top of page

The DPI trap: when governance guidance becomes a platform launch

  • Writer: Ott Sarv
    Ott Sarv
  • Sep 29, 2025
  • 6 min read

In many capitals, the first artefact of a national Digital Public Infrastructure (DPI) is not a legal inventory, a mandate instrument, or an operable remedy pathway. It is a demo. A dashboard. A procurement plan. The system works, the integration looks clean, the timeline ends with a launch, and the story is easy to repeat.


Then the harder question arrives: who is accountable for the legal effect produced when a public institution executes a digital act, and what happens when that act is wrong.

A major multilateral development agency has helped popularise DPI as foundational digital systems enabling secure, seamless interactions across society, and it has paired that narrative with practical playbooks and safeguards.  The tension is that country programmes can still experience the posture as technology-first, not because the doctrine is build-first, but because delivery incentives often reward visible technical outputs sooner than they reward inspection readiness.


The boundary problem most programmes skip

Category mistakes are the most expensive DPI mistakes because they harden early and become difficult to reverse under reliance expansion. The fastest route to clarity is to keep the following terms distinct, and to treat the boundary between them as a governance control rather than a semantic debate.

Term

What it is

Boundary that matters under reliance

Shared, cross-domain capability foundations and trust mechanisms, defined by reuse and governance scope

DPI is not a sector platform and does not carry legal effect by default

A public-facing outcome in a specific domain delivered under lawful authority and an authorised procedure

A DPS consumes DPI but remains anchored in accountable outcome delivery, not in the platform

A procedure-bound public act such as eligibility determination, registration update, certification issuance, enforcement action, or validation decision

A DPF must remain attributable to a competent institution with decision rights and evidentiary duties

A reusable artefact such as software, specifications, or reference implementations

A DPG does not provide lawful authority, institutional mandate, or remedy operability by default

The institutional guidance that defines DPI as foundational systems is useful for mobilisation, but it is not procurement-grade by itself because it does not resolve who is authorised to act, who is compellable to correct, what evidence must exist, and how remedy reaches every relying party.


Two drifts that create the technology-first feeling

When programmes blur DPI, DPS, DPF, and DPG, two drifts appear. One drift turns governance into a retrospective overlay. The other turns domain solutions into pseudo-infrastructure.

Drift

What it looks like on the ground

What breaks first

Why it becomes hard to reverse

Governance drift

Procurement defaults, interface flows, or vendor workflow begin to substitute for lawful authority, institutional mandate, and authorised procedure

Decision rights become ambiguous, evidence quality becomes non-admissible under dispute, and remedy becomes discretionary

Once multiple agencies rely on outcomes, suspension and correction propagation become politically costly and operationally fragile

Boundary drift

Domain entitlements and decision logic are embedded into shared rails, turning reuse into cross-government coupling

Canonical record semantics and service logic become sector-shaped, reducing modular replaceability

Sector rules harden into infrastructure, making policy change dependent on changing shared capability rather than changing the domain service

The Universal DPI safeguards work takes a lifecycle view and explicitly treats risk as spanning governance, design, deployment, and use, not as a post-launch checklist.  That lifecycle framing aligns closely with what drift looks like in practice: drift is an event, not a theory.


Why governance-forward doctrine can still drive build-first sequencing

The same institution that promotes DPI as foundational systems also publishes a DPI playbook positioned as a practical resource for inclusive, rights-based adoption.  It also frames digital governance risk in terms of fast-moving technologies outpacing legal safeguards and oversight.


So why do some programmes still feel like a platform rollout?


A plausible explanation is measurement asymmetry. A programme can demonstrate a wallet, an exchange, a login service, or an API gateway in weeks. It often cannot demonstrate, with the same immediacy, that oversight can compel evidence, order corrective intervention, and make remedy operable across every dependency surface. Safeguards exist on paper, but operability tests are not treated as sequencing gates.

This is not an argument against delivery acceleration. It is an argument about legal sequence: legality must be a prerequisite, not a retrospective check.


The use case temptation

The SDG-facing DPI narrative is deliberately broad, mapping DPI to cross-sector impacts and showcasing domain use cases to mobilise support and funding.  That breadth is politically useful. It also creates a boundary hazard: when an inspiration compendium becomes a procurement template, domain use cases can become infrastructure requirements, and the easiest technical artefact to ship becomes the thing everyone calls DPI.

