Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

Digital Commons Governance

Successful coalitions treat essential digital resources as shared public utilities requiring collective stewardship rather than unilateral control.

Why This Matters

When digital infrastructure is governed solely by market logic or controlled by a single organization:

  • Arbitrary access restrictions emerge
  • Systemic fragility increases
  • Power imbalances undermine collaboration

Core Principles

Principle Implementation
Advocacy Effect Infrastructure amplifies collective voice
Alignment Effect Shared tools create shared strategy
Network Effect Value increases with participation
Give to Get Radical sharing of lessons and resources

Two Primary Models

Hub-and-Spoke Model

A central anchor organization maintains core infrastructure; smaller partners access through tiered memberships.

                    ┌─────────────┐
                    │   Anchor    │
                    │   (Hub)     │
                    └──────┬──────┘
                           │
          ┌────────────────┼────────────────┐
          │                │                │
    ┌─────▼─────┐    ┌─────▼─────┐    ┌─────▼─────┐
    │  Partner  │    │  Partner  │    │  Partner  │
    │     A     │    │     B     │    │     C     │
    └───────────┘    └───────────┘    └───────────┘
Advantages Limitations
High standardization Single point of failure
Centralized security auditing Potential power imbalances
Lower technical barrier for small partners Rigid feature sets
Simplified compliance Data ownership concentration

Ideal for: State-level coalitions led by a highly resourced entity (e.g., dominant state ACLU chapter, primary legal aid hub)

Federated (Distributed) Model

Virtual governance layer connects sovereign organizational systems. Partners maintain independent databases but adhere to interoperability standards.

    ┌───────────┐         ┌───────────┐
    │   Org A   │◄───────►│   Org B   │
    │  (Node)   │         │  (Node)   │
    └─────┬─────┘         └─────┬─────┘
          │                     │
          │   ┌───────────┐     │
          └──►│  Virtual  │◄────┘
              │Governance │
          ┌──►│   Layer   │◄────┐
          │   └───────────┘     │
          │                     │
    ┌─────┴─────┐         ┌─────┴─────┐
    │   Org C   │◄───────►│   Org D   │
    │  (Node)   │         │  (Node)   │
    └───────────┘         └───────────┘
Advantages Limitations
Total data sovereignty per node High technical overhead
No single point of failure Complex API management
Highly customizable local workflows Intricate governance requirements
Equal power distribution Requires robust standards

Ideal for: National coalitions (e.g., FIRM, Ready to Stay) with equally resourced, diverse organizations


Comparison Matrix

Factor Hub-and-Spoke Federated
Setup Complexity Lower Higher
Ongoing Maintenance Centralized Distributed
Data Sovereignty Anchor controls Each org controls
Subpoena Risk Concentrated Distributed
Scalability Limited by hub Highly scalable
Cost Distribution Hub bears most Shared proportionally
Decision Speed Faster Requires consensus
Feature Flexibility Standardized Customizable

Governance Frameworks

Multi-Stakeholder Decision Bodies

Effective coalitions establish bodies representing:

  • Legal teams - Compliance and liability oversight
  • Field organizers - Operational requirements
  • Digital teams - Technical implementation
  • Executive leadership - Strategic direction

Decision-Making Matrix

Decision Type Authority Level Required Approvals
Day-to-day operations Technical team Internal review
Content publication Communications + Legal 2 approvals
Data sharing changes Governance body Unanimous consent
New partner onboarding Executive committee Majority vote
Emergency response Designated crisis lead Post-hoc review

Resource Sharing Agreements

Formal agreements must explicitly detail:

  • How data is ingested into coalition systems
  • How data may be utilized by each partner
  • Retention periods and archival policies
  • Destruction protocols upon agreement termination
  • Liability distribution for security incidents

Platform Selection

Centralized vs. Federated CMS

Approach Description Trade-offs
Centralized Headless CMS Single repository; partners pull via APIs Ensures accuracy; limits customization
Federated Content Partners maintain own CMS; shared standards Maximum flexibility; coordination overhead
Hybrid Core content centralized; local content federated Balanced approach; moderate complexity

Open Source vs. Commercial

Factor Open Source Commercial
Data Sovereignty Complete control Vendor-dependent
Subpoena Protection Maximum Vendor may comply
Scalability Requires resources Built-in
Support Community/self Professional
Cost Development time Licensing fees
Examples CiviCRM, Spoke Action Network, EveryAction

Privacy and Security Requirements

Non-negotiable requirements for coalition platforms:

