organizations by arguing that “society is represented by the elected governments and elected politicians, and no one voted for a single civil organization.”
  • That civil society organizations receiving foreign funding are accountable to external rather than domestic constituencies, and advance foreign rather than local agendas. In India, for example, the Modi government has denounced foreign-funded environmental NGOs as “anti-national,” echoing similar accusations in Egypt, Macedonia, Romania, Turkey, and elsewhere.
  • That civil society groups are partisan political actors disguised as nonpartisan civic actors: political wolves in citizen sheep’s clothing. Governments denounce both the goals and methods of civic groups as being illegitimately political, and hold up any contacts between civic groups and opposition parties as proof of the accusation.
  • That civil society groups are elite actors who are not representative of the people they claim to represent. Critics point to the foreign education backgrounds, high salaries, and frequent foreign travel of civic activists to portray them as out of touch with the concerns of ordinary citizens and only working to perpetuate their own privileged lifestyle.

Attacks on civil society legitimacy are particularly appealing for populist leaders who draw on their nationalist, majoritarian, and anti-elite positioning to deride civil society groups as foreign, unrepresentative, and elitist. Other leaders borrow from the populist toolbox to boost their negative campaigns against civil society support. The overall aim is clear: to close civil society space, governments seek to exploit and widen existing cleavages between civil society and potential supporters in the population. Rather than engaging with the substantive issues and critiques raised by civil society groups, they draw public attention to the real and alleged shortcomings of civil society actors as channels for citizen grievances and demands.

The widening attacks on the legitimacy of civil society oblige civil society organizations and their supporters to revisit various fundamental questions: What are the sources of legitimacy of civil society? How can civil society organizations strengthen their legitimacy to help them weather government attacks and build strong coalitions to advance their causes? And how can international actors ensure that their support reinforces rather than undermines the legitimacy of local civic activism?

To help us find answers to these questions, we asked civil society activists working in ten countries around the world—from Guatemala to Tunisia and from Kenya to Thailand—to write about their experiences with and responses to legitimacy challenges. Their essays follow here. We conclude with a final section in which we extract and discuss the key themes that emerge from their contributions as well as our own research…

  1. Saskia Brechenmacher and Thomas Carothers, The Legitimacy Landscape
  2. César Rodríguez-Garavito, Objectivity Without Neutrality: Reflections From Colombia
  3. Walter Flores, Legitimacy From Below: Supporting Indigenous Rights in Guatemala
  4. Arthur Larok, Pushing Back: Lessons From Civic Activism in Uganda
  5. Kimani Njogu, Confronting Partisanship and Divisions in Kenya
  6. Youssef Cherif, Delegitimizing Civil Society in Tunisia
  7. Janjira Sombatpoonsiri, The Legitimacy Deficit of Thailand’s Civil Society
  8. Özge Zihnioğlu, Navigating Politics and Polarization in Turkey
  9. Stefánia Kapronczay, Beyond Apathy and Mistrust: Defending Civic Activism in Hungary
  10. Zohra Moosa, On Our Own Behalf: The Legitimacy of Feminist Movements
  11. Nilda Bullain and Douglas Rutzen, All for One, One for All: Protecting Sectoral Legitimacy
  12. Saskia Brechenmacher and Thomas Carothers, The Legitimacy Menu.(More)”.

The global identification challenge: Who are the 1 billion people without proof of identity?


Vyjayanti Desai at The Worldbank: “…Using a combination of the self-reported figures from country authorities, birth registration and other proxy data, the 2018 ID4D Global Dataset suggests that as many as 1 billion people struggle to prove who they are. The data also revealed that of the 1 billion people without an official proof of identity:

  • 81% live in Sub-Saharan Africa and South Asia, indicating the need to scale up efforts in these regions
  • 47% are below the national ID age of their country, highlighting the importance of strengthening birth registration efforts and creating a unique, lifetime identity;
  • 63% live in lower-middle income economies, while 28% live in low-income economies, reinforcing that lack of identification is a critical concern for the global poor….

