<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 35.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too">
    <title>Now, Aadhaar details displayed in Mizoram too</title>
    <link>https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too</link>
    <description>
        &lt;b&gt;Contrary to the Centre’s assurances, government websites are revealing digital details of the poor, leaving them vulnerable to financial frauds and identity theft.&lt;/b&gt;
        &lt;p&gt;The article by Sebastian PT was &lt;a class="external-link" href="https://www.nationalheraldindia.com/news/2017/04/26/aadhaar-details-displayed-in-mizoram-jharkhand-chandigarh-financial-fraud-violating-supreme-court-order"&gt;published in the National Herald&lt;/a&gt; on April 26, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Could there be a method to the madness? Or is it just carelessness? From the Jharkhand Government to the Union Territory of Chandigarh to the Union Ministry of Water and Sanitation to even Mizoram’s Food and Civil Supplies Department, government websites are found to have displayed Aadhaar details of citizens, a crime under the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Jharkhand, details of 16 lakh beneficiaries – their bank account details, ration card and the 12-digit Aadhaar number – were displayed on the website of the Directorate of Social Security. Similar blunders were witnessed from different corners of the country from Chandigarh to Kerala, where details of 35 lakh people have been breached. This flies in the face of the Government’s repeated claims on data privacy, that Aadhaar details are completely safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law doesn’t allow this. The displaying of the Aadhaar data, for instance, is in clear violation of Section 29 of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016. The provision clearly says that “no” Aadhaar number or core biometric information of an Aadhaar number holder shall be “published, displayed or posted publicly”.&lt;br /&gt;&lt;br /&gt;“There appears to be no regulation worth the name as far as the Aadhaar project is concerned,” says economist Reetika Khera from IIT Delhi.&lt;br /&gt;&lt;br /&gt;So, will these officials responsible be punished according to the Act? More importantly, what about the damage of leaking such sensitive, apparently confidential data?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Irreparable Damage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several cyber security experts have been warning of the possibility of precisely such leaks and Opposition parties were vociferously pointing this out while the Centre was brazenly violating the Supreme Court’s orders and forcibly extending Aadhaar to almost everything – including it being linked to one’s Permanent Account Number (PAN), used for filing income tax.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What has been broken through technology, can’t be fixed with the law,” says Sunil Abraham, Executive Director of Bangalore-based research organisation, the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data breach just made it easy for players in the black market for ID (identification) documents to be lapped up to create false ID cards, for instance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When demonetisation was being implemented, sources say that black money hoarders apparently bought fake IDs which were made from stolen Aadhaar details to get the old notes exchanged – one way for doing this was perhaps by opening new bank accounts or to, say, utilise unused Jan Dhan accounts to deposit the money. Now, one can only imagine what terrorists can do with these details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far, perhaps, the only solace is that the biometric details of the beneficiaries weren’t leaked. But, in the backdrop of the lax attitude of the various government departments, even that too is just waiting to happen, fear experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham warns that Aadhaar was always a risky proposition as it was based on biometrics, which “made it very insecure”. He terms it as a “mass surveillance technology” – that too a poorly-designed technology – which, in fact, “undermines security”. Once biometric data are compromised, it cannot be secured again. Instead of biometrics, he suggests the UIDAI shift to using smart cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unfettered forcible linking of almost everything – from bank accounts to one’s PAN card – to Aadhaar only makes things worse. “The Centre is ‘seeding’ the various data bases with the Aadhaar number, which is a very bad move. And, involving various private and public agencies in this only makes the entire thing very precarious,” warns Abraham. He points out that, for instance, when the PAN cards are linked with the Aadhaar number, breach made possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, he says, the government should adopt the ‘tokenisation approach’, instead of the ‘seeding approach’. What this means is that, say, if the PAN card is to be linked to Aadhaar, then UIDAI issues a token number and not the original 12-digit Aadhaar number. So, even if a breach happens, the hacker will not be able to get all the Aadhaar details, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the government does not seem to be taking the issue of privacy very seriously. What perhaps is not being understood is that this is not just a privacy issue, but making the masses vulnerable to frauds. Instead of treading cautiously in implementing Aadhaar, the government seems to be in a hurry to extend it to almost every possible silo in an individual’s life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given the callous attitude of central and state governments, I hope that the Supreme Court will stop the government from a forced linking of Aadhaar, on the one hand, and bank accounts and PAN numbers on the other hand,” says Khera.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too'&gt;https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-27T16:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally">
    <title>Is Your Aadhar Biometrics Safe? Firms Accused Of Storing Biometrics And Using Them Illegally</title>
    <link>https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally</link>
    <description>
        &lt;b&gt;Fears of Aadhar biometric security have been compounded as the government is sprinting towards the next phase of ‘cashless India’ and digitization&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh Prakash and Sunil Abraham have been quoted in this article &lt;a class="external-link" href="http://www.outlookindia.com/website/story/is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-the/298048"&gt;published by Outlook&lt;/a&gt; on February 24, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The biggest fear regarding misuse of Aadhar biometrics and security loopholes are becoming real.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three firms are being probed for attempting unauthorised  authentication and impersonation by using stored Aadhaar biometrics,  reported &lt;i&gt;The Times of India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper reported that the Unique Identification Authority of India  (UIDAI) has lodged a criminal complaint with the cyber cell of Delhi  Police, saying it is a clear violation of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The firms are Axis Bank, Suvidhaa Infoserve and eMudhra. They have  been served a “notice for action“ under Aadhaar regulations”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The firms have been accused of storing biometrics and using them illegally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fears of biometric security have been compounded as the  government is sprinting towards the next phase of ‘cashless India’ and  digitization. They are preparing to launch Aadhaar Pay, an initiative  that will supersede the need to use credit cards, debit cards,  smartphones and PINs to make payments or transfer money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed system of payments will use a person’s biometric data  and fingerprints to make payments through Aadhaar-linked bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Outlook&lt;/i&gt;’s Senior Associate Editor Arindam Mukherjee had in a clairvoyant &lt;a href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449" target="_blank"&gt;article&lt;/a&gt; for the magazine raised the fears of biometrics being manipulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449" target="_blank"&gt;article&lt;/a&gt;, critics of Aadhaar and Aadhaar-based services raised the issue of privacy and security of biometric and personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director with the Centre for Internet and  Society (CIS), ­rec­ently tweeted, “As long as Aadhar-Enabled Payment  Services encourages biometric authorisation of transactions, it is bound  to be a security nightmare, with widespread fraud.” Would you tell a  shopkeeper your debit card’s PIN? No. Then why share your fingerprint? A  fingerprint, in this system, becomes a kind of unchangeable Aadhaar  Enabled Payment System PIN, he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out a possible danger, Usha Ramanathan, an independent law  resear­c­her who has been following Aadhaar since its inception, says,  “In many ­payments, biometric data is authenticated and then it remains  in the system where there are leakages. Intermediaries then have access  to the data, which is thus made insecure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the UIDAI, however, once biometric data is provided by  the consumer while making Aadhaar-based payments, it gets encrypted and a  merchant doesn’t get access to that data. The Aadhaar Act also  prohibits any storing of biometric data in local devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, there are many like CIS executive director Sunil Abraham who  believe it is a mistake to use biometrics for authentication,  especially when payments are concerned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our concern with Aadhaar Pay is about the biometric component of the  project,” says Abraham. “Biometrics is an identification technology.  Unfortunately, it is being presented as an authentication technology. It  is not a secure authentication technology as biometric data can be  stolen easily. It is also irrevocable; once bio­metric data is stolen,  it cannot be ­re-issued like a smart card.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there is the problem of availability of fingerprints. In the  case of many people from rural areas and the working class, fingerprints  get affected due to the manual nature of their work. This makes it  difficult for this target group of UIDAI to conduct transactions  properly through Aadhaar Pay. “In Rajasthan, 30 per cent of the  households are not even able to procure ration using fingerprints,” says  Ramanathan.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally'&gt;https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T01:56:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar">
    <title>Can the Judiciary Upturn the Lok Sabha Speaker’s Decision on Aadhaar?</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar</link>
    <description>
        &lt;b&gt;When ruling on the petition filed by Jairam Ramesh challenging passing the Aadhaar Act as a money Bill, the court has differing precedents to look at.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="https://thewire.in/110795/aadhaar-money-bill-judiciary/"&gt;published in the Wire&lt;/a&gt; on February 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="http://thewire.in/2016/04/24/the-aadhaar-act-is-not-a-money-bill-31297/" target="_blank" title="an earlier article"&gt;an earlier article&lt;/a&gt;, I had argued that the characterisation of the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwj0xo6U_KDSAhVHLo8KHcygCVEQFggvMAQ&amp;amp;url=https%3A%2F%2Fuidai.gov.in%2Fimages%2Fthe_aadhaar_act_2016.pdf&amp;amp;usg=AFQjCNHDmJKdO8jdfGZJKLKRJQpHdf1Frw&amp;amp;sig2=B_YbWncu6eyZHJ1MFTD0NA" rel="external nofollow" target="_blank" title="Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act"&gt;Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act&lt;/a&gt;,  as a money Bill by Sumitra Mahajan, speaker of the Lok Sabha, was  erroneous. Specifically, I had argued that upon perusal of Article 110  (1) of the constitution, the Aadhaar Act does not satisfy the conditions  required of a money Bill. For a legislation to be classified as a money  Bill, it must comprise of ‘only’ provisions dealing with the following  matters: (a) imposition, regulation and abolition of any tax, (b)  borrowing or other financial obligations of the government of India, (c)  custody, withdrawal from or payment into the Consolidated Fund of India  (CFI) or Contingent Fund of India, (d) appropriation of money out of  CFI, (e) expenditure charged on the CFI or (f) receipt or custody or  audit of money into CFI or public account of India; or (g) any matter  incidental to any of the matters specified in sub-clauses (a) to (f).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 110 is modelled on Section 1(2) of the UK’s Parliament Act, 1911, which also defines money Bills as those only dealing with certain enumerated matters. The use of the word ‘only’ was brought up by Ghanshyam Singh Gupta during the constituent assembly debates. He pointed out that the use of the word ‘only’ limits the scope money Bills to only those legislations which did not deal with other matters. His amendment to delete the word ‘only’ was rejected, clearly establishing the intent of the framers of the constitution to keep the ambit of money Bills extremely narrow. G.V. Mavalankar, the first speaker of Lok Sabha, had stated that the word ‘only’ must not be construed so as to give an overly restrictive meaning. For instance, a Bill which deals with taxation could have provisions which deal with the administration of the tax. The finance minister, Arun Jaitley, referred to these words by Mavalankar, justifying the classification of the Aadhaar Act as a money Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Aadhaar Bill does makes references to benefits, subsidies and services funded by the CFI, even a cursory reading of the Bill reveals its main objectives as creating a right to obtain a unique identification number and providing for a statutory apparatus to regulate the entire process. Any reasonable reading of the legislation would be hard pressed to view all provisions in the Aadhaar Act, aside from the one creating a charge on the CFI, as merely administrative provisions incidental to the creation such charge. The mere fact of establishing the Aadhaar number as the identification mechanism for benefits and subsidies funded by the CFI does not give it the character of a money Bill. The Bill merely speaks of facilitating access to unspecified subsidies and benefits rather than their creation and provision being the primary object of the legislation. Erskine May’s seminal textbook, Parliamentary Practice, is instructive in this respect and makes it clear that a legislation which simply makes a charge on the consolidated fund does not becomes a money Bill if otherwise its character is not that of one. Further, the subordinate regulations notified under the Aadhaar Act deal almost entirely with matters to do with enrolment, updation, authentication of the Aadhaar number and related matters such as data security regulations and sharing of information collected, rather than the provision of benefits or subsidies or disbursal of funds otherwise from the CFI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the context of the petition filed by former Union minister Jairam Ramesh challenging the passage of the law on Aadhaar as a money Bill, the more important question is whether the judiciary has a right to question the speaker’s decision in such a matter. If not, any other questions about whether the legislation is a money Bill will remain merely academic in nature.