Skip to content

Open source and digital sovereignty #73

@ouvry-ems

Description

@ouvry-ems

Activity ID: GGI-A-35.


Scorecard

Click to expand

Customized description

Scope of what has to be done.

Opportunity assessment

Why is this activity relevant?

Objectives

What we aim to achieve in this iteration.

Tools

Technologies, tools and products used in the Activity.

Operational Notes

Approach, method to progress in the Activity


Description

Digital sovereignty can be defined as the

“Ability and opportunity of individuals and institutions to execute their role(s) in the digital world independently, intentionally and safely.”
— Competence Centre for Public IT, Germany

In order to properly conduct its business, any entity has to rely on some other partners, services, products and tools. Reviewing the ties and constraints of these dependencies enable the organisation to assess and control its dependence towards external factors, thus improving its autonomy and resilience.

As an example, vendor lock-in is a strong factor of dependence that may impede the organisation's processes and added value and as such, it should be avoided. Open source is one of the ways out of this lock. Open source plays a significant role in digital sovereignty, allowing a greater choice between solutions, providers and integrators, and greater control over IT roadmaps.

It should be noted that digital sovereignty is not a trust issue: we obviously need to trust our partners and providers, but the relationship gets even better when it's based on mutual consent and recognition, rather than forced contracts and strains.

Here are some advantages of a better digital sovereignty:

  • Improve the ability of the organisation to make its own choices without constraints.
  • Improve the resilience of the company regarding external actors and factors.
  • Improve negotiating position when dealing with partners and service providers.

Opportunity Assessment

  • How difficult/expensive is it to move away from a solution?
  • Could the solution providers impose unwanted conditions on their service (e.g. licence change, contracts updates)?
  • Could the solution providers unilaterally increase their prices, simply because we do not have a choice?

Progress Assessment

The following verification points demonstrate progress in this Activity:

  • There is an assessment of critical dependencies for the organisation's providers and partners.
  • There is a backup plan for these identified dependencies.
  • There is a stated requirement for digital sovereignty when new solutions are investigated.

Recommendations

  • Identify key dependency risks from service providers and 3rd party entities.
  • Maintain a list of open-source alternatives to critical services.
  • Add a requirement when selecting new tools and services used within the entity, stating the need for digital sovereignty.

Resources

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions