top of page

Hiring a DPI Policy Consultant Is Not a Procurement Task. It Is a Sovereignty Decision.

  • Writer: Ott Sarv
    Ott Sarv
  • Feb 27
  • 5 min read

Updated: 6 days ago

Governments do not usually lose control of the state because they lack software. They lose it because they delegate authority to systems that cannot be defended when challenged, corrected when wrong, or reversed when harm occurs. That is why selecting a DPI policy consultant is not a matter of desktop research, glossy frameworks, or imported maturity models. It is a decision about whether a country retains operational control over its own public power in the age of automation.


The contemporary vocabulary makes it easy to sound serious while doing shallow work. The harder test is whether the consultant has built and operated lawful capability on site, inside institutions, under real constraints, and through conflict.

This piece sets out how to proceed.


The starting rule: treat DPI as a legal institution, not a technology programme

The consultant you want is the one who understands, and can operationalise, a simple ordering constraint: Law Before Code.


Not as a slogan. As a control structure.

A system becomes public infrastructure only when the chain is complete: authority is defined, institutional mandate is assigned, canonical records are designated, procedures are mirrored into service logic, decisions are attributable, delivery preserves legal effect, and DPI Guidance and Enforcement exists to suspend, correct, and reverse outcomes.

Where the chain is incomplete, you do not have a state capability. You have automation that may look efficient until the first contested case lands.



On-site reality: regulations in hand, system on screen, and no clear bridge between them.
Public officials sit around a conference table reviewing printed legal documents and a laptop screen, reflecting institutional deliberation, accountability, and the weight of regulatory decision-making.

How to proceed: a selection process that favours field experience over desktop confidence

You should proceed as if you are hiring someone to help you run critical infrastructure during dispute conditions, not someone to write a report that pleases a donor or a procurement committee.


A credible selection process therefore starts by killing three illusions.

Illusion to remove early

Why it is dangerous

What replaces it

DPI as religion

Belief systems reward diagrams, not enforceability, and they collapse under scrutiny

Evidence-grade operating artefacts and reversible decision circuits

Global North as exporter of correctness

Imported templates routinely bypass domestic authority and shift liability to local institutions

Domestic legal origin, custodian liability, and contestability as gating conditions

Desktop DPI as equivalent to field DPI

Desktop work rarely faces institutional conflict, service counter realities, court scrutiny, or outage pressure

On-site operating experience that has survived disputes, reversals, and institutional escalation

The purpose of the process is not to punish theory. It is to ensure that theory is subordinated to operational reality.


The real dividing line: has the DPI policy consultant built lawful capability that survives dispute?

A serious consultant can describe, in concrete terms, how to take a national function from intent to enforceable operation. This is not abstract. It is a circuit that begins in law and ends in remedy.


That circuit is exactly what donor-driven programmes and platform-first programmes often skip, producing GovStack Failure patterns: output without authority, interfaces without admissibility, and compliance statements that arrive after the fact.


The selection process must therefore test for delivered Lawful Capability, not rhetorical capability.


Field tests: the questions that separate operators from presenters

A strong hiring panel does not ask about methodology. It asks for lived sequences, failure modes, and reversals.

Field test

What you ask in the interview

What a credible answer contains

Authority chain test

Explain a time a system output was challenged and had to be defended

Named authority basis, named custodian, rule lineage, evidence trail, and what changed afterward

Mandate conflict test

Describe a conflict between two institutions over who owns a function

How mandate boundaries were settled, how liability was assigned, how escalation worked

Canonical record reality test

What did you do when the record source was incomplete, inconsistent, or politically sensitive

How Data Exchange Platform Legal Authority was established, and how correction propagation was designed

Remedy test

Walk through how a wrong automated decision is reversed end to end

Suspension, correction, propagation, and what DPI Guidance and Enforcement looks like operationally

Governance drift test

What controls prevent platform defaults from becoming policy

How Governance Drift is prevented through change control, supervision access, and mandate-aware gating

Acceptance and entitlement test

How do you prevent interoperability from becoming entitlement

How Mandate Gating and Data Exchange Safeguards constrain disclosure and reliance

A consultant who cannot answer these with concrete operational steps is not ready for national DPI.