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Irregularity vs illegality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Article 110 (3) clearly states that with regard to the question whether a legislation is a money Bill or not, the decision of the speaker is final and binding. The question is whether such a clause completely excludes any judicial review. Further, Article 122 prohibits the courts from questioning the validity of any proceedings in parliament on the ground of any alleged irregularity of procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the arguments in the court, the attorney general questioned the locus standi of Ramesh. The petition has been made under Article 32 of the constitution and the government argued that no fundamental rights of Ramesh were violated. However, the court has asked Ramesh to make his submission and adjourned the hearing to July. The petition by Ramesh would hinge largely on the powers of the judiciary to question the decision of the speaker of the Lok Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The powers of privilege that parliamentarians enjoy are integral to the principle of separation of powers. The rationale behind parliamentary privilege is to prevent interference in the lawmakers’ powers to perform essential functions. The ability to speak and vote inside the legislature without the fear of punishment is certainly essential to the role of a lawmaker. However, the extent of this protection lies at the centre of this discussion. During the constituent assembly debates, H.V. Kamath and others had argued for a schedule to exhaustively codify the existing privileges. However, B.R. Ambedkar pointed to the difficulty of doing so and parliamentary privilege on the lines of the British parliamentary practice was retained in the constitution. In the last few decades, a judicial position has emerged that courts could exercise a limited degree of scrutiny over privileges, as they are primarily responsible for interpreting the constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the matter of &lt;a href="https://indiankanoon.org/doc/1757390/" rel="external nofollow" target="_blank" title="Raja Ram Pal vs The Hon’ble Speaker, Lok Sabha"&gt;&lt;i&gt;Raja Ram Pal vs The Hon’ble Speaker, Lok Sabh&lt;/i&gt;a&lt;/a&gt;,  it had been clarified that proceedings of the legislature were immune  from questioning by courts in the case of procedural irregularity but  not in the case of illegality. In this case, the Supreme Court while  dealing with Article 122 stated that it does not oust review by the  judiciary in cases of “gross illegality, irrationality, violation of  constitutional mandate, mala fides, non-compliance with rules of natural  justice and perversity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1968, the speaker of the Punjab legislative assembly adjourned the  proceedings for a period of two months following rowdy behaviour.  Subsequently, an ordinance preventing such a suspension was promulgated  and the legislature was summoned by the governor to consider some  expedient financial matters. The speaker disagreed with the decision and  after some confusion, the deputy speaker passed a few Bills as money  Bills. While looking into the question of what was protected from  judicial review, the &lt;a href="https://indiankanoon.org/doc/36589/" rel="external nofollow" target="_blank" title="court stated"&gt;court stated&lt;/a&gt; that the protection did not extend to breaches of mandatory provisions  of the constitution, only to directory provisions. By that logic, if  Article 110 (1) is seen as a mandatory provision, a breach of its  provisions could lead to an interpretation that the Supreme Court may  well question an erroneous decision by the speaker of the Lok Sabha to  certify a legislation as a money Bill. The use of the word “shall” in  Article 110 (1), the nature and design of the provision, its overriding  impact on the other constitutional provisions granting the Rajya Sabha  powers are ample evidence of its mandatory nature. Based on the above,  Anup Surendranath has &lt;a href="http://ccgdelhi.org/doc/%28CCG-NLU%29%20Aadhaar%20Money%20Bill.pdf" rel="external nofollow" target="_blank" title="argued"&gt;argued&lt;/a&gt; that  the passage of the Aadhaar Act as a money Bill when it does not satisfy  the constitutional conditions for it does amount to a gross illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judicial precedent in &lt;i&gt;&lt;a href="https://indiankanoon.org/doc/60568976/" rel="external nofollow" target="_blank" title="Mohd. Saeed Siddiqui vs State of Uttar Pradesh"&gt;Mohd. Saeed Siddiqui vs State of Uttar Pradesh&lt;/a&gt;&lt;/i&gt; where the matter of the court’s power to question the decision of a  speaker was considered, though, leans in the other direction. In 2012,  the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwiRtov_iKHSAhVLuo8KHYhsClcQFggbMAA&amp;amp;url=http%3A%2F%2Fwww.lawsofindia.org%2Fdownloadfile.php%3Flawid%3D7834%26file%3Duttar_pradesh%2F1981%2F1981UP7.pdf%26pageurl%3D%252Fsingle%252Falpha%252F7.html&amp;amp;usg=AFQjCNGRW8-NChXALunaUbjZRrlM4IvCkA&amp;amp;sig2=rg6YCMf7qRqNw08NnctuhQ" rel="external nofollow" target="_blank" title="Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act"&gt;Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act&lt;/a&gt;,  2012 was passed as money Bill by the Uttar Pradesh state legislature.  Subsequently, a writ petition was filed challenging its constitutional  validity. A three-judge bench of the Supreme Court looked into the  application of Article 212. It is the provision corresponding to Article  122, dealing with the power of the courts to inquire into the  proceedings of the state legislature. The court held that Article 212  makes “it clear that the finality of the decision of the Speaker and the  proceedings of the State Legislature being important privilege of the  State Legislature, viz., freedom of speech, debate and proceedings are  not to be inquired by the Courts.” Importantly, ‘proceedings of the  legislature’ were deemed to include within its scope everything done in  transacting parliamentary business, including the passage of the Bill.  While the court did acknowledge the limitations of parliamentary  privilege as established in the &lt;i&gt;Raja Ram Pal&lt;/i&gt; case, it did not adequately take into account the reasoning in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar Act is a legislation which makes it mandatory of all  residents to enrol for a biometric identification system in order to  avail certain subsidies, benefits and services. It has huge potential  risks for individual privacy and national security and has been the  subject of an extremely high profile Public Interest Litigation. Its  passage as a money Bill, without any oversight from the Rajya Sabha and  an opportunity for substantial debate and discussion, is a fraud on the  Constitution. Whether or not the court chooses to see it that way  remains to be seen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar'&gt;https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T15:44:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber">
    <title>Nasscom chief saying full data protection isn’t possible should wake us from our digital slumber</title>
    <link>https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber</link>
    <description>
        &lt;b&gt;Considering India is rapidly moving towards a digital economy, the hurdles not withstanding, data and identity security are topics which have to be taken very seriously. Since the demonetisation, a large part of the population who would never bother with digital transactions has suddenly come online. But there is no such thing as complete security of personal data, according to Nasscom chief R Chandrashekhar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber-367183.html"&gt;First Post&lt;/a&gt; on March 16, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Attending the World Consumer Rights Day, R Chandrashekhar  said that personal data of online consumers cannot be completely secure  and stressed on the need to have strict enforcement of consumer  protection laws. Speaking to &lt;i&gt;PTI,&lt;/i&gt; Chandrashekhar said, “More  than 3 million credit card data details were misused recently. Let us  face it, these kind of security breaches will take place. There is  nothing called fully perfect security in IT.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;It’s high time we call a spade, a spade&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;img alt="Image: PIB" class="wp-image-367245 size-full" height="360" src="http://tech.firstpost.com/wp-content/uploads/2017/03/RChandrasekhar_PIB380.jpg" width="640" /&gt;&lt;br /&gt;&lt;/b&gt;R Chandrashekhar, President Nasscom. Image: PIB&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Coming from the head of Nasscom, this announcement pertaining to security is very important. According to Chandrashekhar one cannot expect complete cyber security, but there are definitely ways in which such attacks and incidents can be minimised. He very rightly said that that protecting the online consumer data, specially looking at how rapidly e-commerce is growing in the country, is of prime importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One cannot help but agree with Chandrashekhar, specially considering the fact India &lt;a href="http://tech.firstpost.com/news-analysis/demonetisation-privacy-laws-need-to-be-in-place-before-giving-the-biggest-push-to-digital-transactions-348478.html"&gt;&lt;b&gt;does not have a privacy law ecosystem&lt;/b&gt;&lt;/a&gt; that is present in countries such as the US and the UK, where online consumer protection is taken very seriously. &lt;a href="http://tech.firstpost.com/news-analysis/facebook-asked-to-delete-whatsapp-user-data-in-germany-over-data-protection-law-infringement-337708.html"&gt;&lt;b&gt;Germany&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwjljYHpzNrSAhUkSI8KHa6oB_MQFgg2MAQ&amp;amp;url=http%3A%2F%2Ftech.firstpost.com%2Fnews-analysis%2Ffrance-fines-google-150000-euros-over-data-privacy-216266.html&amp;amp;usg=AFQjCNE15FPlAi9rR5yCXNzS_hnua81QAw&amp;amp;sig2=GVGgF_cxGNhXo-SJhLo4Gg&amp;amp;bvm=bv.149397726,d.c2I" rel="nofollow"&gt;&lt;b&gt;other EU nations&lt;/b&gt;&lt;/a&gt; have always been at the forefront, when it comes to protecting data  privacy, and it has ensured that consumer-facing technology companies do  not run roughshod when it comes to protecting user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar stated that there was no need for separate  regulations for e-commerce sites, but the priority was ensuring means to  enforce consumer laws in the digital world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lack of dedicated privacy laws&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to cyberlaw and cybersecurity expert, Pavan  Duggal, “Going forward, there is an urgent need for India to take a  strong view on privacy in terms of legislative frameworks.  Unfortunately, at the time of writing, &lt;a href="http://tech.firstpost.com/news-analysis/privacy-protection-need-for-proactive-cyber-legal-approaches-in-india-357248.html"&gt;&lt;b&gt;India does not have a dedicated law on privacy&lt;/b&gt;&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Image: Foamy Media" class="wp-image-353936 size-full" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/12/social-media.jpeg" width="640" /&gt;&lt;br /&gt;Image: Foamy Media&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media websites for instance have a lot of user data. But what happens when they suddenly change their privacy policies? For instance, a lot of users signed on to WhatsApp when it was an independent company. But post the Facebook acquisition, there have been a lot of instances where WhatsApp has updated its terms and conditions to suit its parent Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s not completely illegal one may say. Loss of privacy  is a price you pay for free services. But what if, I as a consumer of  WhatsApp &lt;a href="http://tech.firstpost.com/news-analysis/german-consumer-rights-group-accuses-whatsapp-of-illegally-sharing-user-data-with-facebook-359979.html"&gt;&lt;b&gt;do not want the app to share any of my data with Facebook&lt;/b&gt;&lt;/a&gt;?  The only option I am left with is to delete WhatsApp. But then again, I  do not know if my data is also deleted from WhatsApp servers or it has  already been shared. Social media apps, only let you know what updates  are being added. Consent is only required to update the app. You can  stall that, up to a point. But there will come a time when you will have  to update an app. Then by default you have given approval to all the  terms and conditions associated with the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two students had challenged WhatsApp’s revision to its  privacy policy before Delhi High Court. The Court dismissed the petition  insisting that users could opt out by &lt;a href="http://www.thehindu.com/news/cities/Delhi/delete-or-share-high-court-tells-whatsapp-users/article9143285.ece" rel="nofollow"&gt;&lt;b&gt;deleting their accounts&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a similar challenge was mounted before the authorities  in UK, Facebook had to put a pause on their data sharing – and this was  because of its strong data protection policy. Under the UK data  protection law, the company has to inform the authority established  under the Act of any changes in the use of user data. In the case of  WhatsApp, the &lt;a href="http://tech.firstpost.com/news-analysis/why-india-failed-to-prevent-whatsapp-data-sharing-with-facebook-while-uk-succeeded-346115.html"&gt;&lt;b&gt;UK authority objected to such sharing.&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar – the 12-digit biometric storehouse&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2016/03/aadhar_251002219381.jpg"&gt;&lt;img alt="aadhaar_251002219381" class="wp-image-303751 size-full aligncenter" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/03/aadhar_251002219381.jpg" width="640" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar card is being used for many financial and non  financial transactions. Also the Aadhaar number associated with an  individual also holds a lot of personal and biometric data. So when  recently, there was news about a possible Aadhaar data breach when &lt;a href="http://tech.firstpost.com/news-analysis/aadhaar-data-breach-uidai-finds-multiple-transactions-done-with-the-same-fingerprint-364155.html"&gt;&lt;b&gt;UIDAI filed a police complaint&lt;/b&gt;&lt;/a&gt; against Axis Bank, business correspondent Suvidhaa Infoserve and e-sign provider eMudhra, it was naturally a shock to many.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike a password which can be changed, with biometric  information there is no scope to do that if it is compromised. Although  UIDAI claims that there are &lt;a href="http://tech.firstpost.com/news-analysis/aadhaar-is-being-used-by-few-corporates-for-salary-disbursements-but-the-potential-is-immense-361749.html"&gt;&lt;b&gt;multiple levels of security and firewalls&lt;/b&gt;&lt;/a&gt; to ensure there is no breach of Aadhaar information of an individual,  one can only hope that it is robust enough to withstand any attack.  Collection of biometric data by the government to form a database, for  instance, was debated and ultimately not used in the UK.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director of the Centre for Internet  and Society, expressed concern about the pace at which we are  progressing when it comes to having a legal and regulatory framework  when it comes to the Digital India push. “While the security  architecture of Aadhaar Enabled Payment Systems (AEPS) might in itself  be good, the idea of providing your fingerprints to merchants for  financial transactions is a terrible idea since that is like asking you  to give your bank password to a merchant, and the merchant can reuse  that password, and you can’t ever change the password,” said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Enforcing the correct processes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, a malware affected the systems of Hitachi Payment  Services, which provides back end services to ATM machines and Point of  Sale nodes across India. As a result of this, around &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/32-lakh-debit-cards-compromised-affected-banks-include-sbi-hdfc-yes-axis-bob-and-icici-342220.html" target="_blank"&gt;32 lakh debit cards were compromised&lt;/a&gt;&lt;/b&gt; including those issued by SBI, HDFC, Yes Bank, Axis, BOB and ICICI. Security experts and consultants have pointed out &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/banks-need-to-switch-to-fully-encrypted-security-solutions-to-avoid-security-breaches-343696.html" target="_blank"&gt;various holes in the electronic transaction systems&lt;/a&gt;&lt;/b&gt; in place in India. Intel has also warned that &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/demonetisation-security-experts-warn-that-atms-are-easy-targets-for-hackers-351182.html" target="_blank"&gt;ATM machines in India&lt;/a&gt;&lt;/b&gt; are vulnerable to malicious attacks. Intel points out that countries in  the Asia Pacific region are developing and are particularly vulnerable  because of old systems and machines being used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2016/12/atm-queue-demonetisation.jpg"&gt;&lt;img alt="Image: REUTERS/Amit Dave " class="wp-image-353328" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/12/atm-queue-demonetisation.jpg" width="640" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div class="prodtxtinf" style="text-align: justify; "&gt;Image: REUTERS/Amit Dave&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;According to Mahesh Patel, president and group CTO, AGS  Transact Technologies this was more of a governance issue of the data  centre than any technical error. “It is not about the software, but it  is about the processes and procedures you put in place to ensure that  the system is secure. Everything from physical security to computing  security to admin management, etc should be process driven. So somewhere  there could have been a weak link there. Cloud has to be secure and  encrypted which suffices the use case of payments. This cloud is  different from the ones used by e-commerce sites to display all their  products,” said Patel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We may have the best of software and security measures, but  ensuring that they are implemented the right way is equally important.  Plugging the loopholes in current regulations is also important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Existing laws and regulations, not enough&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Duggal, “The Information Technology Act, 2000  hardly has effective provisions to protect any data and personal privacy  in the digital ecosystem. The Indian Government needs to come up with  strong privacy law which can protect both personal privacy and data  privacy in an effective manner.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One may find it really shocking to hear the head of Nasscom  saying something to the extent that full data protection for online  consumers is not possible, but there is definitely truth to the matter.  It will require concerted efforts from not only regulators, governments,  digital wallet players and banking industry to come up with these  privacy laws, but also you the consumer has to ensure that you are aware  of the dangers lurking in the digital world. Educating oneself of the  various ways in which your data can be compromised is a good way to  protect your online self.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because, let’s face it, for all practical purposes if you are online, your &lt;a href="http://tech.firstpost.com/news-analysis/privacy-is-dead-stop-whining-and-get-some-real-work-done-357090.html"&gt;&lt;b&gt;privacy is dead&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="tags"&gt; &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber'&gt;https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-17T01:47:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar">
    <title>Why We Should All Worry About The Mandatory Imposition Of Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar</link>
    <description>
        &lt;b&gt;It appears that with each passing day, the government is linking an increasing number of benefits and government services to the 12-digit biometric-based Aadhaar number for Indians, despite growing concerns around its data privacy and security.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rimin Dutt and Ivan Mehta was published by &lt;a class="external-link" href="http://www.huffingtonpost.in/2017/03/24/why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaa_a_22009826/"&gt;Huffington Post&lt;/a&gt; on March 24, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar, which collects among other information, citizens' iris scans and fingerprints and stores them into a centralised database for a prolonged time with only loose guidelines and no pre-existing laws to ensure the privacy of that data, is now linked to no less than 38 government schemes, including the government's latest directive –- that Aadhaar become mandatory for tax filing and securing PAN numbers -- introduced by Finance Minister Arun Jaitley earlier this week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jaitley openly admitted on Wednesday in the Parliament that the government, in effect, would be forcing people to get Aadhaar in an effort to increase tax compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar's use, by no means, is restricted to government agencies alone. A  growing number of private financial institutions are now fulfilling  their "Know Your Customer" or e-KYC formalities by making Aadhaar  compulsory. The government is also in the &lt;a href="http://economictimes.indiatimes.com/news/economy/policy/aadhaar-based-kyc-likely-across-financial-sector/articleshow/57800209.cms" target="_blank"&gt;process&lt;/a&gt; of making Aadhaar the basis of all financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the timing of the government's aggressive push of Aadhaar, in itself, is raising eyebrows among &lt;a href="https://scroll.in/article/832503/what-explains-the-desperation-to-make-aadhaar-mandatory-for-tax-returns-after-july-1-2017" target="_blank"&gt;political observers&lt;/a&gt;, there are some serious concerns about this unique experiment that deserve stronger scrutiny.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why disregard the Supreme Court?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In making Aadhaar mandatory for filing taxes and securing core  taxpayer identity, the government has openly gone against a Supreme  Court order from last year that explicitly stated that the Aadhaar Card  scheme is "purely voluntary" and cannot be made mandatory until the  court has decided on this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has defended its move, saying it is allowed to do so  under the Aadhaar (Targeted Delivery of Financial and Other Subsidies,  Benefits and Services) Act 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, as Gopal Krishna, a member of the Citizens Forum for Civil Liberties, &lt;a target="_blank"&gt;writes&lt;/a&gt; in Business Today, the passage of the Act by the Parliament "does not  automatically imply that any agency can make UID/Aadhaar compulsory  disregarding the Supreme Court's orders."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Krishna, in doing so, the government is "clearly  stepping beyond" the mandate of the Aadhaar Act, and also acting in  contempt of the Parliament, according to him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, if tax evasion was the driving factor behind the move,  it begs the question — wouldn't forcing people to get Aadhaar actually  do the opposite by adding another layer of hassle?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, tax experts have noted how this requirement may hinder tax  collection. Archit Gupta, Founder &amp;amp; CEO ClearTax.com, a tax service  provider &lt;a href="http://www.huffingtonpost.in/2017/03/22/budget-part-ii-here-are-the-highlights-of-the-sweeping-changes_a_21905740/" target="_blank"&gt;told &lt;/a&gt;&lt;i&gt;HuffPost India, "&lt;/i&gt;The  [Aadhaar] announcement is likely to be a dampener to tax filers,  specially first-timers ... FY 2016-17 filing is expected to see a large  number of first-time filers due to demonetisation efforts, and this move  may make them more guarded."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why not strengthen PAN?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government already has an extensive mandate for the Permanent  Account Number (PAN) cards, which are required to validate several  important services or for undertaking transactions such as buying and  selling property or jewellery worth over ₹2 lakhs. Last year, the  government, in fact, said that the National Pension System (NPS) scheme  would accept PAN cards over Aadhaar cards to validate new customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, however, Jaitley said PAN cards have been misused by  certain people to evade taxes, and there are reports that Aadhaar may  become the ultimate authenticating document. However, the continued and  growing use of PAN along with Aadhaar adds an extra layer of formalities  for citizens to access government services, which are their  constitutionally guaranteed rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How safe is Aadhaar anyway?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Depending on who you talk to, the safety concerns of Aadhaar come up  as a pressing issue, especially in the wake of a recent security  incident when the Unique Identification Authority of India initiated  police action against entities associated with Axis Bank including  Suvidhaa Infoserve and e-sign provider eMudhra, which had allegedly &lt;a href="http://www.livemint.com/Industry/IKgrYL5pg3eTgfaP253XKI/Aadhaar-data-breach-triggers-privacy-concerns.html" target="_blank"&gt;engaged &lt;/a&gt;in unauthorised authentication and impersonation by illegally storing Aadhaar biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, in a separate incident, security researcher  Srinivas Kodali warned Indian authorities of a website that was leaking  Aadhaar demographic data of over five lakh minors, as well as the  existence several parallel databases that had key identification data  linked to Aadhaar, &lt;i&gt;Scroll &lt;/i&gt;&lt;a href="https://scroll.in/article/830589/under-the-right-to-information-law-aadhaar-data-breaches-will-remain-a-state-secret" target="_blank"&gt;reported.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of any privacy laws in India, these security concerns have assumed even greater significance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI, the authority behind Aadhaar, has &lt;a href="https://uidai.gov.in/images/news/Press_Statement_06032017.pdf" target="_blank"&gt;maintained &lt;/a&gt;the  technology behind Aadhaar is robust and that it uses advanced  encryption to transmit and store data. It specifically denied that any  breach of centralised data took place in the Axis Bank incident, saying  the case was an isolated incident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in a rather ironic twist in the Aadhaar Act, which itself  contains no provisions to address privacy concerns, any legal action  against any misuse or theft of Aadhaar data can only be initiated by  UIDAI, leaving citizens with no legal recourse should a breach occur.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That represents an obvious conflict of interest as it gives exclusive  power to the very authority that is responsible for the security and  confidentiality of identity information and authentication records, PRS  Legislative Research, has noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the controversial Aadhaar Act contains several other  inherent dangers such as the potential to profile citizens based on the  linking of other databases with Aadhaar by studying patterns of  behaviour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Techniques such as running computer programmes across datasets for  pattern recognition can be used for various purposes such as detecting  potential illegal activities...However, these can also lead to  harassment of innocent individuals who get identified incorrectly as  potential threats," noted PRS Legislative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are currently no safeguards to prevent inappropriate profiling,  instances of which could increase as more and more private  organisations link their data to Aadhaar, and potentially exploit data  for&lt;a href="https://scroll.in/article/824874/what-happens-to-privacy-when-companies-have-your-aadhaar-number" target="_blank"&gt; commercial purposes&lt;/a&gt; without the consent of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US, in comparison, has laws in place that require agencies that  collects data to submit an annual report to US Congress on all such data  mining activities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Other unresolved concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are several other concerns related to the widespread use of  Aadhaar card and the power it is afforded under the Aadhar act. The act  allows UIDAI to collect biometric information beyond iris and  fingerprint scans, for example, to include other bio-data such as DNA,  noted PRS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The act also allows private agencies to use Aadhaar, which  contradicts an earlier stated objective of the scheme that sought to  restrict the use of Aadhaar for only government expenditures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It allows private persons to use Aadhaar as a proof of identity for  any purpose. This provision will enable private entities such as,  airline, telecom, insurance, real estate etc. companies, to require  Aadhaar as a proof of identity for availing their services," PRS has  noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There's also the worrying prospect of Aadhaar being used as a  surveillance tool by the government, instead of an e-governance  technology, Sunil Abraham, executive director of research organisation,  Centre for Internet and Society, &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece" target="_blank"&gt;told &lt;/a&gt;the &lt;i&gt;The Hindu Business Line, &lt;/i&gt;adding&lt;i&gt; &lt;/i&gt;biometrics only make citizens transparent to the state and not the state transparent to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We warned the government six years ago, but they ignored us," said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Krishna has a more dire &lt;a href="http://www.businesstoday.in/current/economy-politics/will-aadhaar-cause-death-of-civil-rights/story/248331.html" target="_blank"&gt;warning:&lt;/a&gt; "The JAM Trinity -- Jan Dhan Yojana, Aadhaar and mobile numbers -- may  well be a fish bait to trap unsuspecting citizens into the world's  biggest transnational biometric database to turn them into subjects  under surveillance forever in the name of a set of welfare and  anti-poverty policies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What has been done to address the security concerns?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is unclear what the government or UIDAI may have done in the wake  of the security incident to upgrade its systems. According to an expert &lt;i&gt;HuffPost Post India &lt;/i&gt;talked to, many third party apps that are using Aadhar data may not be screened or audited for security, which is a huge worry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kodali told HuffPost India that Aadhaar has potential design issues when it comes to information security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"By design it allows anyone store information of the Aadhaar holder  through [application programming interface]. This is creating many  parallel databases with Aadhaar as a key," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He notes that security is an afterthought for many institutions and companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"UIDAI and the architects of Aadhaar do not accept that data can be a  liability instead of an asset," he said. "The mandatory nature of  Aadhaar without the right infrastructure and skilled workforce is not  just a cyber security issue, but a national security issue."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;When will India get privacy laws?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No one quite knows. But there's a growing call for a need for strict  privacy laws, given the move towards digital financial transactions and  growing e-commerce use. Most advanced economies including the US, the  UK, France, Australia and New Zealand have &lt;a href="http://www.pcquest.com/no-your-aadhaar-data-is-not-secure/" target="_blank"&gt;enacted privacy laws.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in India, the right to privacy still doesn't exist despite  it being recognised by even the UN charter of human rights. Article 12  of the Universal Declaration of Human Rights states, "No one shall be  subjected to arbitrary interference with his privacy, family, home or  correspondence, nor to attacks upon his honour and reputation. Everyone  has the right to the protection of the law against such interference or  attacks."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential for cyber criminals to misuse citizen data isn't lost on even prominent IT industry experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, the chief of IT industry body Nasscom R Chandrashekhar &lt;a href="http://tech.firstpost.com/news-analysis/nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber-367183.html" target="_blank"&gt;told&lt;/a&gt; &lt;i&gt;PTI &lt;/i&gt;that  personal data of online consumers can never be fully secure,  emphasising the need for strict consumer protection laws. "More than 3  million credit card data details were misused recently. Let us face it,  these kind of security breaches will take place. There is nothing called  fully perfect security in IT," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, Aadhaar has been lauded by several prominent experts and  economists, and it is, undoubtedly, an ambitious project to potentially  aid financial inclusion for a large population that has historically  been outside of a formal financial services net. India also has one of  the lowest tax compliance rates, making tax collection a priority for  the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, Paul Romer, World Bank's chief economist &lt;a href="https://qz.com/933907/paul-romer-on-aadhaar-world-banks-top-economist-says-indias-controversial-id-program-should-be-a-model-for-other-nations/" target="_blank"&gt;told &lt;/a&gt;&lt;i&gt;Bloomberg, "&lt;/i&gt;The  system in India is the most sophisticated that I've seen ... It's the  basis for all kinds of connections that involve things like financial  transactions. It could be good for the world if this became widely  adopted."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But given the sensitivity of citizen biometrics data and potential  for misuse, the government ought to be held accountable for its proper  use and ensure enough safeguards are put in place before its imposition  on each citizen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar'&gt;https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-27T15:02:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it">
    <title>How Aadhaar compromises privacy? And how to fix it?</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it</link>
    <description>
        &lt;b&gt;Aadhaar is mass surveillance technology. Unlike targeted surveillance which is a good thing, and essential for national security and public order – mass surveillance undermines security. And while biometrics is appropriate for targeted surveillance by the state – it is wholly inappropriate for everyday transactions between the state and law abiding citizens. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was published in the &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/is-aadhaar-a-breach-of-privacy/article17745615.ece"&gt;Hindu&lt;/a&gt; on March 31, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When assessing a technology, don't ask - “what use is it being put to today?”. Instead, ask “what use can it be put to tomorrow and by whom?”. The original noble intentions of the Aadhaar project will not constrain those in the future that want to take full advantage of its technological possibilities.  However, rather than frame the surveillance potential of Aadhaar in a negative tone as three problem statements - I will propose three modifications to the project that will reduce but not eliminate its surveillance potential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Shift from biometrics to smart cards:&lt;/b&gt;&lt;span&gt; In January 2011, the Centre for Internet and Society had written to the parliamentary finance committee that was reviewing what was then called the “National Identification Authority of India Bill 2010”. We provided nine reasons for the government to stop using biometrics and instead use an open smart card standard. Biometrics allows for identification of citizens even when they don't want to be identified. Even unconscious and dead citizens can be identified using biometrics. Smart cards, on the other hand, require pins and thus citizens' conscious cooperation during the identification process. Once you flush your smart cards down the toilet nobody can use them to identify you. Consent is baked into the design of the technology. If the UIDAI adopts smart cards, we can destroy the centralized database of biometrics just like the UK government did in 2010 under Theresa May's tenure as Home Secretary. This would completely eliminate the risk of foreign governments, criminals and terrorists using the biometric database to remotely, covertly and non-consensually identify Indians.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Destroy the authentication transaction database:&lt;/b&gt;&lt;span&gt; The Aadhaar Authentication Regulations 2016 specifies that transaction data will be archived for five years after the date of the transaction. Even though the UIDAI claims that this is a zero knowledge database from the perspective of “reasons for authentication”, any big data expert will tell you that it is trivial to guess what is going on using the unique identifiers for the registered devices and time stamps that are used for authentication.  That is how they put Rajat Gupta and Raj Rajratnam in prison. There was nothing in the payload ie. voice recordings of the tapped telephone conversations – the conviction was based on meta-data. Smart cards based on open standards allow for decentralized authentication by multiple entities and therefore eliminate the need for a centralized transaction database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prohibit the use of Aadhaar number in other databases:&lt;/b&gt;&lt;span&gt; We must, as a nation, get over our obsession with Know Your Customer [KYC] requirements. For example, for SIM cards there is no KYC requirement is most developed countries. Our insistence on KYC has only resulted in retardation of Internet adoption, a black market for ID documents and unnecessary wastage of resources by telecom companies. It has not prevented criminals and terrorists from using phones. Where we must absolutely have KYC for the purposes of security, elimination of ghosts and regulatory compliance – we must use a token issued by UIDAI instead of the Aadhaar number itself. This would make it harder for unauthorized parties to combine databases while at the same time, enabling law enforcement agencies to combine databases using the appropriate authorizations and infrastructure like NATGRID. The NATGRID, unlike Aadhaar, is not a centralized database. It is a standard and platform for the express assembly of sub-sets of up to 20 databases which is then accessed by up to 12 law enforcement and intelligence agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To conclude, even as a surveillance project – Aadhaar is very poorly designed. The technology needs fixing today, the law can wait for tomorrow.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it'&gt;https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-01T07:00:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations">
    <title>Analysis of Key Provisions of the Aadhaar Act Regulations </title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations</link>
    <description>
        &lt;b&gt;In exercise of their powers under of the powers conferred by Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Act, 2016, (Aadhaar Act) the UIDAI has come out with a set of five regulations in late 2016 last year. In this policy brief, we look at the five regulations, their key provisions and highlight point out the unresolved, issues, unaddressed, and created issues as result of these   regulations. &lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This blog post was edited by Elonnai Hickok&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset it is important to note that a concerning feature of these regulations is that they intend to govern the processes of a body which has been in existence for over six years, and has engaged in all the activities sought to be governed by these policies at a massive scale, considering the claims of over one billion Aadhaar number holders. However, the regulation do not acknowledge, let alone address past processes, practices, enrollments, authentications, use of technology etc.  this fact, and there are no provisions that effectively address  the past operations of the UIDAI. Below is an analysis of the five regulations issued thus far by the UIDAI.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unique Identification Authority of India (Transactions of Business at Meetings of the Authority) Regulations&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations framed under clause (h) of sub-section (2) of section 54 read with sub-section (1) of section 19 of the Aadhaar Act, deal with the meetings of the UIDAI, the process following up to each meeting, and the manner in which all meetings are to be conducted.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 3.&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Meetings of the Authority– (1) There shall be no less than three meetings of the Authority in a financial year on such dates and at such places as the Chairperson may direct and the interval between any two meetings shall not in any case, be longer than five months&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The number of times that UIDAI would meet in a year is far too less, taking in account the significance of the responsibilities of UIDAI as the sole body for policy making for all issues related to Aadhaar. In contrast, the Telecom Regulatory Authority of India is required to meet at least once a month. Other bodies such as SEBI and IRDAI are also required to meet at least four times&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and six times&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in a year respectively.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 8 (5)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Decisions taken at every meeting of the Authority shall be published on the website of Authority unless the Chairperson determines otherwise on grounds of ensuring confidentiality.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The Chairperson has the power to determine withholding publication of the decisions of the meeting on the broad grounds of ‘confidentiality’. Given the fact that the decisions taken by UIDAI as a public body can have very real implications for the rights of residents, the ground of confidentiality is not sufficient to warrant withholding publication. It is curious that instead of referring to the clearly defined exceptions laid down in other similar provisions such as the exceptions in Section 8 of the Right to Information Act, 2005, the rules merely refer to vague and undefined criteria of ‘confidentiality’.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 14 (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Members of the Authority and invitees shall sign an initial Declaration at the first meeting of the Authority for maintaining the confidentiality of the business transacted at meetings of the Authority in Schedule II.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The above provision, combined with the fact that there is no provision regarding publication of the minutes of the meetings of UIDAI raise serious questions about the transparency of  its functioning.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unique Identification Authority of India (Enrolment and Update) Regulations&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations, framed under  sub-section (1), and sub-clauses (a), (b), (d,) (e), (j), (k), (l), (n), (r), (s), and (v) of sub-section (2), of Section 54 of the Aadhaar Act deals with the enrolment process, the generation of an Aadhaar number, updation of information and governs the conduct of enrolment agencies and associated third parties.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provisions:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 8 (2), (3) and (4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standard enrolment/update software shall have the security features as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All equipment used in enrolment, such as computers, printers, biometric devices and other accessories shall be as per the specifications issued by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biometric devices used for enrolment shall meet the specifications, and shall be certified as per the procedure, as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 3 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standards for collecting the biometric information shall be as specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 4 (5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standards of the above demographic information shall be as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 6 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For residents who are unable to provide any biometric information contemplated by these regulations, the Authority shall provide for handling of such exceptions in the enrolment and update software, and such enrolment shall be carried out as per the procedure as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 14 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of rejection due to duplicate enrolment, resident may be informed about the enrolment against which his Aadhaar number has been generated in the manner as may be specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Though in February 2017,  the UIDAI published technical specifications for registered devices&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the regulations  leave unaddressed issues such as lack of appropriately defined security safeguards in the Aadhaar. There is a general trend of continued deferrals in the regulations by stating that matters would be specified later on important aspects such as rejection of applications, uploading of the enrolment packet to the CIDR, the procedure for enrolling residents with biometric exceptions, the procedure for informing residents about acceptance/rejection of enrolment application, specifying the convenience fee for updation of residents’ information, the procedure for authenticating individuals across services etc.c. There is a clear failure to exercise the mandate delegated to UIDAI, leaving key matters to determined at a future unspecified date. The delay and ambiguity around when regulations will be defined is  all the more problematic  in light of the fact that the project has been implemented since 2010 and the Aadhaar number is now mandatory for availing a number of services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further it is important to note that a number of policies put out by the UIDAI predate these regulations, on which the regulations are  completely silent, thus neither endorsing previous policies  nor suggesting that they may be revisited. Further, the regulations choose to not engage with the question of operation of the Aadhaar project, enrolment and storage of data etc prior to the notification of these regulations, or the policies which these regulations may regularise. For instance, the regulations do not specify any measures to deal with issues arising out of enrolment devices used prior to the development of the February 2017 specifications.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 32&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The Authority shall set up a contact centre to act as a central point of contact for resolution of queries and grievances of residents, accessible to residents through toll free number(s) and/ or e-mail, as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The contact centre shall:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provide a mechanism to log queries or grievances and provide residents with a unique reference number for further tracking till closure of the matter;&lt;/li&gt;
&lt;li&gt;Provide regional language support to the extent possible;&lt;/li&gt;
&lt;li&gt;Ensure safety of any information received from residents in relation to their identity information;&lt;/li&gt;
&lt;li&gt;Comply with the procedures and processes as may be specified by the Authority for this purpose.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;(3) Residents may also raise grievances by visiting the regional offices of the Authority or through any other officers or channels as may be specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;While the setting up of a grievance redressal mechanism under the regulations is a welcome move, there is little clarity about the procedure to be followed, nor is a timeline for it specified. The chapter on grievance redressal is in fact one of the shortest chapters in the regulations. The only provision in this chapter deals with the setting up of a contact centre, a curious choice of term for what is supposed to be the primary quasi judicial grievance redressal body for the Aadhaar project. In line with the indifferent and insouciant terminology of ‘contact centre’, the chapter is restricted to the matters of the logging of queries and grievances by the contact centre, and does not address the matter of procedure or timelines, and even the substantive provisions about the nature of redress available. Furthermore, the obligation on the contact centre to protect information received is limited to ‘ensuring safety’ an ambiguous standard that does not speak to any other standards in Indian law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar (Authentication) Regulations, 2016&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations, framed under  sub-section (1), and sub-clauses (f) and (w) of sub-section (2) of Section 54 of the Aadhaar Act deals with the authentication framework for Aadhaar numbers, the governance of authentication agencies and the procedure for collection, storage of authentication data and records.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provisions:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 5 (1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the time of authentication, a requesting entity shall inform the Aadhaar number holder of the following details:—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the nature of information that will be shared by the Authority upon authentication;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the uses to which the information received during authentication may be put; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) alternatives to submission of identity information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 6 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A requesting entity shall obtain the consent referred to in sub-regulation (1) above in physical or preferably in electronic form and maintain logs or records of the consent obtained in the manner and form as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Sub-regulation 5 mentions that at the time of authentication, requesting entities shall inform the Aadhaar number holder of alternatives to submission of identity information for the purpose of authentication. Similarly, sub-regulation 6 mentions that requesting entity shall obtain the consent of the Aadhaar number holder for the authentication. However, in neither of the above circumstances do the regulations specify the clearly defined options that must be made available to the Aadhaar number holder in case they do not wish submit identity information, nor do the regulations specify the procedure to be followed in case the Aadhaar number holder does not provide consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most significantly, this provision does little by way of allaying the fears raised by the language in Section 8 (4) of the Aadhaar Act which states that UIDAI “shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information.” This section gives a very wide discretion to UIDAI to share personal identity information with third parties, and the regulations do not temper or qualify this power in any way.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Sub-Regulation 11 (1) and (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The Authority may enable an Aadhaar number holder to permanently lock his biometrics and temporarily unlock it when needed for biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Authority may make provisions for Aadhaar number holders to remove such permanent locks at any point in a secure manner.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;A welcome provision in the regulation is that of biometric locking which allows Aadhaar number holders to permanently lock his biometrics and temporarily unlock it only when needed for biometric authentication. However, in the same breath, the regulation also provides for the UIDAI to make provisions to remove such locking without any specified grounds for doing so.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 18 (2), (3) and (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The logs of authentication transactions shall be maintained by the requesting entity for a period of 2 (two) years, during which period an Aadhaar number holder shall have the right to access such logs, in accordance with the procedure as may be specified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Upon expiry of the period specified in sub-regulation (2), the logs shall be archived for a period of five years or the number of years as required by the laws or regulations governing the entity, whichever is later, and upon expiry of the said period, the logs shall be deleted except those records required to be retained by a court or required to be retained for any pending disputes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requesting entity shall not share the authentication logs with any person other than the concerned Aadhaar number holder upon his request or for grievance redressal and resolution of disputes or with the Authority for audit purposes. The authentication logs shall not be used for any purpose other than stated in this sub-regulation.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;While it is specified that the authentication logs collected by the requesting entities shall not be shared with any person other than the concerned Aadhaar number holder upon their request or for grievance redressal and resolution of disputes or with the Authority for audit purposes, and that the authentication logs may not be used for any other purpose, the maintenance of the logs for a period of seven years seems excessive. Similarly, the UIDAI is also supposed to store Authentication transaction data for over five years. This is in violation of the widely recognized data minimisation principles which seeks that data collectors and data processors delete personal data records when the purpose for which it has been collected if fulfilled. While retention of data for audit and dispute-resolution purpose is legitimate, the lack of specification of security standards and the overall lack of transparency and inadequate grievance redressal mechanism greatly exacerbate the risks associated with data retention.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar (Sharing of Information) Regulations, 2016 and Aadhaar (Data security) Regulations, 2016&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Framed under the powers conferred by sub-section (1), and sub-clause (o) of sub-section (2), of Section 54 read with sub-clause (k) of sub-section (2) of Section 23, and sub-sections&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) and (4) of Section 29, of the Aadhaar Act, the Sharing of Information regulations look at the restrictions on sharing of identity information collected by the UIDAI and requesting entities. The Data Security regulation, framed under powers conferred by clause (p) of subsection (2) of section 54 of the Aadhaar Act, looks at security obligations of all service providers engaged by the UIDAI.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 6 (1)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;All agencies, consultants, advisors and other service providers engaged by the Authority, and ecosystem partners such as registrars, requesting entities, Authentication User Agencies and Authentication Service Agencies shall get their operations audited by an information systems auditor certified by a recognised body under the Information Technology Act, 2000 and furnish certified audit reports to the Authority, upon request or at time periods specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The regulation states that audits shall be conducted by an information systems auditor certified by a recognised body under the Information Technology Act, 2000. However, there is no such certifying body under the Information Technology Act. This suggests a lack of diligence in framing the rules, and will inevitably to lead to inordinate delays, or alternately, a lack of a clear procedure in the appointment of  an auditor. Further, instead of prescribing a regular and proactive process of audits, the regulation only limits audits to when requested or as deemed appropriate by UIDAI. This is another, in line of many provisions, whose implication is power being concentrated in the hands of  UIDAI, with little scope for accountability and transparency.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In conclusion, it must be stated that the regulations promulgated by the UIDAI leave a lot to be desired. Some of the most important issues raised against the Aadhaar Act, which were delegated to the UIDAI’s rule making powers have not been addressed at all. Some of the most important issues such as data security policies, right to access records of Aadhaar number holders, procedure to be followed by the grievance redressal bodies, uploading of the enrolment packet to the CIDR, procedure for enrolling residents with biometric exceptions, procedure for informing residents about acceptance/rejection of enrolment application have left unaddressed and ‘may be specified’ at a later data. These failures leave a gaping hole especially in light of the absence of a comprehensive data protection legislation in India, as well the speed and haste with the enrolment and seeding has been done by the UIDAI, and the number of services, both private and public, which are using or planning to use the Aadhaar number and the authentication process as a primary identifier for residents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.irda.gov.in/ADMINCMS/cms/frmGeneral_Layout.aspx?page=PageNo62&amp;amp;flag=1"&gt;https://www.irda.gov.in/ADMINCMS/cms/frmGeneral_Layout.aspx?page=PageNo62&amp;amp;flag=1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.sebi.gov.in/acts/boardregu.html"&gt;http://www.sebi.gov.in/acts/boardregu.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at:  https://uidai.gov.in/images/resource/aadhaar_registered_devices_2_0_09112016.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations'&gt;https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-04-03T14:05:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things">
    <title>The Aadhaar of all things</title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things</link>
    <description>
        &lt;b&gt;From a severely critical stand against Aadhaar in 2014, the Modi-led BJP in power has made a sharp U-turn to bulldoze its way into having every Indian scanned, tagged and labelled. A timeline of the country’s chequered date with the unique identification project.&lt;/b&gt;
        &lt;p&gt;The article by Shriya Mohan was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/blink/cover/the-aadhaar-of-all-things/article9609603.ece"&gt;Hindu Businessline &lt;/a&gt;on March 31, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;You’ve probably read the WhatsApp joke about a post-Aadhaar scenario in  2020 India. A man orders pizza over phone. He is asked for his Aadhaar  number first. He then orders a family-size seafood pizza, only to be  reminded by the attendant about his high blood pressure and cholesterol  levels (thanks to his Aadhaar history visible to everybody “on the  system”) and is advised to order the low-fat Hokkien Mee pizza instead,  based on his recent search history on Hokkien cuisine. As if this isn’t  creepy enough, the pizza guy refuses a card payment, citing the man’s  maxed-out credit cards, advises against ATM withdrawal owing to his  massive overdraft and even decides to hold off the free cola offer given  his dire health situation. When the man turns livid, he is told to mind  his language, given that in 2007 he was already imprisoned for verbally  abusing a policeman!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;2020 is two and a half years away, and the WhatsApp scenario appears less incredulous by the day.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;By the government’s latest estimate, 112,01,12,468 Aadhaar cards have  been issued since January 2009, when the Unique Identification Authority  of India (UIDAI) was set up under the Planning Commission. So if you  are an adult Indian resident without an Aadhaar card, you are in a two  per cent minority (98 per cent adults are covered).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Last week, Finance Minister Arun Jaitley said the 12-digit number would  be the single monolith identity for all Indians in the coming years,  replacing every other identity card. The government is serious because  each week a new scheme is added to the three dozen schemes in which  Aadhaar has been made mandatory. All the 84 schemes under the direct  subsidy benefit transfer programme are expected to follow suit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here are just a few instances in which you should be ready to whip out  your Aadhaar card — a free midday meal at a government school, access to  Sarv Shiksha Abhiyan, LPG subsidy and foodgrains under the public  distribution system, six scholarship schemes for students with  disabilities, getting your EPF pensions, booking a train ticket online,  getting a backward caste quota or benefit, and, according to the most  recent directive in the Finance Bill, filing your tax returns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why did a dispensation so critical of Aadhaar in 2014 make a sharp  U-turn to bulldoze its way into having every single Indian citizen  scanned, tagged and labelled?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The earliest felt need for an identification project can be traced to  the Kargil Review Committee, instituted by the Vajpayee Government in  1999, in the wake of the Indo-Pak war. The Krishnaswamy Subrahmanyam-led  panel had recommended a citizenship database for the identification of  legitimate Indian citizens living in border areas.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As outlined in a Scroll article, this quickly expanded to include all  Indians under the Multipurpose National Identity Card project, which was  pilot tested in a few villages. The Citizenship Act was also amended to  give a legislative backing to the scheme, which built on the Bharatiya  Janata Party’s general stance against illegal immigrants.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The search for identity&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Citizenship Act was amended in 2004 by the incumbent Congress  government to make way for the National Population Register (NPR), a  database of the identities of all Indian residents, maintained by the  Registrar General and Census Commissioner of India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Eventually, in 2009, Aadhaar, or UIDAI, surfaced as a 12-digit  identification number that served as proof of identity and address —  meaning, it applies to all residents whether they are citizens or not,  unlike with the NPR. Aadhaar, which means ‘basis’ in Hindi, is intended  to be an all-encompassing substratum of identities that can provide  “instant access to services like banking, mobile phone connections and  other government and non-government services”. The United Progressive  Alliance government managed to link it to its Direct Benefit Transfer  (DBT) system for subsidies provided to targeted groups.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the main Opposition party, the BJP had felt that the Aadhaar number  ought to have been given only to Indian citizens, and not all residents,  which, in its view, would include millions of illegal immigrants.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Nandan Nilekani, the former CEO of IT giant Infosys, was appointed UIDAI  chairman in July 2009. The first Aadhaar number was issued in September  2010, and then the pace accelerated: 100 million by November 2011, 200  million by February 2012 and 500 million by end of 2013. “We felt speed  was strategic. Doing and scaling things quickly was critical. If you  move very quickly it doesn’t give opposition the time to consolidate,”  Nilekani told Forbes India in a 2013 interview.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here’s the part most of us forget: The largest opposition that Nilekani was referring to at that time was the BJP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The people who thought of themselves as having given birth to IT in  this country refused to listen to a common man like me. Even the SC has  demanded answers,” Narendra Modi, then Gujarat chief minister, had said  and alleged that the Aadhaar programme was a bundle of lies to loot the  country’s treasury.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the BJP’s prime ministerial candidate for the 2014 Lok Sabha  elections, days ahead of delivering the party’s biggest-ever victory, he  had tweeted: “On Aadhaar, neither the Team that I met nor PM could  answer my Qs on security threat it can pose. There is no vision, only  political gimmick.” Recently, when Aadhaar enrolments had crossed the  billion mark, this tweet was dug out prominently.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The U-turn&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So, what changed? How did the Aadhaar’s primary opposition become it’s key crusader?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There were two meetings that supposedly changed the destiny of the  Aadhaar project. In the first week of June 2014, as Nilekani was  vacating his government-allotted Lutyen’s bungalow as UIDAI chief, he  met Modi and Jaitley and persuaded the new regime to persist with  Aadhaar. The more important meeting was with Vijay Madan, the UIDAI  director general and mission director. According to a Governance Now  article, when the UID team spoke of the potential savings from plugging  subsidy leakages, and weeding out “ghost beneficiaries”, Modi asked them  to give a precise estimate. The figure was “up to ₹50,000 crore a year”  or a good 9.4 per cent of India’s ₹5,31,177-crore fiscal deficit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Modi in his keenness to showcase the arrival of “acche din” immediately  sought a 100-crore enrolment target at the ‘earliest’, putting paid to  speculations that the new government would shelve the UIDAI project. A  funding of ₹2,039.64 crore was formalised in the 2014-2015 Budget  presented a week later, to create the infrastructure to enrol 30 crore  people to add to the 70 crore already enrolled. The UIDAI targeted the  1-billion mark by the end of that fiscal.