In addition, to further strengthen understanding of who the undocumented are and the barriers they face, ID4D partnered with the 2017 Global Findex to gather for the first time this year, nationally-representative survey data from 99 countries on foundational ID coverage, use, and barriers to access. Early findings suggest that residents of low income countries, particularly women and the poorest 40%, are the most affected by a lack of ID. The survey data (albeit limited in its coverage to people aged 15 and older) confirm that the coverage gap is largest in low income countries (LICs), where 38% of the surveyed population does not have a foundational ID. Regionally, sub-Saharan Africa shows the largest coverage gap, where close to one in three people in surveyed countries lack a foundational ID.

Although global gender gaps in foundational ID coverage are relatively small, there is a large gender gap for the unregistered population in low income countries – where over 45% of women lack a foundational ID, compared to 30% of men.  The countries with the greatest #gender gaps in foundational ID coverage also tend to be those with #legal barriers for women’s access to #identity documents….(More)”.

Participatory Budgeting: Step to Building Active Citizenship or a Distraction from Democratic Backsliding?


David Sasaki: “Is there any there there? That’s what we wanted to uncover beneath the hype and skepticism surrounding participatory budgeting, an innovation in democracy that began in Brazil in 1989 and has quickly spread to nearly every corner of the world like a viral hashtag….We ended up selecting two groups of consultants for two phases of work. The first phase was led by three academic researchers — Brian WamplerMike Touchton and Stephanie McNulty — to synthesize what we know broadly about PB’s impact and where there are gaps in the evidence. mySociety led the second phase, which originally intended to identify the opportunities and challenges faced by civil society organizations and public officials that implement participatory budgeting. However, a number of unforeseen circumstances, including contested elections in Kenya and a major earthquake in Mexico, shifted mySociety’s focus to take a global, field-wide perspective.

In the end, we were left with two reports that were similar in scope and differed in perspective. Together they make for compelling reading. And while they come from different perspectives, they settle on similar recommendations. I’ll focus on just three: 1) the need for better research, 2) the lack of global coordination, and 3) the emerging opportunity to link natural resource governance with participatory budgeting….

As we consider some preliminary opportunities to advance participatory budgeting, we are clear-eyed about the risks and challenges. In the face of democratic backsliding and the concern that liberal democracy may not survive the 21st century, are these efforts to deepen local democracy merely a distraction from a larger threat, or is this a way to build active citizenship? Also, implementing PB is expensive — both in terms of money and time; is it worth the investment? Is PB just the latest checkbox for governments that want a reputation for supporting citizen participation without investing in the values and process it entails? Just like the proliferation of fake “consultation meetings,” fake PB could merely exacerbate our disappointment with democracy. What should we make of the rise of participatory budgeting in quasi-authoritarian contexts like China and Russia? Is PB a tool for undemocratic central governments to keep local governments in check while giving citizens a simulacrum of democratic participation? Crucially, without intentional efforts to be inclusive like we’ve seen in Boston, PB could merely direct public resources to those neighborhoods with the most outspoken and powerful residents.

On the other hand, we don’t want to dismiss the significant opportunities that come with PB’s rapid global expansion. For example, what happens when social movements lose their momentum between election cycles? Participatory budgeting could create a civic space for social movements to pursue concrete outcomes while engaging with neighbors and public officials. (In China, it has even helped address the urban-rural divide on perspectives toward development policy.) Meanwhile, social media have exacerbated our human tendency to complain, but participatory budgeting requires us to shift our perspective from complaints to engaging with others on solutions. It could even serve as a gateway to deeper forms of democratic participation and increased trust between governments, civil society organizations, and citizens. Perhaps participatory budgeting is the first step we need to rebuild our civic infrastructure and make space for more diverse voices to steer our complex public institutions.

Until we have more research and evidence, however, these possibilities remain speculative….(More)”.

App facilitates charity work in Jordan


Springwise: “We have already seen how technology can be harnessed to help facilitate charitable and environmental efforts. For example, the recycling organization which helps businesses rehome unwanted goods, donating money to charity in addition to helping businesses be more economical. Another example in which technology has been used to raise awareness is through the charity chatbot, which teaches users about women’s daily journey to find water in Ethiopia.

JoodLife is a start-up which aims to make the most of technology and take advantage of it in order to help voluntary efforts in Jordan.