Money is not the problem. Misaligned incentives are.

A country should pay very well for the right person, because failure costs are not consultant costs. Failure costs are legitimacy costs, litigation costs, programme reset costs, and the political cost of losing control of public functions.


The threat is not high pay. The threat is a market where:

Incentive pattern

What it produces

Why it fails a country

Donor-pleasing outputs

Reports, workshops, launch events, and dashboards

Authority remains externalised, liability remains local, remedy remains absent

Desktop-first consulting

Beautiful policy language without operational control structures

Systems ship fast and break under scrutiny

Platform-first delivery

Features without jurisdictional grounding

Technology becomes policy by default, which is how states lose control

Monetisation of trust events

Tolls on verification and compliance artefacts

This becomes Priced Trust Transactions that ration trust and suppress adoption

A serious consultant is expensive because they reduce risk. A bad consultant is expensive because they produce theatre.


Global North and Global South is not geography. It is risk transfer.

The uncomfortable reality in many deployments is that imported DPI packages shift risk:

The exporter gains reputational upside from launch. The country inherits liability for contested decisions, institutional conflict, and citizen harm.


The right consultant makes that dynamic explicit and then reverses it. The consultant’s loyalty is to domestic legitimacy, not external optics. That is the practical meaning of Digital Sovereignty in DPI.


Procurement discipline: the gating conditions that should unlock funding and scope

If you want a process that works in real life, put hard gates into contracts and donor agreements. Do not fund scaling until the authority chain is complete.

Contract gate

Evidence required to pass the gate

What it prevents

Legal origin gate

Authorising basis and defined legal effect of outputs

Interface decisions that cannot bind rights

Custodian and liability gate

Named institutional owner, supervisory chain, escalation authority

Diffuse accountability and institutional blame loops

Canonical record gate

Designation of records, stewardship, correction propagation rules

Eligibility checks that cannot be defended

Procedure-to-service logic gate

Versioned rule lineage and change control

Configuration substituting for law

Remedy gate

Operational reversal and correction workflow with propagation

Governance that exists only in policy text

Safeguards gate

Demonstrable Mandate Gating and enforceable Data Exchange Safeguards

Entitlement drift and unreviewable disclosure

These gates are how you stop Product vs Project logic from capturing the programme.


What you should ask for as deliverables

Do not accept deliverables that only describe principles. Demand artefacts that operators will actually use after the consultant leaves, aligned with Trust Frameworks at Scale.

Deliverable

What it must enable

How you know it is real

Control matrix for authority and mandate

Who can do what, under which basis, with which liability

It is used in onboarding, change approvals, and incident response

Decision evidence profile

What evidence is created per decision and how it is retained

It supports replay under dispute

Remedy and reversal playbook

How errors suspend, correct, and propagate

It is exercised in drills and incident reviews

Change control protocol

How rule changes remain attributable and lawful

It produces a clear lineage from rule version to authority

Supervision interface requirements

How oversight bodies inspect behaviour

It exists as operational access, not a PDF

---

A DPI policy consultant is useful only if they can protect the state from mistaking a working interface for lawful authority.

Proceed by selecting for on-site experience in contested environments, insist on gates that prove legality before scale, and pay for capability rather than theatre. The alternative is predictable: a fast launch followed by slow collapse, where institutions discover too late that the system can neither be defended nor reversed.


If you want, I can now convert this into a publication-ready article with a stronger opening vignette and tighter pacing, while keeping the same selection tests and linked doctrinal anchors.



Meet the author of the Seven Layer Model for Digital Public Infrastructure

Ott Sarv

  • LinkedIn
Ott Sarv The Seven Layer Model Author

author of the Seven Layer Model for Digital Public Infrastructure

Senior advisor in Digital Identity and Digital Public Infrastructure. Ott Sarv helps institutions align lawful authority, institutional mandate, canonical records, and machine-readable rules with verifiable execution, enabling enforceable outcomes. Engagements combine policy, architecture, and delivery support.

Download the Seven Layer Model for DPI

This paper is shared with practitioners and researchers working on digital public infrastructure and digital identity.


Submit your details to receive the PDF access link.

bottom of page