Digital Personas & Citizen Profiles

We want to ensure that no-one gets left behind when designing digitally-enabled services. This aligns to our City Principle “Apply Human-Centred Design”.

We have developed a library of personas which describe the common characteristics of citizens in our city who might be more likely to be left
behind. These include disabled people, older people and carers.

We expect anyone creating or buying digital services for our city to make use of this library. They can use it to check if their digital service might
be at risk of leaving someone behind. They can then use the design principles to make sure they create an inclusive digital service.

A selection of 4 personas is available here:

Designing with citizens in mind

We always use citizen-centred principles when designing digital services for our city.
We involve people affected by the digital technology in all stages of its development from initial idea through to testing, deployment and evaluation. Our digital citizen advocates help us think about digital developments across the city.

When we are using digital services which have been created elsewhere then we expect these design principles to have been adhered to.

This helps us be confident that we are creating and running digital services which meet the needs of our citizens.

Meeting digital design standards from government and the NHS

When creating or running digital services we use the government digital standard and the NHS digital design standard so that we can be confident that we are meeting the needs of our citizens. We also take into account the code of conduct for data driven health and care technology.

  • 01 - Define the user

  • 02 - Define the value proposition

  • 03 - Be fair, transparent and accountable about what data you are using

  • 04 - Use data that is proportionate to the identified user need (data minimisation principle of GDPR)

  • 05 - Make use of open standards

  • 06 - Be transparent to the limitations of the data used and algorithms deployed

  • 07 - Make security integral to the design

  • 08 - Define the commercial strategy

  • 09 - Show evidence of effectiveness for the intended use

  • 10 - Show what type of algorithm you are building, the evidence base for choosing that algorithm, how you plan to monitor its performance on an ongoing basis and how you are validating performance of the algorithm.