The application works as a social platform to connect volunteers and donors in order to facilitate charity work. Donors can register their donations via the app, and then all the available grants are displayed. The grants can be searched for on the app, and users can specify the area they wish to search. The donor and the volunteer can then agree a mechanism by which they wish to transfer the grant. At which point the available grant will no longer be shown on the app search. The app aims to serve as a link between donors and volunteers to save both parties time and effort. This makes it much easier to make monetary and material donations. The social aspect of the app also increases solidarity between charity workers and makes it much simpler to distribute roles in the most efficient way….(More)”.

Selected Readings on Data Responsibility, Refugees and Migration


By Kezia Paladina, Alexandra Shaw, Michelle Winowatan, Stefaan Verhulst, and Andrew Young

The Living Library’s Selected Readings series seeks to build a knowledge base on innovative approaches for improving the effectiveness and legitimacy of governance. This curated and annotated collection of recommended works on the topic of Data Collaboration for Migration was originally published in 2018.

Special thanks to Paul Currion whose data responsibility literature review gave us a headstart when developing the below. (Check out his article listed below on Refugee Identity)

The collection below is also meant to complement our article in the Stanford Social Innovation Review on Data Collaboration for Migration where we emphasize the need for a Data Responsibility Framework moving forward.

From climate change to politics to finance, there is growing recognition that some of the most intractable problems of our era are information problems. In recent years, the ongoing refugee crisis has increased the call for new data-driven approaches to address the many challenges and opportunities arising from migration. While data – including data from the private sector – holds significant potential value for informing analysis and targeted international and humanitarian response to (forced) migration, decision-makers often lack an actionable understanding of if, when and how data could be collected, processed, stored, analyzed, used, and shared in a responsible manner.

Data responsibility – including the responsibility to protect data and shield its subjects from harms, and the responsibility to leverage and share data when it can provide public value – is an emerging field seeking to go beyond just privacy concerns. The forced migration arena has a number of particularly important issues impacting responsible data approaches, including the risks of leveraging data regarding individuals fleeing a hostile or repressive government.

In this edition of the GovLab’s Selected Readings series, we examine the emerging literature on the data responsibility approaches in the refugee and forced migration space – part of an ongoing series focused on Data Responsibiltiy. The below reading list features annotated readings related to the Policy and Practice of data responsibility for refugees, and the specific responsibility challenges regarding Identity and Biometrics.

Data Responsibility and Refugees – Policy and Practice

International Organization for Migration (IOM) (2010) IOM Data Protection Manual. Geneva: IOM.

  • This IOM manual includes 13 data protection principles related to the following activities: lawful and fair collection, specified and legitimate purpose, data quality, consent, transfer to third parties, confidentiality, access and transparency, data security, retention and personal data, application of the principles, ownership of personal data, oversight, compliance and internal remedies (and exceptions).
  • For each principle, the IOM manual features targeted data protection guidelines, and templates and checklists are included to help foster practical application.

Norwegian Refugee Council (NRC) Internal Displacement Monitoring Centre / OCHA (eds.) (2008) Guidance on Profiling Internally Displaced Persons. Geneva: Inter-Agency Standing Committee.

  • This NRC document contains guidelines on gathering better data on Internally Displaced Persons (IDPs), based on country context.
  • IDP profile is defined as number of displaced persons, location, causes of displacement, patterns of displacement, and humanitarian needs among others.
  • It further states that collecting IDPs data is challenging and the current condition of IDPs data are hampering assistance programs.
  • Chapter I of the document explores the rationale for IDP profiling. Chapter II describes the who aspect of profiling: who IDPs are and common pitfalls in distinguishing them from other population groups. Chapter III describes the different methodologies that can be used in different contexts and suggesting some of the advantages and disadvantages of each, what kind of information is needed and when it is appropriate to profile.

United Nations High Commissioner for Refugees (UNHCR). Model agreement on the sharing of personal data with Governments in the context of hand-over of the refugee status determination process. Geneva: UNHCR.

  • This document from UNHCR provides a template of agreement guiding the sharing of data between a national government and UNHCR. The model agreement’s guidance is aimed at protecting the privacy and confidentiality of individual data while promoting improvements to service delivery for refugees.

United Nations High Commissioner for Refugees (UNHCR) (2015). Policy on the Protection of Personal Data of Persons of Concern to UNHCR. Geneva: UNHCR.