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Money bill to beat legal hurdles&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It was in November 2012 that the SC admitted a PIL filed by retired  Karnataka High Court judge KS Puttaswamy and advocate Parvesh Khanna,  questioning the government’s decision to issue Aadhaar even as the  National Identification Authority of India Bill 2010 was pending before  the Rajya Sabha since December 3, 2010. They argued that there was no  legislative backing for obtaining personal information. Also, the  proposed law was rejected by the Parliamentary Standing Committee on  Finance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The PIL argued that linking the Aadhaar number with food security, LPG  subsidy, the Employees’ Provident Fund and other direct benefit  transfers made the enrolment mandatory, thereby falsifying the  government’s claim that it was voluntary. Several other PILs too voiced  similar privacy concerns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Currently, there are two legal strictures governing the validity of  Aadhaar: the apex court order of October 15, 2015, limiting the card’s  voluntary use to six schemes (PDS, MGNREGA, LPG, NEPS and social  assistance programmes) and prohibiting the government from making it  mandatory for receiving any benefits or services; and the Aadhaar  (Targeted Delivery of Financial and Other Subsidies, Benefits and  Services) Act, 2016, which is under challenge today. Both strictures  have distinct operational status, but petitioners argue that recent  government directives making Aadhaar mandatory are leading them to  wonder whether the SC’s interim order is overshadowed by the Aadhaar Act  or if the government is defying the court.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;On March 3, 2016, in a surprise move, to put all dissent to rest, the  Aadhaar Act was introduced as a Money Bill in Parliament to give it  legislative backing. Things moved pretty fast thereon. On March 11, the  Aadhaar Act 2016 was passed in the Lok Sabha. On March 26, the Act was  notified. Accusing the BJP-led NDA government of showing “utter  contempt” for the Rajya Sabha by taking the Money Bill route, senior  Congress leader Jairam Ramesh challenged it in the Supreme Court in  April. He likened the use of the Money Bill, which was passed overruling  amendments moved in the Rajya Sabha, to “knocking a nail in the coffin  of the Upper House”.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The government’s move took many, including Aadhaar advocates, by  surprise. “We need to separate Aadhaar as identity from its specific  functionality for which it’s used,” says Praveen Chakravarty, a senior  fellow at the IDFC institute and a former member of Nilekani’s core  team. He believes that just as a voter ID alone isn’t enough to vote,  seeing the ownership of an Aadhaar card as key for any transaction is  “fear-mongering”. Its use will still involve a process of checks and  balances.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But can’t thumb prints be replicated with Fevicol?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Sure, there could be failures, as there are with any system. But this  is a far more foolproof method than any we’ve had before.  Internationally also, biometric is to authenticate a higher level of  security.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The argument for privacy&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar has the potential to improve welfare service delivery. But it  has to be achieved in an inclusive manner befitting a truly liberal  society and not through coercion,” says Chakravarty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;His only misgiving is with the use of the Money Bill to introduce the  Aadhaar, without any right to privacy. “It should have gone through the  process of debate in Parliament. Then it wouldn’t have been passed  without a strong right to privacy safeguard,” he says, pointing that  even a junior UIDAI officer can access the data of anybody he/she  chooses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar inverts the idea of transparency. It makes people transparent  but the State opaque,” says legal expert Usha Ramanathan, a legal expert  and anti-Aadhaar crusader.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The use of Aadhar as verification at every instance can help piece  together very detailed information about citizens. These include banking  transactions, online purchases, travel itineraries, mobile phone usage,  location history and practically anything that can be electronically  recorded and verified with an Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, the UIDAI filed a police case against Axis Bank  and others for alleged unauthorised authentication and impersonation  attempts by illegally storing Aadhaar biometrics.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The latest outcry over breached privacy involved a screenshot of  cricketer Mahendra Singh Dhoni’s personal details that went viral on  Twitter. The UIDAI blacklisted the agency that revealed Dhoni’s Aadhaar  details after his wife complained to the IT Minister. A recent Scroll  report shows the UIDAI received 1,390 similar complaints but took no  action.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There are legitimate fears such an information database might eventually  be misused, for instance in racial profiling or revealing voting  preferences.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In January this year, Hyderabad-based ECIL developed a biometric-enabled  mobile terminal for instant authentication of a voter “to prevent  rigging of votes”. Till August 2015, the Election Commission was working  on seeding Aadhaar data with that of voter ID card, in an attempt to  weed out fake voters. However, the poll panel stopped this exercise  after the SC ruled that Aadhaar be made compulsory only for PDS and LPG  distribution.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;a href="http://www.thehindubusinessline.com/blink/cover/nandan-nilekani-demonising-of-aadhaar-is-irresponsible/article9608232.ece" target="_blank"&gt;Nilekani, in an interview to BLink&lt;/a&gt;,  insisted that the Aadhaar has more privacy regulations than any other  service in the world. He also pointed out that all election commission  data is already online, and anyone can look up any voter’s name, date of  birth, gender and address.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Additionally, social media profiles too are shared publicly of our own volition.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Concurring with this view, Chakravarty says, “It is surprising that  we’re perfectly okay with giving all our life information to a  32-year-old named Mark Zuckerberg. However, this is voluntary. Whether  we fully know consequences or not is another matter altogether.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With the Finance Bill requiring all PAN cards to be linked to Aadhaar,  there is added concern over privacy. Sunil Abraham, founder of the  Centre for Internet and Society, says Aadhaar runs the risk of being  used fraudulently. “If I want to get you in trouble, I can make a large  purchase of gold against your Aadhaar number, which is linked to your  PAN,” he explains.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He advocates for a system where different government departments don’t  store Aadhaar numbers in their databases but instead use a token issued  by UIADI kiosks. This would prevent proliferation of the number.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Technical glitches&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, Modi claimed in the Lok Sabha that plugging  leakages through Aadhaar had saved the government ₹14,000 crore. And  that nearly four crore fake ration cards have been seized till date.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One method of establishing a fake ration card is if the owner has not  availed himself of his ration. Ever since Aadhaar’s biometric  identification has been linked to point-of-sale (POS) machines at ration  shops, residents have had to queue up with a prayer on their lips. A  lot could go wrong — the biometric might not recognise them or, worse,  there could be a network failure, forcing everyone to return home  empty-handed. In both instances, while ration shop owners should ideally  mark such transactions under ‘Transactions with “N” response from  Aadhaar’, they invariably mark them under “Household yet to take  ration”, implying that the beneficiary has chosen not to take home her  share.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The February 2017 data for 22 ration shops across Delhi, accessed on the  Department of Food &amp;amp; Supplies website, shows that none have a  single beneficiary marked under “N”. At a Delhi Cantonment outlet, of  the 1,038 registered beneficiaries only 168 have been marked “Y”, or  ‘Yes’, showing they have taken their rations. Another 871 have been  marked “Household yet to take ration” and none have been marked ‘N’ to  indicate glitches in the Aadhaar authentication.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As Amrita Johri of citizens’ action group Satark Nagrik Sangathan  explains, “Aadhaar relies on internet and electricity. This might seem  like a problem only of rural areas. But we don’t have to go far. In  South Delhi’s East Mehraam Nagar, there is a ration shop with no mobile  signal and no network. Officials said we have to show that Aadhaar is a  success, so the shop’s POS machine was finally hung on a jamun tree to  get it to work.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;She questions the government’s reluctance to acknowledge the many instances of failure in the project.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Frighteningly, three consecutive failed attempts could lead to the card  being placed in an abeyance list and possibly invalidated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Top performers and laggards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Delhi is rated one of the better performing States/union territories,  while Rajasthan has one of the worst records with the maximum number of  biometric and network failures.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to the government’s 2017 monthly estimates, 27 per cent of the  residents whose Aadhaar cards have been seeded to the PDS were denied  rations owing to biometric or network failure. This figure would be  higher if the unseeded cards are also taken into account.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nikhil Dey, founder of Rajasthan’s Mazdoor Kisan Shakti Sangathan (MKSS)  says his organisation is fighting with its back against a wall.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Nearly 73 lakh households get their monthly rations in this State,  where a little over a crore households are eligible to receive them.  We’re not even talking about exclusions here,” says Dey. Besides network  failure, there are many instances of the old and sick who are unable to  visit the shop to physically verify themselves.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Back-up options such as OTP (one-time password) or facial recognition  only work in theory,” says Dey. He alleges that shop owners often fudge  the OTP system by punching in their own numbers and stealing the quotas  of genuine beneficiaries.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He too believes that several names have been struck off as dead to  project that the Aadhaar has weeded out a high number of fake social  security pension ers.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nilekani applauds Andhra Pradesh for its progress in the Aadhaar project  by investing in infrastructure to eliminate technical glitches. J  Satyanarayana, the UIDAI’s part-time chairperson, told BLink in an email  interview that Aadhaar has led to transparency and efficiency in nearly  all government schemes in AP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;During March 2017, 42.29 lakh (93.02 per cent) pensioners received their  payment through Aadhaar-based biometric authentication, he says, adding  that real-time monitoring systems are in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The entire PDS (rations) is linked to Aadhaar,” he says. As many as  1.21 crore (87.39 per cent) card holders collected their ration this  month, and 95.94 lakh received wages (totalling ₹5,283 crore under  MNREGA through Aadhaar-enabled systems, he informs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Neighbouring Telangana too is known for its 99 per cent Aadhaar  enrollment, leading to an impressive 80 per cent of its population  accessing the PDS.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;BP Acharya, special chief secretary in Telangana’s planning department  says, “Aadhaar’s use can perhaps be most seen in Telangana’s speedy  clearances, investment promotion, creating licences and clearances for  shops and establishments.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Telangana took the Aadhaar database project one step further through its  Citizen 360 programme. In August 2014, months after the State was newly  formed, it conducted one of the largest household surveys in a single  day, covering one crore households. This data was integrated with the  Aadhaar database and now links different benefits on the same platform.  Now the Aadhaar identity is linked to other details such as the holder’s  driving licence and even crime record.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The UIDAI holds out AP and Telangana as shining examples of Aadhaar’s  efficiency when backed by the right network and infrastructure. But for  the lakhs of biometric factory rejects who are denied their rights,  Aadhaar can only mean a mass experiment gone horribly wrong.&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="body"&gt;&lt;b&gt;&lt;i&gt;Aadhaar Timeline&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2006&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ministry of communications and information technology approves the  ‘Unique ID for Below Poverty Line (BPL) families’ project under the  chairmanship of Arvind Virmani, then principal advisor, Planning  Commission&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2008&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Empowered group of ministers formed by former Prime Minister Manmohan  Singh decides to collate two schemes — the National Population Register  under the Citizenship Act, 1955 and the UID project — to conceive  Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2009&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Planning Commission issues a notification to constitute the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Government appoints Infosys co-founder Nandan Nilekani as the first  chairman of UIDAI, with the rank and status of a cabinet minister.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2012&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Former Karnataka high court judge justice K Puttaswamy files a public  interest litigation before the Supreme Court (SC) declaring that Aadhaar  violates an individual’s right to privacy and that the scheme lacks  legislative backing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2014&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In an interim order, the SC restrains the UIDAI from transferring  biometric information with an Aadhaar number to any other agency without  the individual’s consent in writing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2015&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Three-judge bench of the apex court rules the unique identity number is  not mandatory to avail of benefits from government programmes,  restricting the use of Aadhaar to beneficiaries of the public  distribution system and subsidies on cooking gas and kerosene, and  refers the question on privacy to a larger constitution bench.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Centre moves SC seeking a review and modification of the August 11  interim order. A five-judge constitution bench modifies the same and  extends the use of Aadhaar to Mahatma Gandhi National Rural Employment  Guarantee Scheme, Jan Dhan Yojana, pensions and the Employees’ Provident  Fund scheme.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2016&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Finance minister Arun Jaitley announces in the budget speech that the  government will offer statutory backing for Aadhaar. The Lok Sabha  passes the Aadhaar (Targeted Delivery of Financial and Other Subsidies,  Benefits and Services) Bill, 2016 as a Money Bill, rejecting Rajya Sabha  recommendations.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2017&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar is made mandatory for three dozen schemes with 84 more expected  under direct benefit transfers, including midday meal scheme and  universal education.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC again rules that Aadhaar cannot be made mandatory for welfare schemes.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-03T15:46:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report">
    <title>Comments on the Statistical Disclosure Control Report</title>
    <link>https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Statistical Disclosure Control Report published on March 30th by Ministry of Statistics and Programme Implementation. 