Use case move

When it stays within DPI boundaries

When it steps outside DPI boundaries

A simple classification test

Sector onboarding through a wallet or exchange

The sector service consumes DPI capabilities through governed interfaces while retaining domain decision rights

Sector eligibility and exceptions are encoded into shared rails

Can the sector service be replaced without changing the shared rail’s rules, logs, and custodianship

Consent-based access

Consent is treated as a legally recognised act with withdrawal handling, scope proof, and admissible disclosure trails

Consent becomes a toggle that substitutes for authorised procedure

Does withdrawal propagate across dependent systems with inspection-ready evidence

Unified portals

Interface provides procedurally governed access, receipting, and timelines linked to an authorised procedure

Portal experience substitutes for lawful access logic and becomes implied authority

Can a user obtain a contestation-ready receipt and initiate procedural remedy through the interface

A separate governance assessment framework for data exchange systems exists precisely to keep policy, regulatory, and institutional arrangements central, which reinforces that the doctrine is not purely technical.  The recurring gap is not the absence of governance language; it is whether governance artefacts block reliance expansion when they are not operable.


A governance-first sequence that still moves fast

A practical way to make governance real is to anchor delivery in the Seven Layer Model for Digital Public Infrastructure (SLM), which sequences legal authority, institutional mandate, canonical records, governed rule execution, binding issuance, public interfaces, and independent oversight so that digital acts remain attributable and contestable under pressure.


The table below expresses that sequence as gates that can be tested at first reliance.

SLM layer

Sequencing gate and minimum artefact

Operability test at first reliance

Evidence expectation

L1: legal authority

Legal origin is inspection-ready through a maintained legal inventory linking each Digital Public Function to lawful authority and legal effect boundaries

A competent authority can demonstrate the competence chain for each binding act and the authorised procedure that makes the act valid

Decision provenance includes authority reference, procedure reference, and effect boundary traceability

L2: institutional mandate

Mandate and decision rights are enforceable through a mandate instrument allocating custodianship, supervision, and correction duties to a named institution

The named institution can compel compliant operation, order correction propagation, and execute lawful suspension without discretionary cooperation

Accountability chain is reconstructable across institutions and dependency surfaces

L3: canonical records

Canonical records are governable through registry governance, correction procedure, and retention rules

A lawful correction propagates downstream without shadow registries becoming de facto truth

Record state history and linkage are reconstructable over time with evidence-grade integrity

L4: service logic

Service logic is attributable through versioned decision logic mapped to procedure states, exceptions, and change control

Rule change, rollback, and test replay can be demonstrated without vendor negotiation and without redefining the procedure in code

Rule versions and exception paths link to outcomes with auditable traceability

L5: execution layer

Binding execution is controlled through a governed execution environment and finalisation controls for binding acts

The system can prove which workflow ran, when, under which rule version, and with complete logging

Execution traces are complete, attributable, reviewable, and suitable for independent inspection

L6; public interface

Procedural access is contestable through receipting, timelines, inclusive access channels, and transparency controls

A user can obtain a contestation-ready receipt and initiate procedural remedy through a defined pathway

Interface events correlate reliably to the decision record and disclosure trail

L7: oversight and remedy

Oversight and remedy are operable through supervisory powers and operational redress procedures

Oversight can compel evidence, require corrective action, and verify correction propagation in practice

Inspection readiness is continuous and does not rely on ad hoc reconstruction after incidents


This is the difference between guidance and enforceability: safeguards become effective only when they change what can happen under dispute, not when they exist as principles.


The core critique...

The strongest critique is rarely that the major multilateral development agency is publishing a build-first doctrine. Its DPI definition, its playbook, its safeguards framing, and its broader digital governance positioning all emphasise governance, institutional responsibility, and risk management across the lifecycle.


The sharper critique is that its DPI narrative operates across two audiences at once. One audience needs mobilisation and visible results, so the story is told through rails and use cases. Another audience needs enforceable sequencing discipline, so the same story must be read through legal sequence, decision rights, evidentiary duties, and remedy operability. When delivery incentives privilege the first audience’s signals over the second, governance drift and boundary drift become indistinguishable from a technology-first approach.

Meet the author of the Seven Layer Model for Digital Public Infrastructure

Ott Sarv

  • LinkedIn
Ott Sarv The Seven Layer Model Author

author of the Seven Layer Model for Digital Public Infrastructure

Senior advisor in Digital Identity and Digital Public Infrastructure. Ott Sarv helps institutions align lawful authority, institutional mandate, canonical records, and machine-readable rules with verifiable execution, enabling enforceable outcomes. Engagements combine policy, architecture, and delivery support.

Download the Seven Layer Model for DPI

This paper is shared with practitioners and researchers working on digital public infrastructure and digital identity.


Submit your details to receive the PDF access link.

Author
bottom of page