  • This policy outlines the rules and principles regarding the processing of personal data of persons engaged by UNHCR with the purpose of ensuring that the practice is consistent with UNGA’s regulation of computerized personal data files that was established to protect individuals’ data and privacy.
  • UNHCR require its personnel to apply the following principles when processing personal data: (i) Legitimate and fair processing (ii) Purpose specification (iii) Necessity and proportionality (iv) Accuracy (v) Respect for the rights of the data subject (vi) Confidentiality (vii) Security (viii) Accountability and supervision.

United Nations High Commissioner for Refugees (UNHCR) (2015) Privacy Impact Assessment of UNHCR Cash Based Interventions.

  • This impact assessment focuses on privacy issues related to financial assistance for refugees in the form of cash transfers. For international organizations like UNHCR to determine eligibility for cash assistance, data “aggregation, profiling, and social sorting techniques,” are often needed, leading a need for a responsible data approach.
  • This Privacy Impact Assessment (PIA) aims to identify the privacy risks posed by their program and seek to enhance safeguards that can mitigate those risks.
  • Key issues raised in the PIA involves the challenge of ensuring that individuals’ data will not be used for purposes other than those initially specified.

Data Responsibility in Identity and Biometrics

Bohlin, A. (2008) “Protection at the Cost of Privacy? A Study of the Biometric Registration of Refugees.” Lund: Faculty of Law of the University of Lund.

  • This 2008 study focuses on the systematic biometric registration of refugees conducted by UNHCR in refugee camps around the world, to understand whether enhancing the registration mechanism of refugees contributes to their protection and guarantee of human rights, or whether refugee registration exposes people to invasions of privacy.
  • Bohlin found that, at the time, UNHCR failed to put a proper safeguards in the case of data dissemination, exposing the refugees data to the risk of being misused. She goes on to suggest data protection regulations that could be put in place in order to protect refugees’ privacy.

Currion, Paul. (2018) “The Refugee Identity.” Medium.

  • Developed as part of a DFID-funded initiative, this essay considers Data Requirements for Service Delivery within Refugee Camps, with a particular focus on refugee identity.
  • Among other findings, Currion finds that since “the digitisation of aid has already begun…aid agencies must therefore pay more attention to the way in which identity systems affect the lives and livelihoods of the forcibly displaced, both positively and negatively.”
  • Currion argues that a Responsible Data approach, as opposed to a process defined by a Data Minimization principle, provides “useful guidelines,” but notes that data responsibility “still needs to be translated into organisational policy, then into institutional processes, and finally into operational practice.”

Farraj, A. (2010) “Refugees and the Biometric Future: The Impact of Biometrics on Refugees and Asylum Seekers.” Colum. Hum. Rts. L. Rev. 42 (2010): 891.

  • This article argues that biometrics help refugees and asylum seekers establish their identity, which is important for ensuring the protection of their rights and service delivery.
  • However, Farraj also describes several risks related to biometrics, such as, misidentification and misuse of data, leading to a need for proper approaches for the collection, storage, and utilization of the biometric information by government, international organizations, or other parties.  

GSMA (2017) Landscape Report: Mobile Money, Humanitarian Cash Transfers and Displaced Populations. London: GSMA.

  • This paper from GSMA seeks to evaluate how mobile technology can be helpful in refugee registration, cross-organizational data sharing, and service delivery processes.
  • One of its assessments is that the use of mobile money in a humanitarian context depends on the supporting regulatory environment that contributes to unlocking the true potential of mobile money. The examples include extension of SIM dormancy period to anticipate infrequent cash disbursements, ensuring that persons without identification are able to use the mobile money services, and so on.
  • Additionally, GMSA argues that mobile money will be most successful when there is an ecosystem to support other financial services such as remittances, airtime top-ups, savings, and bill payments. These services will be especially helpful in including displaced populations in development.

GSMA (2017) Refugees and Identity: Considerations for mobile-enabled registration and aid delivery. London: GSMA.

  • This paper emphasizes the importance of registration in the context of humanitarian emergency, because being registered and having a document that proves this registration is key in acquiring services and assistance.
  • Studying cases of Kenya and Iraq, the report concludes by providing three recommendations to improve mobile data collection and registration processes: 1) establish more flexible KYC for mobile money because where refugees are not able to meet existing requirements; 2) encourage interoperability and data sharing to avoid fragmented and duplicative registration management; and 3) build partnership and collaboration among governments, humanitarian organizations, and multinational corporations.