&lt;/b&gt;
        
&lt;p&gt;&lt;strong id="docs-internal-guid-a12fe2b3-c746-4c1a-0287-1814414668af"&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;1. PRELIMINARY&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Statistical Disclosure Control Report published on March 30th by Ministry of Statistics and Programme Implementation.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS is thankful for the opportunity to put forth its views.&lt;br class="kix-line-break" /&gt;This submission is divided into three main parts. The first part, ‘Preliminary’, introduces the document; the second part, ‘About CIS’, is an overview of the organization; and, the third part contains the ‘Comments’.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;2. ABOUT CIS&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS is a non-​profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, freedom of speech and expression, intermediary liability, digital privacy, and cybersecurity.​&lt;br class="kix-line-break" /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS' commitment to these values, the safeguarding of general public interest and the protection of India's national interest at the international level. Accordingly, the comments in this submission aim to further these principles.&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.1 General Comments&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As a non-profit organisation we recognize the importance of the efforts by the Ministry of Statistics and Programme Implementation (MoSPI) to make the &amp;nbsp;data you collect available to the public in open formats with relevant information about reliability of statistical estimates.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;We at CIS have recently released a report titled “Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar Numbers with sensitive personal financial information”. We encountered several central and state government departments collecting socioeconomic data from citizens, linking it with Aadhaar and even publishing them in exportable data formats like EXCEL and MS ACCESS Databases. &amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;While we understand this issue primarily concerns to Unique Identification Authority of India (UIDAI), the lack of standards around information/statistical disclosure are a general threat to transparency in a democracy and privacy of individuals.&amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;Going through the report we understand the committee is unable to prescribe a standard for other ministries and departments until they try and pilot these standards within Ministry of Statistics and Programme Implementation. This delay in prescribing the standards can be really dangerous in the current circumstances of massive data collection by government departments and linking all the databases with a unique identifier, Aadhaar Number. &amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;At the same time we understand the importance of data dissemination to be carried out and we recommend the following for improving the standards around data disclosure control.&lt;/span&gt;&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.2 Integrity of Information and Data&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We agree with the committee that the error rates need to be kept in mind while designing practices to convert raw data. But we request the process of changes being made be actively measured and documented. In case of errors being computed, guidelines can be made to decrease the possibilities of misinterpretation of errors causing loss of integrity of information. Statistics are important for decision making in governance, errors in computations can be biased towards millions of people. Statistical biases are important to be looked into while converting data from its raw format to make sure there are no damage caused by information.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.3 Data Security&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;One of the important issues around storage and publication of Aadhaar information is the lack of masking standards. With the availability of data from multiple departments, it is possible to reconstruct identification details by linking data from multiple databases. It is recommended to bring masking standards while personally identifiable micro data is being published. There is an urgent need for departments to also look at auditing access to information and tracking sharing of information. It is recommended the department digitally signs all the information and documents being published or shared by them to keep track of who had accessed the information and verifying the authenticity of information.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We request the department to define what exactly is “usage for statistical purposes only” and recommend standards to control and restrict usage of information for this purpose. It is important they design frameworks or mechanisms to allow others to report violations around this. This process should be transparent and documented heavily.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.4 Anonymization of microdata&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We recommend the data being collected be anonymized at source to evade the possibility of the accidental disclosure of personally identifiable information. While the current anonymization efforts have been helpful, with steady increase in data mining and classification algorithms and practices it is recommended to evolve the standards around this area.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.5 Data Dissemination&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Data dissemination is an important aspect for district statistics officers, we recommend they actively communicate their work through monthly newsletters, quarterly workshops to help improve the conversations around statistics and at the same time engage with the users who would benefit from the data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We also recommend that data when being published includes metadata of collection, modification, storage and other important information. Also the information needs to be published in open formats which does not require proprietary software to be used to open them. At the same time data should be published in multiple formats like CSV, XLS, PDF,&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The committee also recognizes the need for having data users part of discussions around important decisions and be part of committees. We would like the department to recognize our efforts and consider us for future committee representations.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Thank you for this opportunity and we look forward to work with you in future.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report'&gt;https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Srinivs Kodali and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Information Security</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2019-03-13T00:28:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people">
    <title>Biggest blast on Aadhaar leak so far: govt sites leaked data of 13 crore people</title>
    <link>https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people</link>
    <description>
        &lt;b&gt;In yet another shocking report of personal data breach in India, it has emerged that Aadhaar data of 13 crore people was put out on websites of four major government projects in the country. The leaked data include bank account details of over one crore people linked to Aadhar numbers under the direct benefit scheme. Over eight crore people lost their private data on the national job guarantee scheme website alone.&lt;/b&gt;
        &lt;p&gt;The article by Jikku Varghese Jacob was &lt;a href="http://english.manoramaonline.com/news/nation/2017/05/01/government-sites-leaked-aadhaar-data-of-13-crore-cis-report.html"&gt;published by Manorama&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The shocking details have surfaced in a report released by the       Center for Internet Society (CIS) which deals with the publication       of Aadhaar data and their security. It appears to be the biggest       blast on Aadhaar data leak yet. The report says these pieces of       information were available on Internet since last November. Once       detected, the CIS officials had initiated steps to remove them.&lt;/p&gt;
&lt;p&gt;The CIS report cites two central government portals and websites       from Andhra Pradesh as violators. Following are the websites that       published the data:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;National Social Assistance Programme (under the Ministry of       Rural Development).&lt;/li&gt;
&lt;li&gt;The national portal of the job guarantee scheme.&lt;/li&gt;
&lt;li&gt;Daily online payment reports (Government of Andhra Pradesh)&lt;/li&gt;
&lt;li&gt;Chandranna Bheema project (Government of Andhra Pradesh)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Private data of 1,59,42,083 people were leaked on the social       assistance scheme site. The two Andhra Pradesh sites breached the       privacy of three crore people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information leaked on most of the sites could be downloaded as       Excel sheet. It is estimated that data on 23 crore people is       linked to Aadhaar under the direct benefit scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS fears that if other government sites have also handled       such data without care there could have occurred a massive data       base breach. The CIS put in months of effort before finalizing       this report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was recently found that Aadhaar data on 35 lakh people in       Kerala was found disclosed on the state's Sevana Pension website.       In Jharkhand, 14 lakh people had their privacy violated when their       Aadhaar information was put out on a government website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such leaks of Aadhaar data is a crime that can fetch up to three       years of imprisonment. Complaints have arisen that government       departments did not bother to comply with an IT ministry directive       last month to remove the Aadhaar data from websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts point out that criminals can misuse personal data on       Aadhaar and bank account. The data could be used to obtain SIM       cards and carry out transactions online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar, the world's largest bio-metric enrolment in India, will       enrol 1.2 billion people in a 12-digit unique number for each       person to be issued to each resident in the country. The number       with its biometric information – photograph, fingerprints and iris       scan – of each individual is easily verifiable in an online.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people'&gt;https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-03T14:35:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report">
    <title>130 Million Aadhaar Numbers Were Made Public, Says New Report</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report</link>
    <description>
        &lt;b&gt;The research report looks at four major government portals whose poor information security practices have exposed personal data including bank account details.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/"&gt;published in the Wire&lt;/a&gt; on May 1, 2017. This was also mirrored on &lt;a class="external-link" href="http://www.mensxp.com/technology/latest/36661-over-130-million-aadhaar-numbers-bank-details-were-leaked-way-are-not-surprised.html"&gt;MensXP.com&lt;/a&gt; on May 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Irresponsible         information security practices by a major central government         ministry and a state government may have exposed up to 135         million Aadhaar numbers, according to a new research report         released on Monday.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The&lt;a href="https://thewire.in/118250/government-expose-personal-data-thousands-indians/" rel="noopener           noreferrer" target="_blank" title=" last two months "&gt; last two months &lt;/a&gt;have seen a wave of data         leaks, mostly due improper information security practices, from         various central government and state government departments.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a rel="noopener noreferrer" target="_blank" title="new report"&gt;new report&lt;/a&gt;, released by the Centre       for Internet and Society, studied four government databases. The       first two belong to the rural development ministry: the National       Social Assistance Programme (NSAP)’s dashboard and the National       Rural Employment Guarantee Act (NREGA)’s portal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second two databases deal with the state of       Andhra Pradesh: namely, the state government’s own NREGA portal       and the online dashboard of a state government scheme called       “Chandranna Bima”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Based on the numbers available on the websites       looked at, estimated number of Aadhaar numbers leaked through       these 4 portals could be around 130-135 million and the number of       bank accounts numbers leaked at around 100 million from the       specific portals we looked at,” the report’s authors, Amber Sinha       and Srinivas Kodali, state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data leaks come, in part, from the       government’s decision to provide online dashboards that were       likely meant for general transparency and easy administration.       However, as the report notes, while open data portals are a       laudable goal, if there aren’t any proper safeguards, the results       can be downright disastrous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While availability of aggregate information on       the dashboard may play a role in making government functioning       more transparent, the fact that granular details about individuals       including sensitive PII such as Aadhaar number, caste, religion,       address, photographs and financial information are only a few       clicks away suggest how poorly conceived these initiatives are,”       the report says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consider the NSAP portal for instance. The       dashboard allows users to explore a list of pensioners, whose       personally identifiable information include bank account number,       name and Aadhaar number. While these details are “masked for       public view”, the CIS report points out that if “one of the URL       query parameters of the website… was modified from ‘nologin’ to       ‘login'”, it became easy to gain access to the unmasked details       without a password.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is entirely unclear to us what the the       purpose behind making available a data download pption on the NSAP       website is. This feature allows download of beneficiary details       mentioned above such as Beneficiary No., Name, Father’s/Husband’s       Name, Age, Gender, Bank or Post Office Account No. for       beneficiaries receiving disbursement via bank transfer and Aadhaar       Numbers for each area, district and state,” the report states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI role?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kodali and Sinha also prominently finger the role       of the Unique Identification Authority of India (UIDAI), the       government agency that manages the Aadhaar initiative, in the data       leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the UIDAI has been involved in proactively       pushing for other databases to get seeded with Aadhaar numbers,       they take little responsibility in ensuring the security and       privacy of such data.With countless databases seeded with Aadhaar       numbers, we would argue that it is extremely irresponsible on the       part of the UIDAI, the sole governing body for this massive       project, to turn a blind eye to the lack of standards prescribed       for how other bodies shall deal with such data, such cases of       massive public disclosures of this data, and the myriad ways in       which it may used for mischief,” the report states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Still public?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial question that arises is whether these       government databases are still leaking data. Over the last two       months, some of information has been masked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It must be stated that since we began reviewing       and documenting these portals, we have noticed that some of the       pages with sensitive PII (personally identifiable information)       have now been masked, presumably in response to growing reports       about Aadhaar leaks,” the report notes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report'&gt;https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:32:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report">
    <title>Govt may have made 135 million Aadhaar numbers public: CIS report</title>
    <link>https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report</link>
    <description>
        &lt;b&gt;CIS report says Aadhaar numbers leaked through government databases could be 100-135 million and bank accounts numbers leaked about 100 million.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a href="http://www.livemint.com/Politics/oj7ky556p6vdljXpRw8gPP/135-million-Aadhaar-numbers-made-public-by-government-author.html"&gt;published in Livemint&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A central government ministry and a state government may have       made public up to 135 million Aadhaar numbers, according to a       research report issued by Bengaluru-based think tank Centre for       Internet and Society (CIS) late on Monday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;report&lt;/a&gt; titled &lt;i&gt;Information Security         Practices of Aadhaar (or lack thereof): A documentation of         public availability of Aadhaar numbers with sensitive personal         financial information&lt;/i&gt; studied four government databases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first two belong to the rural development ministry—the       National Social Assistance Programme (NSAP)’s dashboard and the       National Rural Employment Guarantee Act’s (NREGA) portal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other two databases deal with Andhra Pradesh—the state’s own       NREGA portal and the online dashboard of a government scheme       called “Chandranna Bima”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Based on the numbers available on the websites looked at, the       estimated number of Aadhaar numbers leaked through these four       portals could be around 130-135 million and the number of bank       account numbers leaked at around 100 million from the specific       portals we looked at,” said Amber Sinha and Srinivas Kodali, the       authors of the research report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report claims these government dashboards and databases       revealed personally identifiable information (PII) due to a lack       of proper controls exercised by the departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the availability of aggregate information on the Dashboard       may play a role in making government functioning more transparent,       the fact that granular details about individuals including       sensitive PII such as Aadhaar number, caste, religion, address,       photographs and financial information are only a few clicks away       suggest how poorly conceived these initiatives are,” said the       report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report said the NSAP portal lists 94,32,605 bank accounts and       14,98,919 post office accounts linked with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the UIDAI (Unique Identification Authority of India) has       been involved in proactively pushing for other databases to get       seeded with Aadhaar numbers, they take little responsibility in       ensuring the security and privacy of such data,” said the report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI did not respond to an email from &lt;i&gt;Mint&lt;/i&gt; seeking       comments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report'&gt;https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-03T15:43:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave">
    <title>Digital native: You can check out, you can never leave</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave</link>
    <description>