Requirement Implementation
Encryption at rest AES-256 for stored data
Encryption in transit TLS 1.3 for all connections
Access controls Role-based with audit logging
No data brokering Contractual prohibition
Zero-knowledge options End-to-end encryption where feasible
Jurisdiction Avoid platforms with US law enforcement partnerships

Funding Models

Foundation Funding

Initial capital for capacity building:

  • Digital Public Infrastructure (DPI) grants
  • Technology-specific foundation programs
  • Multi-year capacity building awards

Key funders for immigrant rights tech:

  • Ford Foundation
  • Open Society Foundations
  • Four Freedoms Fund
  • Unbound Philanthropy

Tiered Membership Dues

Sustainable model based on organizational capacity:

Tier Annual Budget Monthly Contribution
Grassroots Under $250K $50-100
Established $250K-1M $200-400
Regional $1M-5M $500-1,000
National Over $5M $1,500-3,000

Benefits scale with contribution:

  • Grassroots: Access to shared tools, training
  • Established: Full platform access, priority support
  • Regional: Governance participation, custom integrations
  • National: Strategic direction, anchor responsibilities

In-Kind Contributions

Non-monetary support structures:

Contribution Type Value Recognition
Developer hours Track at market rate
Legal review time Billable hour equivalent
Server/hosting space Monthly cost equivalent
Training facilitation Per-session value
Translation services Per-word/hour rate

Long-Term Sustainability Planning

Coalitions must treat digital assets with same status as human and financial resources:

  • Board policies addressing managerial responsibilities
  • Organizational liability for technology stack
  • Succession planning for technical leadership
  • Reserve funds for emergency infrastructure needs
  • Exit strategies for platform migrations

Data Sharing Agreements

Essential DSA Components

Section Required Elements
Purpose Specific, limited use cases for shared data
Security Technical measures for transfer and storage
Access Which staff/roles can view which data
Retention How long data is kept; automatic deletion
Destruction Protocols upon agreement termination
Breach Response Notification timelines and responsibilities
Audit Rights Ability to verify partner compliance

Sample DSA Language

SECTION 4: DATA SECURITY

4.1 Receiving Party shall implement technical safeguards including:
    (a) AES-256 encryption for data at rest
    (b) TLS 1.3 for data in transit
    (c) Multi-factor authentication for all access
    (d) Role-based access controls with quarterly review

4.2 Receiving Party shall NOT:
    (a) Store data on personal devices
    (b) Share data with third parties without written consent
    (c) Use data for purposes beyond those specified in Section 2
    (d) Retain data beyond the period specified in Section 5

Data Siloing Requirements

For legal compliance and safety, coalition data must be segmented:

Data Type Access Level Siloing Requirement
Organizing contacts Field teams Separate from legal
Legal case data Attorneys only Attorney-client privilege
Donor information Development staff Fundraising use only
Volunteer records Coordinators HR compliance
Rapid response reports Designated staff Time-limited retention

Implementation Checklist

Governance Setup

  • [ ] Identify founding partner organizations
  • [ ] Determine hub-and-spoke vs. federated model
  • [ ] Draft initial governance charter
  • [ ] Establish multi-stakeholder decision body
  • [ ] Create decision-making matrix
  • [ ] Define membership tiers and benefits

Legal Framework

  • [ ] Draft Data Sharing Agreement template
  • [ ] Legal review of DSA by all partners
  • [ ] Execute agreements with founding partners
  • [ ] Establish liability distribution
  • [ ] Create breach notification procedures

Technical Foundation

  • [ ] Select core platform(s)
  • [ ] Define interoperability standards
  • [ ] Establish API access protocols
  • [ ] Implement security baseline
  • [ ] Create onboarding documentation

Sustainability Planning

  • [ ] Develop tiered dues structure
  • [ ] Identify foundation funding opportunities
  • [ ] Create in-kind contribution tracking
  • [ ] Establish reserve fund target
  • [ ] Plan for technical succession

Next Steps

  1. Review crisis communication infrastructure for emergency operations
  2. Compare CRM platforms for coalition needs
  3. Follow implementation roadmap for phased deployment
Legal Disclaimer

This website does not provide legal advice. The information provided on this site is for general informational and educational purposes only. It does not create an attorney-client relationship.

Information on this website may not be current or accurate. Immigration law is complex and varies by jurisdiction and individual circumstances. Always consult with a qualified immigration attorney for advice specific to your situation.

Neither ICE Encounter, its developers, partners, nor any contributors shall be liable for any actions taken or not taken based on information from this site. Use of this site is subject to our Terms of Use and Privacy Policy.