Jacobsen, Katja Lindskov (2015) “Experimentation in Humanitarian Locations: UNHCR and Biometric Registration of Afghan Refugees.” Security Dialogue, Vol 46 No. 2: 144–164.

  • In this article, Jacobsen studies the biometric registration of Afghan refugees, and considers how “humanitarian refugee biometrics produces digital refugees at risk of exposure to new forms of intrusion and insecurity.”

Jacobsen, Katja Lindskov (2017) “On Humanitarian Refugee Biometrics and New Forms of Intervention.” Journal of Intervention and Statebuilding, 1–23.

  • This article traces the evolution of the use of biometrics at the Office of the United Nations High Commissioner for Refugees (UNHCR) – moving from a few early pilot projects (in the early-to-mid-2000s) to the emergence of a policy in which biometric registration is considered a ‘strategic decision’.

Manby, Bronwen (2016) “Identification in the Context of Forced Displacement.” Washington DC: World Bank Group. Accessed August 21, 2017.

  • In this paper, Bronwen describes the consequences of not having an identity in a situation of forced displacement. It prevents displaced population from getting various services and creates higher chance of exploitation. It also lowers the effectiveness of humanitarian actions, as lacking identity prevents humanitarian organizations from delivering their services to the displaced populations.
  • Lack of identity can be both the consequence and and cause of forced displacement. People who have no identity can be considered illegal and risk being deported. At the same time, conflicts that lead to displacement can also result in loss of ID during travel.
  • The paper identifies different stakeholders and their interest in the case of identity and forced displacement, and finds that the biggest challenge for providing identity to refugees is the politics of identification and nationality.
  • Manby concludes that in order to address this challenge, there needs to be more effective coordination among governments, international organizations, and the private sector to come up with an alternative of providing identification and services to the displaced persons. She also argues that it is essential to ensure that national identification becomes a universal practice for states.

McClure, D. and Menchi, B. (2015). Challenges and the State of Play of Interoperability in Cash Transfer Programming. Geneva: UNHCR/World Vision International.

  • This report reviews the elements that contribute to the interoperability design for Cash Transfer Programming (CTP). The design framework offered here maps out these various features and also looks at the state of the problem and the state of play through a variety of use cases.
  • The study considers the current state of play and provides insights about the ways to address the multi-dimensionality of interoperability measures in increasingly complex ecosystems.     

NRC / International Human Rights Clinic (2016). Securing Status: Syrian refugees and the documentation of legal status, identity, and family relationships in Jordan.

  • This report examines Syrian refugees’ attempts to obtain identity cards and other forms of legally recognized documentation (mainly, Ministry of Interior Service Cards, or “new MoI cards”) in Jordan through the state’s Urban Verification Exercise (“UVE”). These MoI cards are significant because they allow Syrians to live outside of refugee camps and move freely about Jordan.
  • The text reviews the acquirement processes and the subsequent challenges and consequences that refugees face when unable to obtain documentation. Refugees can encounter issues ranging from lack of access to basic services to arrest, detention, forced relocation to camps and refoulement.  
  • Seventy-two Syrian refugee families in Jordan were interviewed in 2016 for this report and their experiences with obtaining MoI cards varied widely.

Office of Internal Oversight Services (2015). Audit of the operations in Jordan for the Office of the United Nations High Commissioner for Refugees. Report 2015/049. New York: UN.

  • This report documents the January 1, 2012 – March 31, 2014 audit of Jordanian operations, which is intended to ensure the effectiveness of the UNHCR Representation in the state.
  • The main goals of the Regional Response Plan for Syrian refugees included relieving the pressure on Jordanian services and resources while still maintaining protection for refugees.
  • The audit results concluded that the Representation was initially unsatisfactory, and the OIOS suggested several recommendations according to the two key controls which the Representation acknowledged. Those recommendations included:
    • Project management:
      • Providing training to staff involved in financial verification of partners supervise management
      • Revising standard operating procedure on cash based interventions
      • Establishing ways to ensure that appropriate criteria for payment of all types of costs to partners’ staff are included in partnership agreements
    • Regulatory framework:
      • Preparing annual need-based procurement plan and establishing adequate management oversight processes
      • Creating procedures for the assessment of renovation work in progress and issuing written change orders
      • Protecting data and ensuring timely consultation with the UNHCR Division of Financial and Administrative Management

UNHCR/WFP (2015). Joint Inspection of the Biometrics Identification System for Food Distribution in Kenya. Geneva: UNHCR/WFP.