        &lt;b&gt;Aadhaar is not something you define and opt into, it is something that defines you.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/digital-native-you-can-check-out-you-can-never-leave-4595503/"&gt;published in the Indian Express&lt;/a&gt; on April 2, 2017. Nishant Shah is a professor of new media and the co-founder of The Centre for Internet &amp;amp; Society, Bangalore.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ok. I get it. You don’t want yet another piece on the horrors and perils of the surveillance state that has come to the forefront with Aadhaar numbers now being tied to our taxes. I know that you must have already made up your mind about whether this is a good thing or a bad thing. If you believe that the way to streamlining bureaucracy and making our systems more accountable is transparency, then you are ready to welcome the digital ecosystem of Aadhaar, as introducing checks and balances that might help to curb some of the excesses and wastes of our governance systems . If you are of the opinion, however, that the state cannot be trusted with our information, without the oversee of the Parliament and the judiciary, then you want to resist this mandatory implementation of the “voluntary” Aadhaar. And, for once, I am unable to take a side, favouring one set of arguments over the other. This ambiguity does not come from a lack of political conviction. I continue to fear about the future of our lives when these technologies of control and domination fall in the hands of governments which have an authoritarian bend of mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, my lack of preference on the good, bad and ugly sides of Aadhaar stems from a completely different concern around network technologies of digital connectivity that has found very little attention in the almost zealous discourse about “yes Aadhaar, no Aadhaar”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a concern about the relationship between technological  networks and the messy realities that we embody. There has been an easy  acceptance of a digital network as a description of our everyday life.  If you look at any network that you belong to — from public discussion  forums to private WhatsApp groups — you will realise that these networks  offer to visualise your connections and transactions with the people,  places and things in your circles. Thus, it is possible to say that &lt;a href="http://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt; describes your collection of friends and your social life. Or you could suggest that &lt;a href="http://indianexpress.com/about/linkedin/"&gt;LinkedIn&lt;/a&gt; is a visualisation of your professional landscape. And, in a similar  vein, we can also propose that Aadhaar is a representation of the  working of our government systems of identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each one of these propositions, seemingly innocent, is blatantly wrong. Facebook, for example, didn’t just connect you with your friends. It has fundamentally changed the idea of what is a friend. For a generation of young people who grew up naturalised in social media, the notion of a friend has lost all its meaning and nuance. Every connection, acquaintance, friend of a friend, a random stranger who likes the same band as you do, is now a friend. And the increasing anxiety we have about people falling prey to predatory friendships is because Facebook has now normalised the idea that if somebody calls you their friend, you don’t have to worry about sharing personal and private information with them. Similarly , for anybody who has spent time on LinkedIn, we know that it is not just a portal that describes our work. It is the space where we stay connected with events and people far removed from us. It is the resource pool that we draw on while looking for new work. It is also the space that we keep an eye on just to see if a better job has opened up. It is a collection of events, links and connections that not only shows what you do but what you aspire for, who you connect with and what are the kinds of professional ambitions you see for yourself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just like Facebook and LinkedIn, which don’t just describe a reality but actually simulate, prescribe and shape it, Aadhaar is a digital network that is seeking to change the very foundational reality of our lives. Like most digital networks, it is not merely an explanation of how things are but the context within which who we are and what we do finds meaning and validation. Thus, Aadhaar might propose that it is merely trying to describe your identity but it is actually offering to shape a new one for you. The programme might suggest that it is trying to implement a system already in place, but it is, in reality, creating an entirely new system within which you and I have to now find space, function and identity. The latest announcements of mainstreaming Aadhaar merely betray this fact – that Aadhaar is not something you define and opt into, Aadhaar defines you. And opting out is going to have severe penalties and consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital networks have long masqueraded as benign visualisations of the world. But they are, in principle, blueprints that transform the world as we know it. This, in itself, is not bad. However, hiding this transformation is. Because when a transformation happens, especially at systemic levels, it is always the people who are the most vulnerable that suffer the most from it. Think about the older friend who might not be the most tech savvy and how they struggle for inclusion on Facebook and WhatsApp messages. Pay some attention to people who did not understand the public nature of LinkedIn and ended up getting fired because they wrote about their current work conditions and the desire to change them. And, similarly, do think if the people who are being pushed into these digital ecosystems without adequate digital literacy, care and information about the consequences of their actions, are being made vulnerable in their access to resources of life and dignity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether you and I like Aadhaar or not is not really the question. The question is not about the right to privacy either. What is at stake in this deployment of Aadhaar is a government that is pushing radical transformations of the life of its citizens without consulting with them and addressing their needs. In the past, when governments have done this, we have developed strong voices of protest and correction asking the state to be responsible towards those affected by the transformation. The reliance on the digital, however, allows these governments to escape this responsibility and, in the guise of description, are making prescriptions of reality which need to be resisted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave'&gt;https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2017-05-05T01:31:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report">
    <title>Aadhaar numbers of 135 mn may have leaked, claims CIS report</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report/articleshow/58529002.cms"&gt;published in the Times of India&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Based on the numbers available on the websites looked at, estimated  number of Aadhaar numbers leaked through these four portals could be  around 130-135 million," the report by &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/CIS"&gt;CIS&lt;/a&gt; said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, as many as 100 million bank account numbers could have been "leaked" from the four portals, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The portals where the purported leaks happened were those of National  Social Assistance Programme, National Rural Employment Guarantee  Scheme, as well as two websites of the Andhra Pradesh government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Over 23 crore beneficiaries have been brought under Aadhaar  programme for DBT (Direct Benefit Transfer), and if a significant number  of schemes have mishandled data in a similar way, we could be looking  at a data leak closer to that number," it cautioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure came as part of a CIS report titled 'Information  Security Practices of Aadhaar (or lack thereof): A Documentation of &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Public-Availability-of-Aadhaar-Numbers"&gt;Public Availability of Aadhaar Numbers&lt;/a&gt; with Sensitive Personal Financial Information'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contaced, a senior official of the &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Unique-Identification-Authority-of-India"&gt;Unique Identification Authority of India&lt;/a&gt; (UIDAI) said that there was no breach in its own database. The UIDAI issues Aadhaar to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS report claimed that the absence of "proper controls" in  populating the databases could have disastrous results as it may divulge  sensitive information about individuals, including details about  address, photographs and financial data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The lack of consistency of data masking and de- identification  standard is an issue of great concern...the masking of Aadhaar numbers  does not follow a consistent pattern," the report added. SR &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/MBI"&gt;MBI&lt;/a&gt; MR&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report'&gt;https://cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T15:40:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database">
    <title>Aadhaar: Are a billion identities at risk on India's biometric database</title>
    <link>https://cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database</link>
    <description>
        &lt;b&gt;"My fingerprints and iris are mine and my own. The state cannot take away my body," a lawyer told India's Supreme Court last week.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Soutik Biswas was &lt;a class="external-link" href="http://www.bbc.com/news/world-asia-india-39769322"&gt;published by BBC News&lt;/a&gt; on May 4, 2017. Also see the blog post by Rawlson King published by &lt;a class="external-link" href="http://www.biometricupdate.com/201705/report-claims-millions-of-aadhaar-registration-and-bank-numbers-compromised"&gt;Biometric Update.com&lt;/a&gt; on May 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Shyam Divan was arguing a &lt;a class="story-body__link-external" href="https://barandbench.com/day-3-aadhaar-hearing-eminent-domain-confined-to-land-cannot-extend-it-to-human-body/"&gt;crucial petition &lt;/a&gt;challenging  a new law that makes it compulsory for people to submit a controversial  biometric-based personal identification number while filing income tax  returns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Defending this law, the government's top law officer told  the court on Tuesday that an individual's "right to body is not an  absolute right".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"You can have right over your body but the state  can restrict trading in body organs, so the state can exercise control  over the body," Attorney General Mukul Rohatgi said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the heart  of the latest challenge are rising concerns over the security of this  mega biometric database and privacy of the number holders. (The  government says it needs to link the identity number to income tax  returns to improve compliance and prevent fraud.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's biometric database is the world's largest. Over the past  eight years, the government has collected fingerprints and iris scans  from &lt;a class="story-body__link-external" href="http://economictimes.indiatimes.com/news/politics-and-nation/1-12-billion-indians-have-aadhaar-numbers-by-now-heres-how-modi-government-plans-to-sign-up-the-rest/articleshow/57914441.cms"&gt;more than a billion&lt;/a&gt; residents - or nearly 90% of the population - and stored them in a high  security data centre. In return, each person has been provided with a  randomly generated, unique 12-digit identity number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a  country of 1.2 billion people with only 65 million passport-holders and  200 million with driving licenses, the portable identity number is a  boon to the millions who have long suffered for a lack of one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;States have been using the number, also called Aadhaar (Foundation),  to transfer government pensions, scholarships, wages for a landmark  rural jobs-for-work scheme and benefits for cooking fuel to targeted  recipients, and distribute cheap food to the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the  years, the number has taken a life of its own and begun exerting, what  many say, is an overweening and stifling control over people's lives.  For many like political scientist Pratap Bhanu Mehta, Aadhaar has  transmuted from a "tool of citizen empowerment to a &lt;a class="story-body__link-external" href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/"&gt;tool of state surveillance&lt;/a&gt; and citizen vulnerability".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People will soon need the number to receive benefits from more than 500 of India's 1,200-odd welfare schemes. Even&lt;a class="story-body__link-external" href="https://scroll.in/article/823274/how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"&gt; banks and private firms&lt;/a&gt; have begun using it to authenticate consumers: a new telecom company  snapped up 100 million subscribers in quick time recently by verifying  the customer's identity through the number.&lt;/p&gt;
&lt;h2 class="story-body__crosshead" style="text-align: justify; "&gt;'Forcibly linked'&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;People  are using the number to even get their marriages registered. The  number, says Nikhil Pahwa, editor and publisher of Indian news site  MediaNama, is "being forcibly linked to mobile numbers, bank accounts,  tax filings, scholarships, pensions, rations, school admissions, health  records and much much more, which thus puts more personal information at  risk".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the fears are not without basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has assured that the biometric data is &lt;a class="story-body__link-external" href="http://www.hindustantimes.com/india-news/aadhaar-is-safe-secure-and-robust-says-i-t-minister-ravi-shankar-prasad/story-k3Judj5xqGdHmHuraZggTN.html"&gt;"safe and secure in encrypted form"&lt;/a&gt;, and anybody found guilty of leaking data can be jailed and fined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there have already been a &lt;a class="story-body__link-external" href="http://www.medianama.com/2017/04/223-aadhaar-leaks-database/"&gt;number of leaks&lt;/a&gt; of details of students, pensioners and recipients of welfare benefits  involving a dozen government websites. Even former Indian cricket  captain &lt;a class="story-body__link-external" href="http://www.dailyo.in/variety/ms-dhoni-wife-sakshi-leaked-private-details-aadhaar-card/story/1/16421.html"&gt;MS Dhoni's personal information&lt;/a&gt; was mistakenly tweeted by an overzealous enrolment service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now a disturbing &lt;a class="story-body__link-external" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;report&lt;/a&gt; by The Centre for Internet and Society claims that details of around  130-135 million Aadhaar numbers, and around 100 million bank numbers of  pensioners and rural jobs-for-work beneficiaries have been leaked online  by four key government schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than 230 million people  nationwide are accessing welfare benefits using their numbers, and  potentially, according to the report, "we could be looking at a data  leak closer to that number". And linking the number to different  databases - as the government is doing - is increasing the risk of data  theft and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chief law officer believes that the outrage over the leaks is "much ado about nothing".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Biometrics  were not leaked, only Aadhaar numbers were leaked. It is nothing  substantial. The idea is biometrics should not be leaked," Mukul Rohtagi  told the Supreme Court on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government itself has admitted that it has&lt;a class="story-body__link-external" href="http://indianexpress.com/article/india/aadhaar-card-uidai-cracks-down-on-1000-operators-in-three-months-for-malpractices-fir-against-20-4606006/"&gt; blacklisted or suspended some 34,000 service providers&lt;/a&gt; for helping create "fake" identification numbers or not following  proper processes. Two years ago, a man was arrested for getting an &lt;a class="story-body__link-external" href="http://indianexpress.com/article/trending/man-arrested-for-getting-aadhar-card-made-for-dog/"&gt;identification number for his pet dog&lt;/a&gt;.   The government itself has deactivated 8.5 million numbers for  incorrect data, dodgy biometrics and duplication. Last month, crop loss  compensation for more than 40,000 farmers was delayed because their  Aadhaar numbers were &lt;a class="story-body__link-external" href="http://timesofindia.indiatimes.com/city/bengaluru/banks-mess-up-aadhaar-entry-relief-delayed-to-40000-farmers/articleshow/58424252.cms?utm_source=toimobile&amp;amp;utm_medium=Twitter&amp;amp;utm_campaign=referral&amp;amp;from=mdr"&gt;"entered incorrectly by banks&lt;/a&gt;".&lt;/p&gt;
&lt;h2 class="story-body__crosshead" style="text-align: justify; "&gt;'Mass surveillance'&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There  are also concerns that the number can be used for profiling. Recently,  authorities asked participants at a function in a restive university  campus in southern India &lt;a class="story-body__link-external" href="http://www.newindianexpress.com/cities/hyderabad/2017/apr/26/osmania-university-centenary-aadhaar-must-for-entry-activists-not-amused-1597850.html"&gt;to provide their Aadhaar identity numbers&lt;/a&gt;.  "This is not only a matter of privacy. The all pervasiveness of the  Aadhaar number is a threat to freedom of expression, which is a  constitutional right," Srinivas Kodali, who investigated the latest  report on data leaks, told me.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics say the government is  steaming ahead with making the number compulsory for a range of  services, violating a Supreme Court order which said enrolment would be  voluntary. "The main danger of the number," says economist Jean Dreze,  "is that it opens the door to mass surveillance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="story-body__link" href="http://www.bbc.co.uk/news/technology-23867191"&gt;Nandan Nilekani&lt;/a&gt;, the technology tycoon who set up the programme popularly known by its acronym &lt;a class="story-body__link-external" href="https://uidai.gov.in/"&gt;UIDAI&lt;/a&gt;, believes concerns about the safety of the biometric database are exaggerated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He says the identity number has cut wastage, removed fakes, curbed  corruption and made substantial savings for the government. He insists  that the programme is completely encrypted and secure. "It's like you  are creating a rule-based society," he told &lt;a class="story-body__link-external" href="https://www.ft.com/content/46dcb248-0fcb-11e7-a88c-50ba212dce4d"&gt;Financial Times&lt;/a&gt; recently, "it's the transition that is going on right now."&lt;/p&gt;
&lt;h2 class="story-body__crosshead" style="text-align: justify; "&gt;Abused&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;More  than 60 countries around the world take biometric data from its people,  says Mr Nilekani. But then there are nagging concerns worldwide about  these databases being abused by hackers and state intelligence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2016, personal details of some &lt;a class="story-body__link" href="http://www.bbc.co.uk/news/technology-35978216"&gt;50 million people in Turkey&lt;/a&gt; were reportedly leaked. (Turkey's population is estimated at 78 million.) In 2015, hackers &lt;a class="story-body__link" href="http://www.bbc.co.uk/news/technology-34346802"&gt;stole more than five million fingerprints &lt;/a&gt;after  breaching US government networks. In 2011, French experts discovered a  hack involving the theft of millions of people's data in Israel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratap  Bhanu Mehta has written that the lack of a "clear transparent consent  architecture, no transparent information architecture, no privacy  architecture worth the name [India doesn't have a privacy law], and  increasingly, no assurance about what exactly you do if the state  decides to mess with your identity" could easily make Aadhaar a "tool of  state suppression".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So a lot of lingering doubts remain. How  pervasive should an identity number be? What about the individual  freedom of citizens? How do you ensure the world's biggest biometric  database is secure in a country with no privacy laws and a deficient  criminal justice system?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many ways, the debate about Aadhaar  is also a debate about the future of India. As lawyer Shyam Divan argued  forcefully in the top court, "people are reduced to vassals" when the  state controls your body to this extent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;&lt;figure class="full-width has-caption media-landscape"&gt; &lt;span class="image-and-copyright-container"&gt; &lt;/span&gt;&lt;/figure&gt;&lt;span class="image-and-copyright-container"&gt; &lt;span class="off-screen"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database'&gt;https://cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:38:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
