These resources are listed in order roughly according to either their priority to be considered in the strategy planning process (i.e. Initial Design Considerations) or the the path data would take across collection, integration / processing to end-user access.
Africa Health Expo - Presentation -
3IR b4 4IR: Data Accessibility to Enable African
Data Science, ML and AI for Health (slides)
Initial Design ConsiderationsThreat modellingWhen dealing with any security or data privacy issue, co-developing a "threat model" can be very useful (and is often a prerequisite) to help inform how much effort is required to make a system or its data outputs safe. For this reason, I believe it is important to consider early to help inform stratgey generally. For our context, it seems that we would require some of the highest level threat model considerations, e.g. cyberattack from another nation state (e.g. a North Korea ransomewear attack). I think that some form of threat model should be captured somewhere to check against if the measures we suggest are sufficient.
ResourcesOWASP Threat Modelling Project
Threat Modelling Manifesto
NIST Guide to Data-Centric Threat Modelling