  • This report outlines the partnership between the WFP and UNHCR in its effort to promote its biometric identification checking system to support food distribution in the Dadaab and Kakuma refugee camps in Kenya.
  • Both entities conducted a joint inspection mission in March 2015 and was considered an effective tool and a model for other country operations.
  • Still, 11 recommendations are proposed and responded to in this text to further improve the efficiency of the biometric system, including real-time evaluation of impact, need for automatic alerts, documentation of best practices, among others.

Algorithmic Injustice


Tafari Mbadiwe at The Atlantis: “For generations, the Maasai people of eastern Africa have passed down the story of a tireless old man. He lived alone and his life was not easy. He spent every day in the fields — tilling the land, tending the animals, and gathering water. The work was as necessary as it was exhausting. But the old man considered himself fortunate. He had a good life, and never really gave much thought to what was missing.

One morning the old man was greeted with a pleasant surprise. Standing in his kitchen was a young boy, perhaps seven or eight years old. The old man had never seen him before. The boy smiled but said nothing. The old man looked around. His morning breakfast had already been prepared, just as he liked it. He asked the boy’s name. “Kileken,” the boy replied. After some prodding, the boy explained that, before preparing breakfast, he had completed all of the old man’s work for the day. Incredulous, the old man stepped outside. Indeed, the fields had been tilled, the animals tended, and the water gathered. Astonishment written all over his face, the old man staggered back into the kitchen. “How did this happen? And how can I repay you?” The boy smiled again, this time dismissively. “I will accept no payment. All I ask is that you let me stay with you.” The old man knew better than to look a gift horse in the mouth.

Kileken and the old man soon became inseparable, and the farm grew lush and bountiful as it never had before. The old man could hardly remember what life was like before the arrival of his young comrade. There could be no doubt: With Kileken’s mysterious assistance, the old man was prospering. But he never quite understood why, or how, it had happened.

To an extent we have failed to fully acknowledge, decision-making algorithms have become our society’s collective Kileken. They show up unannounced and where we least expect them, promise and often deliver great things, and quickly come to be seen as indispensable. Their reach can’t be overestimated. They tell traders what stocks to buy and sell, determine how much our car insurance costs, influence which products Amazon shows us and how much we get charged for them, and interpret our Google searches and rank their results….(More)”.

Artificial Intelligence and the Need for Data Fairness in the Global South


Medium blog by Yasodara Cordova: “…The data collected by industry represents AI opportunities for governments, to improve their services through innovation. Data-based intelligence promises to increase the efficiency of resource management by improving transparency, logistics, social welfare distribution — and virtually every government service. E-government enthusiasm took of with the realization of the possible applications, such as using AI to fight corruption by automating the fraud-tracking capabilities of cost-control tools. Controversially, the AI enthusiasm has spread to the distribution of social benefits, optimization of tax oversight and control, credit scoring systems, crime prediction systems, and other applications based in personal and sensitive data collection, especially in countries that do not have comprehensive privacy protections.

There are so many potential applications, society may operate very differently in ten years when the “datafixation” has advanced beyond citizen data and into other applications such as energy and natural resource management. However, many countries in the Global South are not being given necessary access to their countries’ own data.

Useful data are everywhere, but only some can take advantage. Beyond smartphones, data can be collected from IoT components in common spaces. Not restricted to urban spaces, data collection includes rural technology like sensors installed in tractors. However, even when the information is related to issues of public importance in developing countries —like data taken from road mesh or vital resources like water and land — it stays hidden under contract rules and public citizens cannot access, and therefore take benefit, from it. This arrangement keeps the public uninformed about their country’s operations. The data collection and distribution frameworks are not built towards healthy partnerships between industry and government preventing countries from realizing the potential outlined in the previous paragraph.

The data necessary to the development of better cities, public policies, and common interest cannot be leveraged if kept in closed silos, yet access often costs more than is justifiable. Data are a primordial resource to all stages of new technology, especially tech adoption and integration, so the necessary long term investment in innovation needs a common ground to start with. The mismatch between the pace of the data collection among big established companies and small, new, and local businesses will likely increase with time, assuming no regulation is introduced for equal access to collected data….

Currently, data independence remains restricted to discussions on the technological infrastructure that supports data extraction. Privacy discussions focus on personal data rather than the digital accumulation of strategic data in closed silos — a necessary discussion not yet addressed. The national interest of data is not being addressed in a framework of economic and social fairness. Access to data, from a policy-making standpoint, needs to find a balance between the extremes of public, open access and limited, commercial use.

A final, but important note: the vast majority of social media act like silos. APIs play an important role in corporate business models, where industry controls the data it collects without reward, let alone user transparency. Negotiation of the specification of APIs to make data a common resource should be considered, for such an effort may align with the citizens’ interest….(More)”.

International Development Doesn’t Care About Patient Privacy


Yogesh Rajkotia at the Stanford Social Innovation Review: “In 2013, in southern Mozambique, foreign NGO workers searched for a man whom the local health facility reported as diagnosed with HIV. The workers aimed to verify that the health facility did indeed diagnose and treat him. When they could not find him, they asked the village chief for help. Together with an ever-growing crowd of onlookers, the chief led them to the man’s home. After hesitating and denying, he eventually admitted, in front of the crowd, that he had tested positive and received treatment. With his status made public, he now risked facing stigma, discrimination, and social marginalization. The incident undermined both his health and his ability to live a dignified life.

Similar privacy violations were documented in Burkina Faso in 2016, where community workers asked partners, in the presence of each other, to disclose what individual health services they had obtained.

Why was there such a disregard for the privacy and dignity of these citizens?

As it turns out, unbeknownst to these Mozambican and Burkinabé patients, their local health centers were participating in performance-based financing (PBF) programs financed by foreign assistance agencies. Implemented in more than 35 countries, PBF programs offer health workers financial bonuses for delivering priority health interventions. To ensure that providers do not cheat the system, PBF programs often send verifiers to visit patients’ homes to confirm that they have received specific health services. These verifiers are frequently community members (the World Bank callously notes in its “Performance-Based Financing Toolkit” that even “a local soccer club” can play this role), and this practice, known as “patient tracing,” is common among PBF programs. In World Bank-funded PBF programs alone, 19 out of the 25 PBF programs implement patient tracing. Yet the World Bank’s toolkit never mentions patient privacy or confidentiality. In patient tracing, patients’ rights and dignity are secondary to donor objectives.

Patient tracing within PBF programs is just one example of a bigger problem: Privacy violations are pervasive in global health. Some researchers and policymakers have raised privacy concerns about tuberculosis (TB), human immunodeficiency virus (HIV), family planningpost-abortion care, and disease surveillance programsA study conducted by the Asia-Pacific Network of People Living with HIV/AIDS found that 34 percent of people living with HIV in India, Indonesia, Philippines, and Thailand reported that health workers breached confidentiality. In many programs, sensitive information about people’s sexual and reproductive health, disease status, and other intimate health details are often collected to improve health system effectiveness and efficiency. Usually, households have no way to opt out, nor any control over how heath care programs use, store, and disseminate this data. At the same time, most programs do not have systems to enforce health workers’ non-disclosure of private information.

In societies with strong stigma around certain health topics—especially sexual and reproductive health—the disclosure of confidential patient information can destroy lives. In contexts where HIV is highly stigmatized, people living with HIV are 2.4 times more likely to delay seeking care until they are seriously ill. In addition to stigma’s harmful effects on people’s health, it can limit individuals’ economic opportunities, cause them to be socially marginalized, and erode their psychological wellbeing….(More)”.

How Incorporating Behavioral Science into Cash Transfer Programs Is Changing Lives


Josh Martin and Laura Rawlings at Next Billion: “…Today, a new generation of cash transfer programs – currently being piloted in several countries in Africa – uses behavioral insights to help beneficiaries decide how to spend their cash and follow through on those plans. But the circumstances under which they receive the funds—like how long they have to wait on payment day or how close the local market is to the payment site—impact whether they put that intention into action. Other often-overlooked program design factors, such as the frequency of payments or how the purpose of the cash is framed, can disproportionately affect how people spend (or save) their money. Insights from behavioral science show that people act in predictable ways—and we can use that knowledge to design cash transfer programs that support people’s goals and continue to set them up for success.

For example, in our work, we have found that the way payments are made often caters more to administrators’ convenience than beneficiaries’ needs. But some innovators are already changing the timing, location and frequency of payments to suit recipients. For instance, GiveDirectly, a nonprofit that provides unconditional cash transfers, is experimenting with allowing beneficiaries in Kenya to choose when they’d prefer their payments to occur. This is important because getting money at the wrong time can actually increase stress. When cash arrives infrequently, it forces recipients to stretch funds until the next payment. But if it is transferred too often, recipients must save slowly over time, pulling their attention away from other critical tasks. While it isn’t always possible to pay everyone according to their ideal schedule, even offering some payment flexibility may help recipients achieve their goals more quickly.

A simple prompt for beneficiaries to consider how they’d like to use their money right before receiving it can also support their financial goals. Other tactics include reminders to follow through on plans, systems to provide feedback to people on their savings progress, and wallets to help them physically separate (and thus mentally separate) what they want to spend routinely from what they want to set aside for the future. Many inexpensive options exist that are fairly easy to put in place.

To bring more of these solutions to cash transfer programs, ideas42 and the World Bank, with financial support from the Global Innovation Fund, are launching a new initiative, Behavioral Design for Cash Transfer Programs. Working with government partners to identify the best options for incorporating behavioral designs in cash transfer programs across several African nations is a critical next step in improving this anti-poverty tool. We can then work to make behavioral science an automatic part of any social protection program that features a cash transfer….(More)”.

Issuing Bonds to Invest in People


Tina Rosenberg at the New York Times: “The first social impact bond began in 2010 in Peterborough, England. Investors funded a program aimed at keeping newly released short-term inmates out of prison. It reduced reoffending by 9 percent compared to a control group, exceeding its target. So investors got their money back, plus interest.

Seldom has a policy idea gone viral so fast. There are now 108 such bonds, in 24 countries. The United States has 20, leveraging $211 million in investment capital, and at least 50 more are on the way. These bonds fund programs to reduce Oklahoma’s population of women in prison, help low-income mothers to have healthy pregnancies in South Carolina, teach refugees and immigrants English and job skills in Boston, house the homeless in Denver, and reduce storm water runoff in the District of Columbia. There’s a Forest Resilience Bond underway that seeks to finance desperately needed wildfire prevention.

Here’s how social impact bonds differ from standard social programs:

They raise upfront money to do prevention. Everyone knows most prevention is a great investment. But politicians don’t do “think ahead” very well. They hate to spend money now to create savings their successors will reap. Issuing a social impact bond means they don’t have to.

They concentrate resources on what works. Bonds build market discipline, since investors demand evidence of success.

They focus attention on outcomes rather than outputs. “Take work-force training,” said David Wilkinson, commissioner of Connecticut’s Office of Early Childhood. “We tend to pay for how many people receive training. We’re less likely to pay for — or even look at — how many people get good jobs.” Providers, he said, were best recognized for their work “when we reward them for outcomes they want to see and families they are serving want to achieve.”

They improve incentives.Focusing on outcomes changes the way social service providers think. In Connecticut, said Duryea, they now have a financial incentive to keep children out of foster care, rather than bring more in.

They force decision makers to look at data. Programs start with great fanfare, but often nobody then examines how they are doing. But with a bond, evaluation is essential.

They build in flexibility.“It’s a big advantage that they don’t prescribe what needs to be done,” said Cohen. The people on the ground choose the strategy, and can change it if necessary. “Innovators can think outside the box and tackle health or education in revolutionary ways,” he said.

…In the United States, social impact bonds have become synonymous with “pay for success” programs. But there are other ways to pay for success. For example, Wilkinson, the Connecticut official, has just started an Outcomes Rate Card — a way for a government to pay for home visits for vulnerable families. The social service agencies get base pay, but also bonuses. If a client has a full-term birth, the agency gets an extra $135 for a low-risk family, $170 for a hard-to-help one. A client who finds stable housing brings $150 or $220 to the agency, depending on the family’s situation….(More)”.